Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services

Background Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical in...

Full description

Saved in:
Bibliographic Details
Published inBMC medical genomics Vol. 10; no. Suppl 2; pp. 39 - 100
Main Authors Wan, Zhiyu, Vorobeychik, Yevgeniy, Kantarcioglu, Murat, Malin, Bradley
Format Journal Article
LanguageEnglish
Published London BioMed Central 26.07.2017
BioMed Central Ltd
BMC
Subjects
Online AccessGet full text
ISSN1755-8794
1755-8794
DOI10.1186/s12920-017-0282-1

Cover

Abstract Background Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical inference methods, can be applied to discern the presence of a known individual’s DNA sequence in the pool of subjects. Recently, it was shown that the Beacon Project of the Global Alliance for Genomics and Health, a web service for querying about the presence (or absence) of a specific allele, was vulnerable. The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track. Methods This paper describes our computational method to optimize the tradeoff between the utility and the privacy of the Beacon service. We generalize the genomic data sharing problem beyond that which was introduced in the iDASH Challenge to be more representative of real world scenarios to allow for a more comprehensive evaluation. We then conduct a sensitivity analysis of our method with respect to several state-of-the-art methods using a dataset of 400,000 positions in Chromosome 10 for 500 individuals from Phase 3 of the 1000 Genomes Project. All methods are evaluated for utility, privacy and efficiency. Results Our method achieves better performance than all state-of-the-art methods, irrespective of how key factors (e.g., the allele frequency in the population, the size of the pool and utility weights) change from the original parameters of the problem. We further illustrate that it is possible for our method to exhibit subpar performance under special cases of allele query sequences. However, we show our method can be extended to address this issue when the query sequence is fixed and known a priori to the data custodian, so that they may plan stage their responses accordingly. Conclusions This research shows that it is possible to thwart the attack on Beacon services, without substantially altering the utility of the system, using computational methods. The method we initially developed is limited by the design of the scenario and evaluation protocol for the iDASH Challenge; however, it can be improved by allowing the data custodian to act in a staged manner.
AbstractList Abstract Background Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical inference methods, can be applied to discern the presence of a known individual’s DNA sequence in the pool of subjects. Recently, it was shown that the Beacon Project of the Global Alliance for Genomics and Health, a web service for querying about the presence (or absence) of a specific allele, was vulnerable. The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track. Methods This paper describes our computational method to optimize the tradeoff between the utility and the privacy of the Beacon service. We generalize the genomic data sharing problem beyond that which was introduced in the iDASH Challenge to be more representative of real world scenarios to allow for a more comprehensive evaluation. We then conduct a sensitivity analysis of our method with respect to several state-of-the-art methods using a dataset of 400,000 positions in Chromosome 10 for 500 individuals from Phase 3 of the 1000 Genomes Project. All methods are evaluated for utility, privacy and efficiency. Results Our method achieves better performance than all state-of-the-art methods, irrespective of how key factors (e.g., the allele frequency in the population, the size of the pool and utility weights) change from the original parameters of the problem. We further illustrate that it is possible for our method to exhibit subpar performance under special cases of allele query sequences. However, we show our method can be extended to address this issue when the query sequence is fixed and known a priori to the data custodian, so that they may plan stage their responses accordingly. Conclusions This research shows that it is possible to thwart the attack on Beacon services, without substantially altering the utility of the system, using computational methods. The method we initially developed is limited by the design of the scenario and evaluation protocol for the iDASH Challenge; however, it can be improved by allowing the data custodian to act in a staged manner.
Background Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical inference methods, can be applied to discern the presence of a known individual's DNA sequence in the pool of subjects. Recently, it was shown that the Beacon Project of the Global Alliance for Genomics and Health, a web service for querying about the presence (or absence) of a specific allele, was vulnerable. The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track. Methods This paper describes our computational method to optimize the tradeoff between the utility and the privacy of the Beacon service. We generalize the genomic data sharing problem beyond that which was introduced in the iDASH Challenge to be more representative of real world scenarios to allow for a more comprehensive evaluation. We then conduct a sensitivity analysis of our method with respect to several state-of-the-art methods using a dataset of 400,000 positions in Chromosome 10 for 500 individuals from Phase 3 of the 1000 Genomes Project. All methods are evaluated for utility, privacy and efficiency. Results Our method achieves better performance than all state-of-the-art methods, irrespective of how key factors (e.g., the allele frequency in the population, the size of the pool and utility weights) change from the original parameters of the problem. We further illustrate that it is possible for our method to exhibit subpar performance under special cases of allele query sequences. However, we show our method can be extended to address this issue when the query sequence is fixed and known a priori to the data custodian, so that they may plan stage their responses accordingly. Conclusions This research shows that it is possible to thwart the attack on Beacon services, without substantially altering the utility of the system, using computational methods. The method we initially developed is limited by the design of the scenario and evaluation protocol for the iDASH Challenge; however, it can be improved by allowing the data custodian to act in a staged manner. Keywords: Genomic databases, Beacon service, Data sharing, Privacy, Perturbation, iDASH challenge
Background Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical inference methods, can be applied to discern the presence of a known individual’s DNA sequence in the pool of subjects. Recently, it was shown that the Beacon Project of the Global Alliance for Genomics and Health, a web service for querying about the presence (or absence) of a specific allele, was vulnerable. The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track. Methods This paper describes our computational method to optimize the tradeoff between the utility and the privacy of the Beacon service. We generalize the genomic data sharing problem beyond that which was introduced in the iDASH Challenge to be more representative of real world scenarios to allow for a more comprehensive evaluation. We then conduct a sensitivity analysis of our method with respect to several state-of-the-art methods using a dataset of 400,000 positions in Chromosome 10 for 500 individuals from Phase 3 of the 1000 Genomes Project. All methods are evaluated for utility, privacy and efficiency. Results Our method achieves better performance than all state-of-the-art methods, irrespective of how key factors (e.g., the allele frequency in the population, the size of the pool and utility weights) change from the original parameters of the problem. We further illustrate that it is possible for our method to exhibit subpar performance under special cases of allele query sequences. However, we show our method can be extended to address this issue when the query sequence is fixed and known a priori to the data custodian, so that they may plan stage their responses accordingly. Conclusions This research shows that it is possible to thwart the attack on Beacon services, without substantially altering the utility of the system, using computational methods. The method we initially developed is limited by the design of the scenario and evaluation protocol for the iDASH Challenge; however, it can be improved by allowing the data custodian to act in a staged manner.
Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical inference methods, can be applied to discern the presence of a known individual's DNA sequence in the pool of subjects. Recently, it was shown that the Beacon Project of the Global Alliance for Genomics and Health, a web service for querying about the presence (or absence) of a specific allele, was vulnerable. The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track.BACKGROUNDGenomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical inference methods, can be applied to discern the presence of a known individual's DNA sequence in the pool of subjects. Recently, it was shown that the Beacon Project of the Global Alliance for Genomics and Health, a web service for querying about the presence (or absence) of a specific allele, was vulnerable. The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track.This paper describes our computational method to optimize the tradeoff between the utility and the privacy of the Beacon service. We generalize the genomic data sharing problem beyond that which was introduced in the iDASH Challenge to be more representative of real world scenarios to allow for a more comprehensive evaluation. We then conduct a sensitivity analysis of our method with respect to several state-of-the-art methods using a dataset of 400,000 positions in Chromosome 10 for 500 individuals from Phase 3 of the 1000 Genomes Project. All methods are evaluated for utility, privacy and efficiency.METHODSThis paper describes our computational method to optimize the tradeoff between the utility and the privacy of the Beacon service. We generalize the genomic data sharing problem beyond that which was introduced in the iDASH Challenge to be more representative of real world scenarios to allow for a more comprehensive evaluation. We then conduct a sensitivity analysis of our method with respect to several state-of-the-art methods using a dataset of 400,000 positions in Chromosome 10 for 500 individuals from Phase 3 of the 1000 Genomes Project. All methods are evaluated for utility, privacy and efficiency.Our method achieves better performance than all state-of-the-art methods, irrespective of how key factors (e.g., the allele frequency in the population, the size of the pool and utility weights) change from the original parameters of the problem. We further illustrate that it is possible for our method to exhibit subpar performance under special cases of allele query sequences. However, we show our method can be extended to address this issue when the query sequence is fixed and known a priori to the data custodian, so that they may plan stage their responses accordingly.RESULTSOur method achieves better performance than all state-of-the-art methods, irrespective of how key factors (e.g., the allele frequency in the population, the size of the pool and utility weights) change from the original parameters of the problem. We further illustrate that it is possible for our method to exhibit subpar performance under special cases of allele query sequences. However, we show our method can be extended to address this issue when the query sequence is fixed and known a priori to the data custodian, so that they may plan stage their responses accordingly.This research shows that it is possible to thwart the attack on Beacon services, without substantially altering the utility of the system, using computational methods. The method we initially developed is limited by the design of the scenario and evaluation protocol for the iDASH Challenge; however, it can be improved by allowing the data custodian to act in a staged manner.CONCLUSIONSThis research shows that it is possible to thwart the attack on Beacon services, without substantially altering the utility of the system, using computational methods. The method we initially developed is limited by the design of the scenario and evaluation protocol for the iDASH Challenge; however, it can be improved by allowing the data custodian to act in a staged manner.
Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical inference methods, can be applied to discern the presence of a known individual's DNA sequence in the pool of subjects. Recently, it was shown that the Beacon Project of the Global Alliance for Genomics and Health, a web service for querying about the presence (or absence) of a specific allele, was vulnerable. The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track. This paper describes our computational method to optimize the tradeoff between the utility and the privacy of the Beacon service. We generalize the genomic data sharing problem beyond that which was introduced in the iDASH Challenge to be more representative of real world scenarios to allow for a more comprehensive evaluation. We then conduct a sensitivity analysis of our method with respect to several state-of-the-art methods using a dataset of 400,000 positions in Chromosome 10 for 500 individuals from Phase 3 of the 1000 Genomes Project. All methods are evaluated for utility, privacy and efficiency. Our method achieves better performance than all state-of-the-art methods, irrespective of how key factors (e.g., the allele frequency in the population, the size of the pool and utility weights) change from the original parameters of the problem. We further illustrate that it is possible for our method to exhibit subpar performance under special cases of allele query sequences. However, we show our method can be extended to address this issue when the query sequence is fixed and known a priori to the data custodian, so that they may plan stage their responses accordingly. This research shows that it is possible to thwart the attack on Beacon services, without substantially altering the utility of the system, using computational methods. The method we initially developed is limited by the design of the scenario and evaluation protocol for the iDASH Challenge; however, it can be improved by allowing the data custodian to act in a staged manner.
Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical inference methods, can be applied to discern the presence of a known individual's DNA sequence in the pool of subjects. Recently, it was shown that the Beacon Project of the Global Alliance for Genomics and Health, a web service for querying about the presence (or absence) of a specific allele, was vulnerable. The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track. This paper describes our computational method to optimize the tradeoff between the utility and the privacy of the Beacon service. We generalize the genomic data sharing problem beyond that which was introduced in the iDASH Challenge to be more representative of real world scenarios to allow for a more comprehensive evaluation. We then conduct a sensitivity analysis of our method with respect to several state-of-the-art methods using a dataset of 400,000 positions in Chromosome 10 for 500 individuals from Phase 3 of the 1000 Genomes Project. All methods are evaluated for utility, privacy and efficiency. Our method achieves better performance than all state-of-the-art methods, irrespective of how key factors (e.g., the allele frequency in the population, the size of the pool and utility weights) change from the original parameters of the problem. We further illustrate that it is possible for our method to exhibit subpar performance under special cases of allele query sequences. However, we show our method can be extended to address this issue when the query sequence is fixed and known a priori to the data custodian, so that they may plan stage their responses accordingly. This research shows that it is possible to thwart the attack on Beacon services, without substantially altering the utility of the system, using computational methods. The method we initially developed is limited by the design of the scenario and evaluation protocol for the iDASH Challenge; however, it can be improved by allowing the data custodian to act in a staged manner.
