-
1
-
-
70350729454
-
Comparative effectiveness research and genomic medicine: An evolving partnership for 21st century medicine
-
M. Khoury, E. C. Rich, G. Randhawa, S. Teutsch, and J. Niederhuber, "Comparative effectiveness research and genomic medicine: An evolving partnership for 21st century medicine," Genet. Med., vol. 11, no. 10, pp. 707-711, 2009
-
(2009)
Genet. Med.
, vol.11
, Issue.10
, pp. 707-711
-
-
Khoury, M.1
Rich, E.C.2
Randhawa, G.3
Teutsch, S.4
Niederhuber, J.5
-
2
-
-
79951472909
-
Charting a course for genomic medicine from base pairs to bedside
-
National Human Genome Research Institute
-
E. Green, M. Guyer, and National Human Genome Research Institute, "Charting a course for genomic medicine from base pairs to bedside," Nature Genet., vol. 470, pp. 204-213, 2011
-
(2011)
Nature Genet.
, vol.470
, pp. 204-213
-
-
Green, E.1
Guyer, M.2
-
3
-
-
33644853781
-
A call for the creation of per-sonalized medicine databases
-
D. Gurwitz, J. Lunshof, and R. Altman, "A call for the creation of per-sonalized medicine databases," Nature Rev. Drug Discov., vol. 5, no. 1, pp. 23-26,2006
-
(2006)
Nature Rev. Drug Discov.
, vol.5
, Issue.1
, pp. 23-26
-
-
Gurwitz, D.1
Lunshof, J.2
Altman, R.3
-
4
-
-
60149102060
-
Size matters: Just how big is big?: Quantifying realistic sample size requirements for human genome epidemiology
-
P. Burton, A. Hansell, I. Fortier, T. Manalio, M. Khoury, J. Little, and P. Elliott, "Size matters: Just how big is big?: Quantifying realistic sample size requirements for human genome epidemiology," Int. J. Epidemiol., vol. 38, no. 1, pp. 263-273, 2009
-
(2009)
Int. J. Epidemiol.
, vol.38
, Issue.1
, pp. 263-273
-
-
Burton, P.1
Hansell, A.2
Fortier, I.3
Manalio, T.4
Khoury, M.5
Little, J.6
Elliott, P.7
-
6
-
-
34748848639
-
The NCBI db Ga P database of genotypes and phenotypes
-
M. Mailman, M. Feolo, Y. Jin, M. Kimura, K. Tryka, R. Bagoutdinov, L. Hao, A. Kiang, J. Paschall, L. Phan, N. Popova, S. Pretel, L. Ziyabari, M. Lee, Y. Shao, Z. Wang, K. Sirotkin, M. Ward, M. Kholodov, K. Zbicz, J. Beck, M. Kimelman, S. Shevelev, D. Preuss, E. Yaschenko, A. Graeff, J. Ostell, and S. Sherry, "The NCBI db Ga P database of genotypes and phenotypes," Nature Genet., vol. 39, no. 10, pp. 1181-1186, 2007
-
(2007)
Nature Genet.
, vol.39
, Issue.10
, pp. 1181-1186
-
-
Mailman, M.1
Feolo, M.2
Jin, Y.3
Kimura, M.4
Tryka, K.5
Bagoutdinov, R.6
Hao, L.7
Kiang, A.8
Paschall, J.9
Phan, L.10
Popova, N.11
Pretel, S.12
Ziyabari, L.13
Lee, M.14
Shao, Y.15
Wang, Z.16
Sirotkin, K.17
Ward, M.18
Kholodov, M.19
Zbicz, K.20
Beck, J.21
Kimelman, M.22
Shevelev, S.23
Preuss, D.24
Yaschenko, E.25
Graeff, A.26
Ostell, J.27
Sherry, S.28
more..
-
7
-
-
41849087888
-
The UK biobank sample handling and storage validation studies
-
T. Peakman and P. Elliott, "The UK biobank sample handling and storage validation studies," Int. J. Epidemiol., vol. 37, Suppl 1, pp. i2-i6, 2008
-
(2008)
Int. J. Epidemiol.
