{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:25:10Z","timestamp":1774121110688,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/1472-6947-15-s5-s2","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T05:04:13Z","timestamp":1450760653000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["Privacy-preserving GWAS analysis on federated genomic datasets"],"prefix":"10.1186","volume":"15","author":[{"given":"Scott D","family":"Constable","sequence":"first","affiliation":[]},{"given":"Yuzhe","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaoqian","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Chapin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,21]]},"reference":[{"key":"926_CR1","first-page":"321","volume-title":"Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013","author":"B Kreuter","year":"2013","unstructured":"Kreuter B, Shelat A, Mood B, Butler KRB: PCF: A portable circuit format for scalable two-party secure computation. Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013. 2013, 321-336."},{"issue":"5","key":"926_CR2","doi-asserted-by":"publisher","first-page":"1000477","DOI":"10.1371\/journal.pgen.1000477","volume":"5","author":"CC Spencer","year":"2009","unstructured":"Spencer CC, Su Z, Donnelly P, Marchini J: Designing genome-wide association studies: sample size, power, imputation, and the choice of genotyping chip. PLoS genetics. 2009, 5 (5): 1000477-","journal-title":"PLoS genetics"},{"issue":"10","key":"926_CR3","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1038\/gim.2013.72","volume":"15","author":"O Gottesman","year":"2013","unstructured":"Gottesman O, Kuivaniemi H, Tromp G, Faucett WA, Li R, Manolio TA, Sanderson SC, Kannry J, Zinberg R, Basford MA, et al: The electronic medical records and genomics (emerge) network: past, present, and future. Genetics in Medicine. 2013, 15 (10): 761-771.","journal-title":"Genetics in Medicine"},{"issue":"4","key":"926_CR4","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1136\/amiajnl-2014-002751","volume":"21","author":"L Ohno-Machado","year":"2014","unstructured":"Ohno-Machado L, Agha Z, Bell DS, Dahm L, Day ME, Doctor JN, Gabriel D, Kahlon MK, Kim KK, Hogarth M, et al: pscanner: patient-centered scalable national network for effectiveness research. Journal of the American Medical Informatics Association. 2014, 21 (4): 621-626.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"926_CR5","unstructured":"PCORnet: The National Patient-Centered Clinical Research Network. Available at http:\/\/hapmap.ncbi.nlm.nih.gov\/hapmart.html.en"},{"key":"926_CR6","unstructured":"NHIN. visited on October 7, 2015, [ https:\/\/www.healthit.gov\/policy-researchers-implementers\/nationwide-health-information-network-nwhin ]"},{"key":"926_CR7","unstructured":"CommonWell. visited on March 9, 2015, [ http:\/\/www.commonwellalliance.org\/ ]"},{"key":"926_CR8","unstructured":"GaHIN. visited on March 9, 2015, [ http:\/\/www.gahin.org\/ ]"},{"key":"926_CR9","volume-title":"Privacy and security in the genomic era","author":"M Naveed","year":"2014","unstructured":"Naveed M, Ayday E, Clayton EW, Fellay J, Gunter CA, Hubaux J-P, Malin BA, Wang X: Privacy and security in the genomic era. 2014, arXiv preprint arXiv:1405.1891"},{"key":"926_CR10","unstructured":"HiPAA. visited on March 9, 2015, [ http:\/\/www.cms.hhs.gov\/HIPAAGenInfo\/ ]"},{"key":"926_CR11","unstructured":"NIH Genomic Data Sharing (GDS) Policy. visited on March 9, 2015, [ http:\/\/gds.nih.gov\/03policy2.html ]"},{"key":"926_CR12","first-page":"287","volume-title":"USENIX Security Symposium","author":"D Malkhi","year":"2004","unstructured":"Malkhi D, Nisan N, Pinkas B, Sella Y: Fairplay - secure two-party computation system. USENIX Security Symposium. 2004, 287-302."},{"key":"926_CR13","first-page":"160","volume-title":"FOCS","author":"AC-C Yao","year":"1982","unstructured":"Yao AC-C: Protocols for secure computations (extended abstract). FOCS. 1982, 160-164."