Background Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections available more widely. However, over the past decade, a series of investigations have shown that attacks, rooted in statistical inference methods, can be applied to discern the presence of a known individual’s DNA sequence in the pool of subjects. Recently, it was shown that the Beacon Project of the Global Alliance for Genomics and Health, a web service for querying about the presence (or absence) of a specific allele, was vulnerable. The Integrating Data for Analysis, Anonymization, and Sharing (iDASH) Center modeled a track in their third Privacy Protection Challenge on how to mitigate the Beacon vulnerability. We developed the winning solution for this track. Methods This paper describes our computational method to optimize the tradeoff between the utility and the privacy of the Beacon service. We generalize the genomic data sharing problem beyond that which was introduced in the iDASH Challenge to be more representative of real world scenarios to allow for a more comprehensive evaluation. We then conduct a sensitivity analysis of our method with respect to several state-of-the-art methods using a dataset of 400,000 positions in Chromosome 10 for 500 individuals from Phase 3 of the 1000 Genomes Project. All methods are evaluated for utility, privacy and efficiency. Results Our method achieves better performance than all state-of-the-art methods, irrespective of how key factors (e.g., the allele frequency in the population, the size of the pool and utility weights) change from the original parameters of the problem. We further illustrate that it is possible for our method to exhibit subpar performance under special cases of allele query sequences. However, we show our method can be extended to address this issue when the query sequence is fixed and known a priori to the data custodian, so that they may plan stage their responses accordingly. Conclusions This research shows that it is possible to thwart the attack on Beacon services, without substantially altering the utility of the system, using computational methods. The method we initially developed is limited by the design of the scenario and evaluation protocol for the iDASH Challenge; however, it can be improved by allowing the data custodian to act in a staged manner.
ArticleNumber 39
Audience Academic
Author Wan, Zhiyu
Kantarcioglu, Murat
Vorobeychik, Yevgeniy
Malin, Bradley
Author_xml – sequence: 1
  givenname: Zhiyu
  surname: Wan
  fullname: Wan, Zhiyu
  email: zhiyu.wan@vanderbilt.edu
  organization: Department of Electrical Engineering and Computer Science, Vanderbilt University
– sequence: 2
  givenname: Yevgeniy
  surname: Vorobeychik
  fullname: Vorobeychik, Yevgeniy
  organization: Department of Electrical Engineering and Computer Science, Vanderbilt University, Department of Biomedical Informatics, Vanderbilt University
– sequence: 3
  givenname: Murat
  surname: Kantarcioglu
  fullname: Kantarcioglu, Murat
  organization: Department of Computer Science, University of Texas at Dallas
– sequence: 4
  givenname: Bradley
  surname: Malin
  fullname: Malin, Bradley
  organization: Department of Electrical Engineering and Computer Science, Vanderbilt University, Department of Biomedical Informatics, Vanderbilt University, Department of Biostatistics, Vanderbilt University
BackLink https://www.ncbi.nlm.nih.gov/pubmed/28786360$$D View this record in MEDLINE/PubMed
BookMark eNp9kl9v0zAUxSM0xP7AB-AFReKFPWTYcRw7PEwa1YBKk0Cwd-vGdlJXaVzspGLfntumQ-0EyA-2bn7n5Pr6nCcnve9tkrym5IpSWb6PNK9ykhEqMpLLPKPPkjMqOM-kqIqTg_Npch7jkpCS8Iq-SE5zKWTJSnKWmJnvh-C7zvVtOixsGl3bQ_ch_RZAD05Dl66D24B-wN0PFmu-T32Ttrb3K6dTAwOkcQFhMgh-bBfpRwsasWjDxmkbXybPG-iifbXfL5L7T7f3sy_Z3dfP89nNXaZLJoaMgtGWmZIaWgFQLqQBRoBLYxhvqgaglkBlUxlTCykaWtNGS1ZXoiGF0OwimU-2xsNSYdsrCA_Kg1O7gg-tgoB36qyqqQBU1dbYvGB1XjOwIAsr6tpyKAx6XU9e67FeWewLpwTdkenxl94tVOs3ivNCFAVHg3d7g-B_jjYOauWitl0HvfVjVLTKBcO2OUH07RN06ceAr7CjOBMV2xnuqRbwAq5vPP5Xb03VTVFVjOeUCKSu_kLhMhZfC-PTOKwfCS6PBMgM9tfQwhijmv_4fsy-ORzKn2k8xgkBMQE6-BiDbZR2A2wjg124TlGitsFVU3AVBldtg6soKukT5aP5_zT5pInrbfpsOJjbP0W_AbBqAC0
CitedBy_id crossref_primary_10_1093_bioinformatics_btab305
crossref_primary_10_2139_ssrn_3157968
crossref_primary_10_1093_bib_bbx139
crossref_primary_10_1093_jamia_ocac165
crossref_primary_10_1109_ACCESS_2019_2947261
crossref_primary_10_1126_sciadv_abe9986
crossref_primary_10_1038_s41576_022_00455_y
crossref_primary_10_1080_23294515_2020_1818875
crossref_primary_10_1055_s_0041_1740630
crossref_primary_10_1016_j_jmoldx_2018_07_009
crossref_primary_10_1038_s41525_017_0036_1
crossref_primary_10_2196_22769
crossref_primary_10_1093_bib_bbz013
Cites_doi 10.1126/science.1165490
10.1186/gm527
10.1038/ng1007-1181
10.1038/nature15816
10.1038/nature15393
10.1038/nrg3067
10.1016/j.ajhg.2009.10.002
10.1126/science.1229566
10.1038/gim.2013.72
10.1016/j.atg.2016.01.001
10.1016/j.ajhg.2015.09.010
10.1056/NEJMp1500523
10.1038/ejhg.2015.118
10.1016/j.cell.2013.09.006
10.1145/1653662.1653726
10.1002/humu.23022
10.1109/FOCS.2015.46
10.1016/j.ajhg.2016.12.002
10.1093/jamia/ocw167
10.1038/nrg3463
10.1371/journal.pbio.1002195
10.1038/gim.2016.196
10.1038/ng.436
10.1186/gm530
10.1038/nature09764
10.1038/nrg3555
10.1080/15265160802478404
10.1371/journal.pgen.1000167
10.1038/nature06258
10.1001/jamainternmed.2013.12048
ContentType Journal Article
Copyright The Author(s). 2017
COPYRIGHT 2017 BioMed Central Ltd.
Copyright BioMed Central 2017
Copyright_xml – notice: The Author(s). 2017
– notice: COPYRIGHT 2017 BioMed Central Ltd.
– notice: Copyright BioMed Central 2017
DBID C6C
AAYXX
CITATION
NPM
ISR
3V.
7X7
7XB
88E
8AO
8FD
8FE
8FH
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BBNVY
BENPR
BHPHI
CCPQU
DWQXO
FR3
FYUFA
GHDGH
GNUQQ
HCIFZ
K9.