, vol.37
, Issue.SUPPL. 1
-
-
Peakman, T.1
Elliott, P.2
-
8
-
-
11144348715
-
An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
-
DOI 10.1197/jamia.M1603, PII S1067502704001549
-
B. Malin, "An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future," J. Amer. Med. Informat. Assoc., vol. 12, no. 1, pp. 28-34, 2005 (Pubitemid 40038620)
-
(2005)
Journal of the American Medical Informatics Association
, vol.12
, Issue.1
, pp. 28-34
-
-
Malin, B.A.1
-
9
-
-
77953149045
-
Evaluating re-identification risks with respect to the HIPAA Privacy Rule
-
K. Benitez and B. Malin, "Evaluating re-identification risks with respect to the HIPAA Privacy Rule," J. Amer. Med. Informat. Assoc., vol. 17, no. 2, pp. 169-177, 2010
-
(2010)
J. Amer. Med. Informat. Assoc.
, vol.17
, Issue.2
, pp. 169-177
-
-
Benitez, K.1
Malin, B.2
-
10
-
-
51749089052
-
A cryptographic ap-proach to securely share and query genomic sequences
-
Sep.
-
M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin, "A cryptographic ap-proach to securely share and query genomic sequences," IEEE Trans. Inf. Technol. Biomed., vol. 12, no. 5, pp. 606-617, Sep. 2008
-
(2008)
IEEE Trans. Inf. Technol. Biomed.
, vol.12
, Issue.5
, pp. 606-617
-
-
Kantarcioglu, M.1
Jiang, W.2
Liu, Y.3
Malin, B.4
-
12
-
-
33749642794
-
Sovereignjoins
-
R. Agrawal, D. Asonov, M. Kantarcioglu, and Y Li, "Sovereignjoins, " in Proc. 22nd IEEE Int. Conf. Data Eng., 2006, pp. 26-37
-
(2006)
Proc. 22nd IEEE Int. Conf. Data Eng.
, pp. 26-37
-
-
Agrawal, R.1
Asonov, D.2
Kantarcioglu, M.3
Li, Y.4
-
13
-
-
33750252128
-
Private information storage with logarithm-space secure hardware
-
A. Iliev and S. W. Smith, "Private information storage with logarithm-space secure hardware," in Proc. Int. Inf. Security Workshops, 2004, pp.199-214
-
(2004)
Proc. Int. Inf. Security Workshops
, pp. 199-214
-
-
Iliev, A.1
Smith, S.W.2
-
14
-
-
77954517653
-
Secure coprocessor-based intrusion detection
-
Sep.
-
X. Zhang et al., "Secure coprocessor-based intrusion detection," in Proc. ACM SIGOPS Eur. Workshop, Sep. 2002, pp. 239-242
-
(2002)
Proc. ACM SIGOPS Eur. Workshop
, pp. 239-242
-
-
Zhang, X.1
-
15
-
-
84942776290
-
Towards accountable man-agement of identity and privacy: Sticky policies and enforceable tracing services
-
M. C. Mont, S. Pearson, and P. Bramhall, "Towards accountable man-agement of identity and privacy: Sticky policies and enforceable tracing services," in Proc. 14th Int. Workshop Database Expert Syst. Appl., 2003, pp. 377-382
-
(2003)
Proc. 14th Int. Workshop Database Expert Syst. Appl.
, pp. 377-382
-
-
Mont, M.C.1
Pearson, S.2
Bramhall, P.3
-
16
-
-
78650202743
-
Small, stupid, and scalable: Secure com-puting with faerieplay
-
[Online]. Available
-
A. Iliev and S. W. Smith. (2010). Small, stupid, and scalable: Secure com-puting with faerieplay. in Proc. fifth ACM Workshop on Scalable Trusted Computing, pp. 41-52. [Online]. Available: http://doi.acm.org/10.1145/1867635. 1867643
-
(2010)
Proc. Fifth ACM Workshop on Scalable Trusted Computing
, pp. 41-52
-
-
Iliev, A.1
Smith, S.W.2
-
17
-
-
3142716056
-
Order-preserving encryp-tion for numeric data
-
Paris, France Jun. 13-18
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order-preserving encryp-tion for numeric data," presented at the ACM SIGMOD Int. Conf. Manage. Data, Paris, France, Jun. 13-18, 2004
-
(2004)
Presented at the ACM SIGMOD Int. Conf. Manage. Data
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
18
-
-
84893309371
-
A framework for efficient storage security in RDBMS
-
B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu, "A framework for efficient storage security in RDBMS," in Proc. 9th Int. Conf. Extend. Database Technol., 2004, pp. 627-628
-
(2004)
Proc. 9th Int. Conf. Extend. Database Technol.