},{"key":"926_CR14","first-page":"265","volume-title":"TCC","author":"C Dwork","year":"2006","unstructured":"Dwork C, McSherry F, Nissim K, Smith A: Calibrating noise to sensitivity in private data analysis. TCC. 2006, 265-284."},{"key":"926_CR15","first-page":"24","volume-title":"ICDE","author":"A Machanavajjhala","year":"2006","unstructured":"Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M: l-diversity: Privacy beyond k-anonymity. ICDE. 2006, 24-"},{"issue":"Suppl 1","key":"926_CR16","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/1472-6947-14-S1-S2","volume":"14","author":"S Wang","year":"2014","unstructured":"Wang S, Mohammed N, Chen R: Differentially private genome data dissemination through top-down specialization. BMC medical informatics and decision making. 2014, 14 (Suppl 1): 2-","journal-title":"BMC medical informatics and decision making"},{"key":"926_CR17","first-page":"559","volume-title":"Bioinformatics","author":"W Jiang","year":"2013","unstructured":"Jiang W, Li P, Wang S, Wu Y, Xue M, Ohno-Machado L, Jiang X: Webglore: a web service for grid logistic regression. Bioinformatics. 2013, 559-"},{"issue":"3","key":"926_CR18","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.jbi.2013.03.008","volume":"46","author":"S Wang","year":"2013","unstructured":"Wang S, Jiang X, Wu Y, Cui L, Cheng S, Ohno-Machado L: Expectation propagation logistic regression (explorer): distributed privacy-preserving online model learning. Journal of biomedical informatics. 2013, 46 (3): 480-496.","journal-title":"Journal of biomedical informatics"},{"issue":"1","key":"926_CR19","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s12911-015-0133-y","volume":"15","author":"Y Wu","year":"2015","unstructured":"Wu Y, Jiang X, Wang S, Jiang W, Li P, Ohno-Machado L: Grid multi-category response logistic models. BMC Medical Informatics and Decision Making. 2015, 15 (1): 10-","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"926_CR20","first-page":"083","volume-title":"Journal of the American Medical Informatics Association","author":"C-L Lu","year":"2015","unstructured":"Lu C-L, Wang S, Ji Z, Wu Y, Xiong L, Jiang X, Ohno-Machado L: Webdisco: A web service for distributed cox model learning without patient-level data sharing. Journal of the American Medical Informatics Association. 2015, 083-"},{"key":"926_CR21","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/978-3-540-88313-5_13","volume-title":"Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, M\u00e1laga, Spain, October 6-8, 2008. Proceedings","author":"D Bogdanov","year":"2008","unstructured":"Bogdanov D, Laur S, Willemson J: Sharemind: A framework for fast privacy-preserving computations. Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, M\u00e1laga, Spain, October 6-8, 2008. Proceedings. 2008, 192-206."},{"key":"926_CR22","first-page":"416","volume-title":"Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings","author":"SG Choi","year":"2012","unstructured":"Choi SG, Hwang K, Katz J, Malkin T, Rubenstein D: Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings. 2012, 416-432. doi:10.1007\/978-3-642-27954-626"},{"key":"926_CR23","first-page":"257","volume-title":"ACM Conference on Computer and Communications Security","author":"A Ben-David","year":"2008","unstructured":"Ben-David A, Nisan N, Pinkas B: Fairplaymp: a system for secure multi-party computation. ACM Conference on Computer and Communications Security. 2008, 257-266."},{"key":"926_CR24","unstructured":"Jagom\u00e4gis R: Secrec: a privacy-aware programming language with applications in data mining."},{"key":"926_CR25","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/1536414.1536440","volume-title":"Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing","author":"C Gentry","year":"2009","unstructured":"Gentry C: Fully homomorphic encryption using ideal lattices. Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing. 2009, STOC '09. ACM, New York, NY, USA, 169-178."