LK8
M0S
M1P
M7P
P64
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
RC3
7X8
5PM
DOA
DOI 10.1186/s12920-017-0282-1
DatabaseName Springer Nature OA Free Journals
CrossRef
PubMed
Science in Context
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Natural Science Collection
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
Biological Science Database
ProQuest Central
ProQuest Natural Science Collection
ProQuest One Community College
ProQuest Central Korea
Engineering Research Database
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Central Student
SciTech Premium Collection
ProQuest Health & Medical Complete (Alumni)
ProQuest Biological Science Collection
Health & Medical Collection (Alumni Edition)
PML(ProQuest Medical Library)
Biological Science Database
Biotechnology and BioEngineering Abstracts
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Genetics Abstracts
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest Central Student
Technology Research Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Natural Science Collection
ProQuest Pharma Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Health & Medical Research Collection
Genetics Abstracts
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
Natural Science Collection
ProQuest Central Korea
Health & Medical Research Collection
Biological Science Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest Biological Science Collection
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
Biological Science Database
ProQuest SciTech Collection
ProQuest Hospital Collection (Alumni)
Biotechnology and BioEngineering Abstracts
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
Engineering Research Database
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList

Publicly Available Content Database
MEDLINE - Academic

PubMed


Database_xml – sequence: 1
  dbid: C6C
  name: Springer Nature OA Free Journals
  url: http://www.springeropen.com/
  sourceTypes: Publisher
– sequence: 2
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 3
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 4
  dbid: BENPR
  name: ProQuest Central
  url: http://www.proquest.com/pqcentral?accountid=15518
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
EISSN 1755-8794
EndPage 100
ExternalDocumentID oai_doaj_org_article_b17a7f0bede243b2b3aea84e7bbe5a4d
PMC5547445
A499352107
28786360
10_1186_s12920_017_0282_1
Genre Journal Article
GrantInformation_xml – fundername: NHGRI NIH HHS
  grantid: R01 HG006844
– fundername: NHGRI NIH HHS
  grantid: RM1 HG009034
GroupedDBID ---
0R~
23N
2WC
53G
5GY
5VS
6J9
7X7
88E
8AO
8FE
8FH
8FI
8FJ
AAFWJ
AAJSJ
AASML
ABDBF
ABUWG
ACGFO
ACGFS
ACIHN
ACMJI
ACPRK
ACUHS
ADBBV
ADRAZ
ADUKV
AEAQA
AENEX
AFKRA
AFPKN
AHBYD
AHMBA
AHYZX
ALMA_UNASSIGNED_HOLDINGS
AMKLP
AMTXH
AOIJS
BAPOH
BAWUL
BBNVY
BCNDV
BENPR
BFQNJ
BHPHI
BMC
BPHCQ
BVXVI
C6C
CCPQU
CS3
DIK
DU5
E3Z
EBD
EBLON
EBS
EJD
EMOBN
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
H13
HCIFZ
HMCUK
HYE
IAO
IHR
INH
INR
ISR
ITC
KQ8
LK8
M1P
M48
M7P
M~E
O5R
O5S
OK1
OVT
P2P
PGMZT
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQGLB
PQQKQ
PROAC
PSQYO
PUEGO
RBZ
RNS
ROL
RPM
RSV
SBL
SOJ
SV3
TR2
TUS
UKHRP
W2D
~8M
AAYXX
ALIPV
CITATION
-A0
3V.
ACRMQ
ADINQ
C24
NPM
PMFND
7XB
8FD
8FK
AHSBF
AZQEC
DWQXO
FR3
GNUQQ
K9.
P64
PKEHL
PQEST
PQUKI
PRINS
RC3
7X8
5PM
ID FETCH-LOGICAL-c637t-1adce3d61d19aa1578da30a58dd35f9faab8a18f9ddb787f1b1fc83b97f047c3
IEDL.DBID M48
ISSN 1755-8794
IngestDate Wed Aug 27 01:30:18 EDT 2025
Thu Aug 21 17:21:11 EDT 2025
Thu Sep 04 22:56:10 EDT 2025
Fri Jul 25 19:23:44 EDT 2025
Tue Jun 17 21:21:22 EDT 2025
Tue Jun 10 20:42:38 EDT 2025
Fri Jun 27 03:37:51 EDT 2025
Wed Feb 19 02:43:28 EST 2025
Tue Jul 01 02:55:33 EDT 2025
Thu Apr 24 23:01:36 EDT 2025
Sat Sep 06 07:29:03 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue Suppl 2
Keywords Beacon service
Privacy
Genomic databases
Perturbation
Data sharing
iDASH challenge
Language English
License Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c637t-1adce3d61d19aa1578da30a58dd35f9faab8a18f9ddb787f1b1fc83b97f047c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
OpenAccessLink https://doi.org/10.1186/s12920-017-0282-1
PMID 28786360
PQID 1925379345
PQPubID 55237
PageCount 14
ParticipantIDs doaj_primary_oai_doaj_org_article_b17a7f0bede243b2b3aea84e7bbe5a4d
pubmedcentral_primary_oai_pubmedcentral_nih_gov_5547445
proquest_miscellaneous_1927304750
proquest_journals_1925379345
gale_infotracmisc_A499352107