, pp. 627-628
-
-
Iyer, B.1
Mehrotra, S.2
Mykletun, E.3
Tsudik, G.4
Wu, Y.5
-
20
-
-
37849045956
-
Design and analysis of querying en-crypted data in relational databases
-
M. Canim and M. Kantarcioglu, "Design and analysis of querying en-crypted data in relational databases," in Proc. 21st IFIP WG 11.3 Working Conf. Data Appl. Security, ser. Lecture Notes in Computer Science, 2007, vol. 4602, pp. 177-194
-
(2007)
Proc. 21st IFIP WG 11.3 Working Conf. Data Appl. Security, Ser. Lecture Notes in Computer Science
, vol.4602
, pp. 177-194
-
-
Canim, M.1
Kantarcioglu, M.2
-
21
-
-
84856902066
-
Building disclo-sure risk aware query optimizers for relational databases
-
M. Canim, M. Kantarcioglu, B. Hore, and S. Mehrotra, "Building disclo-sure risk aware query optimizers for relational databases," Proc. VLDB Endowment, vol. 3, no. 1-2, pp. 13-24, 2010
-
(2010)
Proc. VLDB Endowment
, vol.3
, Issue.1-2
, pp. 13-24
-
-
Canim, M.1
Kantarcioglu, M.2
Hore, B.3
Mehrotra, S.4
-
22
-
-
70349871610
-
Query optimization in en-crypted relational databases by vertical schema partitioning
-
M. Canim, M. Kantarcioglu, and A. Inan, "Query optimization in en-crypted relational databases by vertical schema partitioning," in Proc. Secure Data Manage., 2009, pp. 1-16
-
(2009)
Proc. Secure Data Manage.
, pp. 1-16
-
-
Canim, M.1
Kantarcioglu, M.2
Inan, A.3
-
23
-
-
33746639153
-
Gene PING: Secure, scalable management ofpersonal genomic data
-
[Online]. Available
-
B. Adida and I. Kohane. (2006). Gene PING: Secure, scalable management ofpersonal genomic data. BMC Genom, 7(1), p. 93. [Online]. Available: http://www.biomedcentral.com/1471-2164/7/93
-
(2006)
BMC Genom
, vol.7
, Issue.1
, pp. 93
-
-
Adida, B.1
Kohane, I.2
-
24
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra. (2002, Jun. 4-6). Exe-cuting SQL over encrypted data in the database-service-provider model. in Proc. 2002 ACM SIGMOD Int. Conf. Manage. Data. [Online]. Madison, WI, pp. 216-227. Available: http://doi.acm.org/10.1145/564691.564717 (Pubitemid 34985549)
-
(2002)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
25
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in Proc. 30th Int. Conf. Very Large Data Bases, 2004, pp. 720-731
-
(2004)
Proc. 30th Int. Conf. Very Large Data Bases
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
26
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
E. Damiani, S. D. C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. (2003). Balancing confidentiality and efficiency in untrusted relational DBMSs. in Proc. 10th ACM Conf. Comput. Commun. Security, pp. 93-102. [Online]. Available: http://doi.acm.org/10.1145/948109.948124 (Pubitemid 40673792)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.D.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
28
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu 0002, "Two can keep a secret: A distributed architecture for secure database services," in Proc. 2nd Biennial Conf. Innovative Data Syst. Res., 2005, pp. 186-199
-
(2005)
Proc. 2nd Biennial Conf. Innovative Data Syst. Res.