},{"key":"926_CR26","volume-title":"Bioinformatics","author":"S Wang","year":"2015","unstructured":"Wang S, Zhang Y, Dai W, Lauter K, Kim M, Tang Y, Xiong H, Jiang X: HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics. 2015, (accepted)"},{"key":"926_CR27","volume-title":"5th Annual Translational Bioinformatics Conference, Tokyo, Japan","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Dai W, Wang S, Kim M, Lauter K, Sakuma J, Xiong H, Jiang X: SECRET: Secure Edit-distance Computation over homomoRphic Encrypted daTa. 5th Annual Translational Bioinformatics Conference, Tokyo, Japan. 2015, (accepted)"},{"key":"926_CR28","volume-title":"BMC Med Inform Decis Mak","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Dai W, Jiang X, Xiong H, Wang S: FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption. BMC Med Inform Decis Mak. 2015, (accepted)"},{"key":"926_CR29","volume-title":"Cryptology ePrint Archive, Report 2011\/535","author":"I Damgard","year":"2011","unstructured":"Damgard I, Pastro V, Smart NP, Zakarias S: Multiparty Computation from Somewhat Homomorphic Encryption. Cryptology ePrint Archive, Report 2011\/535. 2011, [ http:\/\/eprint.iacr.org\/ ]"},{"key":"926_CR30","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/383962.384047","volume-title":"Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing ACM","author":"R Canetti","year":"2001","unstructured":"Canetti R, Ishai Y, Kumar R, Reiter MK, Rubinfeld R, Wright RN: Selective private function evaluation with applications to private statistics. Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing ACM. 2001, 293-304."},{"key":"926_CR31","first-page":"17","volume-title":"Proceedings of The IfipTc 11 23rd International Information Security Conference, Springer","author":"F Kerschbaum","year":"2008","unstructured":"Kerschbaum F: Practical privacy-preserving benchmarking. Proceedings of The IfipTc 11 23rd International Information Security Conference, Springer. 2008, 17-31."},{"issue":"9","key":"926_CR32","doi-asserted-by":"publisher","first-page":"2424","DOI":"10.1109\/TKDE.2015.2407330","volume":"27","author":"Y Tang","year":"2015","unstructured":"Tang Y, Liu L: Privacy-preserving multi-keyword search in information networks. IEEE Trans. Knowl. Data Eng. 2015, 27 (9): 2424-2437. doi:10.1109\/TKDE.2015.2407330","journal-title":"IEEE Trans. Knowl. Data Eng"},{"key":"926_CR33","first-page":"186","volume-title":"IEEE 34th International Conference on Distributed Computing Systems, ICDCS","author":"Y Tang","year":"2014","unstructured":"Tang Y, Liu L, Iyengar A, Lee K, Zhang Q: e-ppi: Locator service in information networks with personalized privacy preservation. IEEE 34th International Conference on Distributed Computing Systems, ICDCS. 2014, 186-197. doi:10.1109\/ICDCS.2014.27"},{"key":"926_CR34","first-page":"905","volume-title":"CIKM","author":"Y Tang","year":"2011","unstructured":"Tang Y, Wang T, Liu L: Privacy preserving indexing for ehealth information networks. CIKM. 2011, 905-914."},{"key":"926_CR35","volume-title":"Translational Bioinformatics Conference","author":"H Shi","year":"2015","unstructured":"Shi H, Wang S, Dai W, Tang Y, Jiang X, Ohno-Machado L: Secure Multi-pArty Computation Grid LOgistic REgression (SMAC-GLORE). Translational Bioinformatics Conference. 2015, (accepted)"},{"key":"926_CR36","volume-title":"Springer","author":"D Bogdanov","year":"2014","unstructured":"Bogdanov D, Kamm L, Laur S, Pruulmann-Vengerfeldt P, Talviste R, Willemson J: Privacy-preserving Statistical Data Analysis on Federated Databases. Springer. 2014"},{"issue":"7","key":"926_CR37","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1093\/bioinformatics\/btt066","volume":"29","author":"L Kamm","year":"2013","unstructured":"Kamm L, Bogdanov D, Laur S, Vilo J: A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics. 2013, 29 (7): 886-893.","journal-title":"Bioinformatics"},{"key":"926_CR38","first-page":"561","volume-title":"Bioinformatics","author":"W Xie","year":"2014","unstructured":"Xie W, Kantarcioglu M, Bush WS, Crawford D, Denny JC, Heatherly R, Malin BA: Securema: protecting participant privacy in genetic association meta-analysis. Bioinformatics. 