gale_infotracacademiconefile_A499352107
gale_incontextgauss_ISR_A499352107
pubmed_primary_28786360
crossref_citationtrail_10_1186_s12920_017_0282_1
crossref_primary_10_1186_s12920_017_0282_1
springer_journals_10_1186_s12920_017_0282_1
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20170726
PublicationDateYYYYMMDD 2017-07-26
PublicationDate_xml – month: 7
  year: 2017
  text: 20170726
  day: 26
PublicationDecade 2010
PublicationPlace London
PublicationPlace_xml – name: London
– name: England
PublicationSubtitle BMC series – open, inclusive and trusted
PublicationTitle BMC medical genomics
PublicationTitleAbbrev BMC Med Genomics
PublicationTitleAlternate BMC Med Genomics
PublicationYear 2017
Publisher BioMed Central
BioMed Central Ltd
BMC
Publisher_xml – name: BioMed Central
– name: BioMed Central Ltd
– name: BMC
References SC Hull (282_CR15) 2008; 8
282_CR31
282_CR32
282_CR11
ZD Stephens (282_CR1) 2015; 13
KM Boycott (282_CR9) 2013; 14
EA Zerhouni (282_CR22) 2008; 322
ED Green (282_CR5) 2011; 470
M Gymrek (282_CR26) 2013; 339
M Torres-Espanol (282_CR29) 2016; 37
HL Rehm (282_CR3) 2013; 14
SC Sanderson (282_CR14) 2016; 24
S Sankararaman (282_CR23) 2009; 41
EC Hayden (282_CR12) 2013; 498
KA Frazer (282_CR19) 2007; 449
Z Wan (282_CR33) 2017; 100
O Gottesman (282_CR6) 2013; 15
282_CR24
MD Mailman (282_CR17) 2007; 39
282_CR27
282_CR21
N Homer (282_CR18) 2008; 4
DJ Kaufman (282_CR16) 2009; 85
DC Kobalt (282_CR10) 2013; 155
F Collins (282_CR7) 2015; 372
AM Philips (282_CR2) 2016; 8
SJ Aronson (282_CR8) 2015; 526
A Auton (282_CR20) 2015; 526
D Craig (282_CR25) 2011; 12
MP Ball (282_CR13) 2014; 6
SS Shringarpure (282_CR30) 2015; 97
KAJ Taber (282_CR4) 2014; 174
B Knoppers (282_CR28) 2014; 6
19878915 - Am J Hum Genet. 2009 Nov;85(5):643-54
19003716 - Am J Bioeth. 2008 Oct;8(10):62-70
26432245 - Nature. 2015 Oct 1;526(7571):68-74
21307933 - Nature. 2011 Feb 10;470(7333):204-13
28065469 - Am J Hum Genet. 2017 Feb 2;100(2):316-322
19701190 - Nat Genet. 2009 Sep;41(9):965-7
17898773 - Nat Genet. 2007 Oct;39(10):1181-6
21921928 - Nat Rev Genet. 2011 Sep 16;12 (10 ):730-6
23478348 - Nat Rev Genet. 2013 Apr;14 (4):295-300
17943122 - Nature. 2007 Oct 18;449(7164):851-61
24217348 - JAMA Intern Med. 2014 Feb 1;174(2):275-80
26469044 - Nature. 2015 Oct 15;526(7573):336-42
23999272 - Nat Rev Genet. 2013 Oct;14(10):681-91
18769715 - PLoS Genet. 2008 Aug 29;4(8):e1000167
28339683 - J Am Med Inform Assoc. 2017 Feb 20;:null
23739403 - Nature. 2013 Jun 6;498(7452):16-7
23743551 - Genet Med. 2013 Oct;15(10):761-71
24713084 - Genome Med. 2014 Feb 28;6(2):10
26036856 - Eur J Hum Genet. 2016 Jan;24(1):14-20
24074859 - Cell. 2013 Sep 26;155(1):27-38
18772394 - Science. 2008 Oct 3;322(5898):44
27363592 - Hum Mutat. 2016 Oct;37(10):1106-9
26522470 - Am J Hum Genet. 2015 Nov 5;97(5):631-46
25031613 - Genome Med. 2014 Feb 27;6(2):13
26151137 - PLoS Biol. 2015 Jul 07;13(7):e1002195
23329047 - Science. 2013 Jan 18;339(6117):321-4
25635347 - N Engl J Med. 2015 Feb 26;372(9):793-5
27047755 - Appl Transl Genom. 2016 Feb 02;8:16-22
28055021 - Genet Med. 2017 Jul;19(7):721-722
References_xml – volume: 322
  start-page: 44
  year: 2008
  ident: 282_CR22
  publication-title: Science
  doi: 10.1126/science.1165490
– volume: 6
  start-page: 10
  year: 2014
  ident: 282_CR13
  publication-title: Genome Med
  doi: 10.1186/gm527
– volume: 39
  start-page: 1181
  year: 2007
  ident: 282_CR17
  publication-title: Nat Genet
  doi: 10.1038/ng1007-1181
– volume: 526
  start-page: 336
  year: 2015
  ident: 282_CR8
  publication-title: Nature
  doi: 10.1038/nature15816
– volume: 526
  start-page: 68
  year: 2015
  ident: 282_CR20
  publication-title: Nature
  doi: 10.1038/nature15393
– volume: 12
  start-page: 730
  year: 2011
  ident: 282_CR25
  publication-title: Nat Rev Genet
  doi: 10.1038/nrg3067
– volume: 85
  start-page: 643
  issue: 5
  year: 2009
  ident: 282_CR16
  publication-title: Am J Hum Genet
  doi: 10.1016/j.ajhg.2009.10.002
– volume: 339
  start-page: 321
  issue: 6117
  year: 2013
  ident: 282_CR26
  publication-title: Science
  doi: 10.1126/science.1229566
– volume: 15
  start-page: 761
  year: 2013
  ident: 282_CR6
  publication-title: Genet Med
  doi: 10.1038/gim.2013.72
– volume: 8
  start-page: 16
  year: 2016
  ident: 282_CR2
  publication-title: Appl Transl Genomics
  doi: 10.1016/j.atg.2016.01.001
– volume: 97
  start-page: 631
  year: 2015
  ident: 282_CR30
  publication-title: Am J Hum Genet
  doi: 10.1016/j.ajhg.2015.09.010