, pp. 186-199
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
29
-
-
84856876189
-
-
Understanding transparent data encryption (TDE)
-
Understanding transparent data encryption (TDE). (2010). [Online]. Avail-able: http://msdn.microsoft.com/en-us/library/bb934049.aspx
-
(2010)
-
-
-
30
-
-
84856924455
-
-
Understanding extensible key management (EKM) [Online] Available
-
Understanding extensible key management (EKM). (2010). [Online]. Available: http://technet.microsoft.com/en-us/library/bb895340.aspx
-
(2010)
-
-
-
31
-
-
84861257829
-
-
IBM [Online] Available
-
IBM. (2004). IBM 4764 cryptographic coprocessor. [Online]. Available: http://www.ibm.com/security/cryptocards
-
(2004)
IBM 4764 Cryptographic Coprocessor
-
-
-
33
-
-
11044228380
-
Matchbox: Secure data sharing
-
DOI 10.1109/MIC.2004.68
-
K. Goldman and E. Valdez, "Matchbox: Secure data sharing," IEEE Internet Comput., vol. 8, no. 6, pp. 18-24, Nov./Dec 2004 (Pubitemid 40043363)
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 18-24
-
-
Goldman, K.1
Valdez, E.2
-
34
-
-
34548292504
-
PLINK: A tool set for whole-genome association and population-based linkage analyses
-
DOI 10.1086/519795
-
S. Purcell, B. Neale, K. Todd-Brown, L. Thomas, M. Ferreira, D. Bender, J. Maller, P. Sklar, P. de Bakker, M. Daly, and P. Sham, "PLINK: A tool set for whole-genome association and population-based linkage analyses," Amer. J. Human Genet., vol. 81, no. 3, pp. 559-575, 2007 (Pubitemid 47330214)
-
(2007)
American Journal of Human Genetics
, vol.81
, Issue.3
, pp. 559-575
-
-
Purcell, S.1
Neale, B.2
Todd-Brown, K.3
Thomas, L.4
Ferreira, M.A.R.5
Bender, D.6
Maller, J.7
Sklar, P.8
De Bakker, P.I.W.9
Daly, M.J.10
Sham, P.C.11
-
35
-
-
84856902063
-
-
National Institute of Standards and Technology National Institute of Standards and Technol-ogy, Tech. Rep. NIST Special Publication FIPS-197. [Online]. Available
-
National Institute of Standards and Technology. (2001). "Advanced en-cryption standard (AES)," National Institute of Standards and Technol-ogy, Tech. Rep. NIST Special Publication FIPS-197. [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
-
(2001)
Advanced En-cryption Standard (AES)
-
-
-
36
-
-
77952822074
-
Phe WAS: Demonstrating the feasibility of a phenome-wide scan to discover gene-disease associations
-
J. Denny, M. Ritchie, M. Basford, J. Pulley, L. Bastarache, K. Brown-Gentry, D. Wang, D. Masys, D. Roden, and D. Crawford, "Phe WAS: Demonstrating the feasibility of a phenome-wide scan to discover gene-disease associations," Bioinformatics, vol. 26, no. 9, pp. 1205-1210, 2010
-
(2010)
Bioinformatics
, vol.26
, Issue.9
, pp. 1205-1210
-
-
Denny, J.1
Ritchie, M.2
Basford, M.3
Pulley, J.4
Bastarache, L.5
Brown-Gentry, K.6
Wang, D.7
Masys, D.8
Roden, D.9
Crawford, D.10
-
37
-
-
65549130531
-
Collaborative genome-wide association studies of diverse diseases: Programs of the NHGRI's office of population genomics
-
T. Manolio, "Collaborative genome-wide association studies of diverse diseases: Programs of the NHGRI's office of population genomics," Phar-macogenomics, vol. 10, no. 2, pp. 235-241, 2009
-
(2009)
Phar-macogenomics
, vol.10
, Issue.2
, pp. 235-241
-
-
Manolio, T.1
-
40
-
-
84856902065
-
Security standards for the protec-tion of electronic protected health information
-
Dept. of Health and Human Services Feb. 20
-
Dept. of Health and Human Services, "Security standards for the protec-tion of electronic protected health information," Federal Register, vol. 45, no. 164, Feb. 20, 2003
-
(2003)
Federal Register
, vol.45
, Issue.164
-
-
-
41
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. Adam and J. C. Worthmann, "Security-control methods for statistical databases: A comparative study," ACM Comput. Surveys, vol. 21, no. 4, pp. 515-556, 1989.
-
(1989)
ACM Comput. Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
|