2014, 561-"},{"key":"926_CR39","volume-title":"Springer","author":"SE Fienberg","year":"2009","unstructured":"Fienberg SE, Nardi Y, Slavkovi\u0107 AB: Valid Statistical Analysis for Logistic Regression with Multiple Sources. Springer. 2009"},{"issue":"5","key":"926_CR40","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2002, 10 (5): 557-570.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"926_CR41","unstructured":"Privacy and progress in whole genome sequencing. Presidential Commission."},{"key":"926_CR42","volume-title":"Identifying participants in the personal genome project by name","author":"L Sweeney","year":"2013","unstructured":"Sweeney L, Abu A, Winn J: Identifying participants in the personal genome project by name. 2013, Available at SSRN 2257732"},{"key":"926_CR43","first-page":"262","volume-title":"AMIA Summits on Translational Science Proceedings","author":"J Vaidya","year":"2013","unstructured":"Vaidya J, Shafiq B, Jiang X, Ohno-Machado L: Identifying inference attacks against healthcare data repositories. AMIA Summits on Translational Science Proceedings. 2013, 262-"},{"issue":"6","key":"926_CR44","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1038\/nrg3723","volume":"15","author":"Y Erlich","year":"2014","unstructured":"Erlich Y, Narayanan A: Routes for breaching and protecting genetic privacy. Nature Reviews Genetics. 2014, 15 (6): 409-421.","journal-title":"Nature Reviews Genetics"},{"issue":"6117","key":"926_CR45","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y: Identifying personal genomes by surname inference. Science. 2013, 339 (6117): 321-324.","journal-title":"Science"},{"issue":"8","key":"926_CR46","doi-asserted-by":"publisher","first-page":"1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"N Homer","year":"2008","unstructured":"Homer N, Szelinger S, Redman M, Duggan D, Tembe W, Muehling J, Pearson JV, Stephan DA, Nelson SF, Craig DW: Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLoS genetics. 2008, 4 (8): 1000167-","journal-title":"PLoS genetics"},{"key":"926_CR47","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1145\/1653662.1653726","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM","author":"R Wang","year":"2009","unstructured":"Wang R, Li YF, Wang X, Tang H, Zhou X: Learning your identity and disease from research papers: information leaks in genome wide association study. Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM. 2009, 534-544."},{"key":"926_CR48","unstructured":"Parabon Snapshot: DNA Phenotyping, Ancestry and Kinship Analysis. Available at http:\/\/snapshot.parabon-nanolabs.com , visited on March 2, 2015"},{"issue":"1","key":"926_CR49","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.ajhg.2011.11.029","volume":"90","author":"PM Visscher","year":"2012","unstructured":"Visscher PM, Brown MA, McCarthy MI, Yang J: Five years of GWAS discovery. The American Journal of Human Genetics. 2012, 90 (1): 7-24.","journal-title":"The American Journal of Human Genetics"},{"key":"926_CR50","unstructured":"Snyder P: Yao's garbled circuits: Recent directions and implementations."},{"key":"926_CR51","unstructured":"iDASH Privacy AND Security Workshop. 2015, visited on March 3, 2015, [ http:\/\/www.humangenomeprivacy.org ]"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-15-S5-S2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1472-6947-15-S5-S2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-15-S5-S2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T03:59:07Z","timestamp":1653883147000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/1472-6947-15-S5-S2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":51,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["926"],"URL":"https:\/\/doi.org\/10.1186\/1472-6947-15-s5-s2","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"21 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"S2"}}