– ident: 282_CR21
– volume: 372
  start-page: 793
  year: 2015
  ident: 282_CR7
  publication-title: N Engl J Med
  doi: 10.1056/NEJMp1500523
– volume: 24
  start-page: 14
  year: 2016
  ident: 282_CR14
  publication-title: Eur J Hum Genet
  doi: 10.1038/ejhg.2015.118
– volume: 155
  start-page: 27
  issue: 1
  year: 2013
  ident: 282_CR10
  publication-title: Cell
  doi: 10.1016/j.cell.2013.09.006
– ident: 282_CR24
  doi: 10.1145/1653662.1653726
– volume: 37
  start-page: 1106
  issue: 1
  year: 2016
  ident: 282_CR29
  publication-title: Hum Mutat
  doi: 10.1002/humu.23022
– volume: 498
  start-page: 16
  issue: 7452
  year: 2013
  ident: 282_CR12
  publication-title: Nature
– ident: 282_CR27
  doi: 10.1109/FOCS.2015.46
– volume: 100
  start-page: 316
  issue: 2
  year: 2017
  ident: 282_CR33
  publication-title: Am J Hum Genet
  doi: 10.1016/j.ajhg.2016.12.002
– ident: 282_CR32
  doi: 10.1093/jamia/ocw167
– volume: 14
  start-page: 295
  year: 2013
  ident: 282_CR3
  publication-title: Nat Rev Genet
  doi: 10.1038/nrg3463
– ident: 282_CR31
– volume: 13
  start-page: e1002195
  issue: 7
  year: 2015
  ident: 282_CR1
  publication-title: PLoS Biol
  doi: 10.1371/journal.pbio.1002195
– ident: 282_CR11
  doi: 10.1038/gim.2016.196
– volume: 41
  start-page: 965
  year: 2009
  ident: 282_CR23
  publication-title: Nat Genet
  doi: 10.1038/ng.436
– volume: 6
  start-page: 13
  issue: 2
  year: 2014
  ident: 282_CR28
  publication-title: Genome Med
  doi: 10.1186/gm530
– volume: 470
  start-page: 204
  year: 2011
  ident: 282_CR5
  publication-title: Nature
  doi: 10.1038/nature09764
– volume: 14
  start-page: 681
  year: 2013
  ident: 282_CR9
  publication-title: Nat Rev Genet
  doi: 10.1038/nrg3555
– volume: 8
  start-page: 62
  issue: 10
  year: 2008
  ident: 282_CR15
  publication-title: Am J Bioeth
  doi: 10.1080/15265160802478404
– volume: 4
  start-page: e1000167
  issue: 8
  year: 2008
  ident: 282_CR18
  publication-title: PLoS Genet
  doi: 10.1371/journal.pgen.1000167
– volume: 449
  start-page: 851
  issue: 7164
  year: 2007
  ident: 282_CR19
  publication-title: Nature
  doi: 10.1038/nature06258
– volume: 174
  start-page: 275
  issue: 2
  year: 2014
  ident: 282_CR4
  publication-title: JAMA Intern Med
  doi: 10.1001/jamainternmed.2013.12048
– reference: 25635347 - N Engl J Med. 2015 Feb 26;372(9):793-5
– reference: 24713084 - Genome Med. 2014 Feb 28;6(2):10
– reference: 27047755 - Appl Transl Genom. 2016 Feb 02;8:16-22
– reference: 26522470 - Am J Hum Genet. 2015 Nov 5;97(5):631-46
– reference: 21307933 - Nature. 2011 Feb 10;470(7333):204-13
– reference: 28065469 - Am J Hum Genet. 2017 Feb 2;100(2):316-322
– reference: 19878915 - Am J Hum Genet. 2009 Nov;85(5):643-54
– reference: 23478348 - Nat Rev Genet. 2013 Apr;14 (4):295-300
– reference: 19701190 - Nat Genet. 2009 Sep;41(9):965-7
– reference: 26469044 - Nature. 2015 Oct 15;526(7573):336-42
– reference: 25031613 - Genome Med. 2014 Feb 27;6(2):13
– reference: 19003716 - Am J Bioeth. 2008 Oct;8(10):62-70
– reference: 26036856 - Eur J Hum Genet. 2016 Jan;24(1):14-20
– reference: 28339683 - J Am Med Inform Assoc. 2017 Feb 20;:null
– reference: 23329047 - Science. 2013 Jan 18;339(6117):321-4
– reference: 23739403 - Nature. 2013 Jun 6;498(7452):16-7
– reference: 23999272 - Nat Rev Genet. 2013 Oct;14(10):681-91
– reference: 26432245 - Nature. 2015 Oct 1;526(7571):68-74
– reference: 26151137 - PLoS Biol. 2015 Jul 07;13(7):e1002195
– reference: 17898773 - Nat Genet. 2007 Oct;39(10):1181-6
– reference: 21921928 - Nat Rev Genet. 2011 Sep 16;12 (10 ):730-6
– reference: 23743551 - Genet Med. 2013 Oct;15(10):761-71
– reference: 27363592 - Hum Mutat. 2016 Oct;37(10):1106-9
– reference: 18772394 - Science. 2008 Oct 3;322(5898):44
– reference: 28055021 - Genet Med. 2017 Jul;19(7):721-722
– reference: 17943122 - Nature. 2007 Oct 18;449(7164):851-61
– reference: 24074859 - Cell. 2013 Sep 26;155(1):27-38
– reference: 18769715 - PLoS Genet. 2008 Aug 29;4(8):e1000167
– reference: 24217348 - JAMA Intern Med. 2014 Feb 1;174(2):275-80
SSID ssj0060591
Score 2.2652102
Snippet Background Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such...
Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such collections...
Background Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information about such...
Abstract Background Genomic data is increasingly collected by a wide array of organizations. As such, there is a growing demand to make summary information...
SourceID doaj
pubmedcentral
proquest
gale
pubmed
crossref
springer
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 39
SubjectTerms Alleles
Beacon service
Biomedical and Life Sciences
Biomedicine
Chromosome 10
Computer applications
Consortia
Custodians
Data collection
Data processing
Data sharing
Deoxyribonucleic acid
DNA
DNA sequencing
Gene Expression
Gene frequency
Genetic research
Genomes
Genomic databases
Genomics
Haplotypes
Human Genetics
iDASH challenge
Information management
Information sharing
Medical practice software
Microarrays
Nucleotide sequence
Perturbation
Population genetics
Privacy
Sensitivity analysis
Technology application
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NaxUxEA_Sg3gRv12tEkUQlKUvm2yy660tlirUg1boLUw2iS20-6T7XqH_vTObvMfbinoR9rSZ_ch8ZYZMfsPYGwzpIeBKWWqodKli9GUbjStrabyTUkjQdBr56Is-_K4-n9QnG62-qCYswQMnxu04YcDEmQs-VEq6ykkI0KhgnAs1KE_eF5exVTKVfDDG6K3Ie5ii0TuDoKZMJXlkyjFKMVmFRrD-313yxpp0s17yxqbpuBYd3GN3cxDJd9PP32e3Qv-A3T7K2-QPmd9PBeh01JxjhMepSgPOP_CEToRi4fjmK-iuecZpQOnweeSE2Hpx1nGqG-XDKVymF4ytfPgeec-eD9m7PGLHBx-P9w_L3E6h7LQ0i1IATkB6LbxoAQSaqgc5g7rxXtaxjQCuAdHE1nuHZhyFE7FrpGuR_cp08jHb6ud9eMo4GrLzHV61UlSf6jQJKLR10AGirAo2W3HXdhlqnDpenNsx5Wi0TQKxKBBLArGiYO_Wj_xMOBt_I94jka0JCSJ7vIGKY7Pi2H8pTsFek8AtgWD0VGXzA5bDYD99-2p3MQ3EwBQz44K9zURxjjPoIB9aQD4QbtaEcntCiVbaTYdXemWzlxgsRtdoE61UdcFerYfpSap868N8OdIY2hqtZwV7ktRwPW_MdhvCeyuYmSjohDHTkf7sdMQQxyjSKPru-5Uqb_zWn_j-7H_w_Tm7U42GaMpKb7OtxeUyvMDAbuFejjb8C4jQTS8
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: Health & Medical Collection
  dbid: 7X7
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3da9UwFA86QXwRv1edEkUQlLCbpk1aX2QbjinMB52wt3DSJNtgtvP2XsH_3nPa3Os6cdCn5qRtcj5yTnPyO4y9RpceAq6UQkOuRRGjF3U0TpTKeKeUVKDpNPLhF33wvfh8XB6nH259Sqtc2cTBUPuuoX_k2-iJYP9aFeWHi5-CqkbR7moqoXGT3ZJIQFJtjtcBF3rqtUw7mbLS272k0kyC7DJFGkJO1qIBsv9fw3xpZbqaNXll63RYkfbvsbvJleQ7I-_vsxuhfcBuH6bN8ofM741p6HTgnKOfxylXA87f8xGjCJnD8cm_oPnNE1oD8oh3kRNu64-zhlP2KO9PYT4-YCjow3fJhra8TzbmETva_3i0dyBSUQXRaGUWQgIOQHktvawBJCqsBzWDsvJelbGOAK4CWcXae4fKHKWTsamUq02cFaZRj9lG27Vhk3FUZ-cbvMqioCxVp-PMhVCXQQeIKs_YbDW7tkmA41T34twOgUel7cgQiwyxxBArM_Z23eViRNu4jniXWLYmJKDs4UY3P7FJ76yTBgx9lw95oVzuFASoimCcCyUUPmOviOGWoDBayrU5gWXf20_fvtodDAbRPcX4OGNvElHscAQNpKMLOA-EnjWh3JpQoq420-aVXNlkK3r7V7Iz9nLdTD0p_60N3XKgMbRBWs4y9mQUw_W4MeatCPUtY2YioJOJmba0Z6cDkjj6kqag975bifKlz_rfvD-9fhDP2J18UDEjcr3FNhbzZXiOjtvCvRi08w_JMEKI
  priority: 102
  providerName: ProQuest
– databaseName: Springer Nature OA Free Journals
  dbid: C6C
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3di9QwEA9ygvgifls9JYogKMVN89X6drd4nML5oCfcW5g0yd3B2ZXrruB_70ybXbbnBwh9aiZtkvnIDDP5hbGX6NJDxJ2yNFCZUqUUyiZZX2ppg5dSSDB0Gvnokzn8qj6e6JMMFk1nYbbz96I2b3tB1ymVZEspOigx0Lmu0e5S9d7czNdGF53yRuSk5R-7TbadAZ3_dxu8tQldLZC8kiUdNp-D2-xW9hr53sjmO-xa7O6yG0c5L36PhflYcU5nyzm6dJzKMuDiHR_hiJAPHL_8A9qfPAMzIDv4InGCaP123nIqFOX9GVyOHxju7uH7ZC473mdzcp8dH7w_nh-W-f6EsjXSLksBOAEZjAiiARComwHkDHQdgtSpSQC-BlGnJgSPepuEF6mtpW9sminbygdsp1t08RHjqLk-tPhopagg1Zs08zE2OpoISVYFm61X17UZW5yuuLhwQ4xRGzcyxCFDHDHEiYK93nT5PgJr_It4n1i2ISRM7OEFiorLKua8sGBpXCFWSvrKS4hQq2i9jxpUKNgLYrgj1IuOympOYdX37sOXz24P4z70RDEULtirTJQWOIMW8ikFXAcCyppQ7k4oUS3bafNarlw2C71DdxqVoJFKF-z5ppl6UqlbFxergcZSLlTPCvZwFMPNvDG8rQngrWB2IqCThZm2dOdnA2g4uo1W0X_frEV5a1h_W_fH_0X9hN2sBo2zZWV22c7ychWfosu29M8GZf0F1xU62g
  priority: 102
  providerName: Springer Nature
Title Controlling the signal: Practical privacy protection of genomic data sharing through Beacon services
URI https://link.springer.com/article/10.1186/s12920-017-0282-1
https://www.ncbi.nlm.nih.gov/pubmed/28786360
https://www.proquest.com/docview/1925379345
https://www.proquest.com/docview/1927304750
https://pubmed.ncbi.nlm.nih.gov/PMC5547445
https://doaj.org/article/b17a7f0bede243b2b3aea84e7bbe5a4d
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVADU
  databaseName: BioMedCentral
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: RBZ
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://www.biomedcentral.com/search/
  providerName: BioMedCentral
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: KQ8
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: DOA
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: EBSCOhost Academic Search Ultimate
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: ABDBF
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVBFR
  databaseName: Free Medical Journals
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: DIK
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: http://www.freemedicaljournals.com
  providerName: Flying Publisher
– providerCode: PRVFQY
  databaseName: GFMER Free Medical Journals
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: GX1
  dateStart: 0
  isFulltext: true
  titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php
  providerName: Geneva Foundation for Medical Education and Research
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: M~E
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAQN
  databaseName: PubMed Central
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: RPM
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/
  providerName: National Library of Medicine
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: 7X7
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: BENPR
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVFZP
  databaseName: Scholars Portal Journals: Open Access
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 20250131
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: M48
  dateStart: 20080401
  isFulltext: true
  titleUrlDefault: http://journals.scholarsportal.info
  providerName: Scholars Portal
– providerCode: PRVAVX
  databaseName: Springer Nature HAS Fully OA
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: AAJSJ
  dateStart: 20081201
  isFulltext: true
  titleUrlDefault: https://www.springernature.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: Springer Nature OA Free Journals
  customDbUrl:
  eissn: 1755-8794
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060591
  issn: 1755-8794
  databaseCode: C6C
  dateStart: 20081201
  isFulltext: true
  titleUrlDefault: http://www.springeropen.com/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1ta9swEBZdC2Nfxt7nrQvaGAw2vMWWLNmDMZLQ0gVSRl8g34RkSW0hc7Y4Geu_353shLrrBgODwTorlu5OdxedniPkNbj02oGljIVORcy9t3HhpYkzJq1hLGFa4GnkyaE4OOXjaTbdIuvyVu0E1jeGdlhP6nQxe__rx-VnUPhPQeFz8aFOsORSjOstRhAxBEM7YJhSFPIJ32wqgOMeCuiBwcxgESh4u8l5YxcdMxXQ_P9cs68YresJldd2VYOx2r9H7rZeJh00YnGfbLnqAbk9affRHxI7ajLU8Sw6BReQYhqHnn2kDXwR8I1Czz91eUlbIAdgH517ipCu3y5KiomltD7Xi6aDUOuHDnF5rWjdLj-PyMn-3snoIG7rLcSlYHIZJxoGwKxIbFJonYAuW836OsutZZkvvNYm10nuC2sN6LlPTOLLnJlC-j6XJXtMtqt55Z4SCppubAlXxjkmsBrh-8a5InPCac_SiPTXs6vKFoscS2LMVIhJcqEahihgiEKGqCQibzevfG-AOP5FPESWbQgRQzs8mC_OVKuSyiRSS_wu61LOTGqYdjrnThrjMs1tRF4hwxWiZFSYhnOmV3WtvhwfqQHEieC5QugckTctkZ_DCErdnmqAeUBgrQ7lbocS1LjsNq_lSq21QIH7DUpTMJ5F5OWmGd_E1LjKzVeBRuLeadaPyJNGDDfjhnA4R0C4iMiOgHYmpttSXZwHkHFwMyXH3323FuUrn_W3eX_2P0x6Tu6kQeFknIpdsr1crNwL8PCWpkduyanskZ3BYHw8hvtw7_DrETwdiVEv_GvSC5r9G1hjUMY
linkProvider Scholars Portal
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZKkYAL4k2ggEEgJFDUOHbiBAmhtlDt0m4PUKS9WXZst5VKUja7oP4o_iMzeSxNEb1Vymk9dmLPeB7r8TeEvASXXjuwlGGq4zQU3tsw99KECZfWcM64TvE28mQvHX0Tn6fJdIX87u_CYFplrxMbRW2rAv8jXwdPBPrnXCQfTn6EWDUKT1f7EhqtWOy4018QstXvxx-Bv6_iePvT_tYo7KoKhEXK5Txk2haO25RZlmvNQGKt5pFOMmt54nOvtck0y3xurQFp9swwX2Tc5NJHQhYchr1CrgoeCYTql9NlfAeBQc66g1OWpes1w0pQIZoBDGxCNjB9TYWAf-3AGUN4Pknz3EltYwC3b5GbnedKN1pRu01WXHmHXJt0Z_N3id1qs97xfjsFt5Jiaog-fkdbSCSQBQoj_9TFKe3AIUAkaOUpwsR-PyooJqvS-lDP2gGa-kF0E1V2SetOpd0j-5ex2vfJalmV7iGhoD2MLeBJhMCkWJP6yDiXJy512vM4IFG_uqro8M2xzMaxauKcLFUtQxQwRCFDFAvIm2WXkxbc4yLiTWTZkhBxuZsfqtmB6ra5Mkxqid9lXSy4iQ3XTmfCSWNcooUNyAtkuELkjRJTew70oq7V-OsXtQGxJ3jDEI4H5HVH5CuYQaG7mxKwDgjWNaBcG1CCaiiGzb1cqU411ervRgrI82Uz9sR0u9JVi4ZG4nlsEgXkQSuGy3lDiJ0hyFxA5EBABwszbCmPDhvgcnBdpcD3vu1F-cxn_W_dH108iWfk-mh_sqt2x3s7j8mNuNluMozTNbI6ny3cE_AZ5-Zps1MpUZesGf4ASfOBEA
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3_a9UwEA-ywfAXcX7tNjWKIChlTdMmrb-9TR_b0w1xE_ZbSJpkG8x2vL4n-N9716aPdX4BoT81lzbJ5S533OVzhLwGk147OCljoVMRZ97buPTSxDmX1nDOuBZ4G_noWBx8y2Zn-Vmoc9oO2e5DSLK_04AoTfVi99r6XsQLsdsyLLIUo4ZFnyEG92e9yEsB3tf6ZDI7mQ3KGIz1koVg5h87jo6jDrX_d91843C6nTh5K3raHUrT--ResCbppGf_Jrnj6gdk4yjEyx8Su99nouOdcwqmHsV0DX31nvYwRcAfCl_-oaufNAA2AJto4ylCt36_rCgmkNL2Qs_7D3Q1fegeqtGatkHNPCKn04-n-wdxqKsQV4LLRcw0TIBbwSwrtWYgs1bzROeFtTz3pdfaFJoVvrTWgDx7ZpivCm5K6ZNMVvwxWaub2j0lFCTa2AqePMswUdUInxjnytwJpz1PI5IMq6uqgDmOpS-uVOd7FEL1DFHAEIUMUSwib1ddrnvAjX8R7yHLVoSIld29aObnKoieMkxqieOyLs24SQ3XTheZk8a4XGc2Iq-Q4QrRMGpMtznXy7ZVhydf1QT8QbBQwUWOyJtA5BuYQaXD7QVYBwTQGlHujChBXKtx87CvVFAXrQIzG4Sj5FkekZerZuyJKXC1a5YdjcQYaZ5E5Em_DVfzBre3QOC3iMjRBh0tzLilvrzowMTBnJQZ_vfdsJVvDOtv6771X9QvyMaXD1P1-fD40za5m3bCJ-NU7JC1xXzpnoFVtzDPg-T-ArEBR4U
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Controlling+the+signal%3A+Practical+privacy+protection+of+genomic+data+sharing+through+Beacon+services&rft.jtitle=BMC+medical+genomics&rft.au=Wan%2C+Zhiyu&rft.au=Vorobeychik%2C+Yevgeniy&rft.au=Kantarcioglu%2C+Murat&rft.au=Malin%2C+Bradley&rft.date=2017-07-26&rft.issn=1755-8794&rft.eissn=1755-8794&rft.volume=10&rft.issue=S2&rft_id=info:doi/10.1186%2Fs12920-017-0282-1&rft.externalDBID=n%2Fa&rft.externalDocID=10_1186_s12920_017_0282_1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1755-8794&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1755-8794&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1755-8794&client=summon