메뉴 건너뛰기




Volumn 32, Issue 2, 2016, Pages 211-218

HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHM; EVALUATION STUDY; GENETIC PRIVACY; GENETIC VARIATION; GENETICS; GENOME-WIDE ASSOCIATION STUDY; HUMAN; HUMAN GENOME; MUCOCUTANEOUS LYMPH NODE SYNDROME; RARE DISEASE;

EID: 84959864390     PISSN: 13674803     EISSN: 14602059     Source Type: Journal    
DOI: 10.1093/bioinformatics/btv563     Document Type: Article
Times cited : (98)

References (51)
  • 2
    • 33748324558 scopus 로고    scopus 로고
    • Energy-aware lossless data compression
    • Barr, K. C. And Asanovic, K. (2006) Energy-aware lossless data compression. ACM Trans. Comput. Syst., 24, 250-291.
    • (2006) ACM Trans. Comput. Syst. , vol.24 , pp. 250-291
    • Barr, K.C.1    Asanovic, K.2
  • 3
    • 27344458404 scopus 로고    scopus 로고
    • On prediction using variable order Markov models
    • Begleiter, R. et al. (2004) On prediction using variable order Markov models. J. Artif. Intell. Res., 22, 385-421.
    • (2004) J. Artif. Intell. Res. , vol.22 , pp. 385-421
    • Begleiter, R.1
  • 5
    • 0141473270 scopus 로고    scopus 로고
    • Fast variants of RSA
    • Boneh, D. And Shacham, H. (2002) Fast variants of RSA. CryptoBytes, 5, 1-9.
    • (2002) CryptoBytes , vol.5 , pp. 1-9
    • Boneh, D.1    Shacham, H.2
  • 6
    • 84905174579 scopus 로고    scopus 로고
    • Private predictive analysis on encrypted medical data
    • Bos, J. W. et al. (2014) Private predictive analysis on encrypted medical data. J. Biomed. Inform., 50, 234-243.
    • (2014) J. Biomed. Inform. , vol.50 , pp. 234-243
    • Bos, J.W.1
  • 8
    • 84899651713 scopus 로고    scopus 로고
    • Efficient fully homomorphic encryption from (standard) LWE
    • Brakerski, Z. And Vaikuntanathan, V. (2011) Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput., 43, 831-871.
    • (2011) SIAM J. Comput. , vol.43 , pp. 831-871
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 9
    • 73149103718 scopus 로고    scopus 로고
    • Prioritizing GWAS results: A review of statistical methods and recommendations for their application
    • Cantor, R. M. et al. (2010) Prioritizing GWAS results: A review of statistical methods and recommendations for their application. Am. J. Hum. Genet., 86, 6-22.
    • (2010) Am. J. Hum. Genet. , vol.86 , pp. 6-22
    • Cantor, R.M.1
  • 10
    • 84931028807 scopus 로고    scopus 로고
    • Cloud cover protects gene data
    • Check Hayden, E. (2015) Cloud cover protects gene data. Nature, 519, 400-401.
    • (2015) Nature , vol.519 , pp. 400-401
    • Check Hayden, E.1
  • 12
    • 77952574849 scopus 로고    scopus 로고
    • Uncovering the roles of rare variants in common disease through whole-genome sequencing
    • Cirulli, E. T. And Goldstein, D. B. (2010) Uncovering the roles of rare variants in common disease through whole-genome sequencing. Nat. Rev. Genet., 11, 415-425.
    • (2010) Nat. Rev. Genet. , vol.11 , pp. 415-425
    • Cirulli, E.T.1    Goldstein, D.B.2
  • 14
  • 15
    • 43949118608 scopus 로고    scopus 로고
    • A survey of homomorphic encryption for nonspecialists
    • Fontaine, C. And Galand, F. (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur., 2007, 1-15.
    • (2007) EURASIP J. Inf. Secur. , vol.2007 , pp. 1-15
    • Fontaine, C.1    Galand, F.2
  • 16
    • 79957974657 scopus 로고    scopus 로고
    • Implementing gentry's fully-homomorphic encryption scheme
    • Patterson, K. E. (ed.) . Springer, Heidelberg
    • Gentry, C. And Halevi, S. (2011) Implementing gentry's fully-homomorphic encryption scheme. In: Patterson, K. E. (ed.) Advances in Cryptology-EUROCRYPT. Springer, Heidelberg, pp. 129-148.
    • (2011) Advances in Cryptology-EUROCRYPT , pp. 129-148
    • Gentry, C.1    Halevi, S.2
  • 17
    • 33745655621 scopus 로고    scopus 로고
    • A new security proof for Damgard's ElGamal
    • Gjøsteen, K. (2006) A new security proof for Damgard's ElGamal. In: Topics in Cryptology-CT-RSA., vol. 3860, pp. 150-158.
    • (2006) Topics in Cryptology-CT-RSA , vol.3860 , pp. 150-158
    • Gjøsteen, K.1
  • 18
    • 84876012553 scopus 로고    scopus 로고
    • ML confidential: Machine learning on encrypted data
    • Springer, Heidelberg
    • Graepel, T. et al. (2013) ML confidential: machine learning on encrypted data. In: Information Security and Cryptology-ICISC 2012. Springer, Heidelberg, pp. 1-21.
    • (2013) Information Security and Cryptology-ICISC 2012 , pp. 1-21
    • Graepel, T.1
  • 19
    • 84872459720 scopus 로고    scopus 로고
    • Identifying personal genomes by surname inference
    • Gymrek, M. et al. (2013) Identifying personal genomes by surname inference. Science, 339, 321-324.
    • (2013) Science , vol.339 , pp. 321-324
    • Gymrek, M.1
  • 20
    • 84875982465 scopus 로고    scopus 로고
    • Genome-wide testing of putative functional exonic variants in relationship with breast and prostate cancer risk in a multiethnic population
    • Haiman, C. A. et al. (2013) Genome-wide testing of putative functional exonic variants in relationship with breast and prostate cancer risk in a multiethnic population. PLoS Genet., 9, e1003419.
    • (2013) PLoS Genet. , vol.9 , pp. e1003419
    • Haiman, C.A.1
  • 21
    • 13444266370 scopus 로고    scopus 로고
    • Online Mendelian Inheritance in Man (OMIM), a knowledgebase of human genes and genetic disorders
    • Hamosh, A. et al. (2005) Online Mendelian Inheritance in Man (OMIM), a knowledgebase of human genes and genetic disorders. Nucleic Acids Res., 33, D514-D517.
    • (2005) Nucleic Acids Res. , vol.33 , pp. D514-D517
    • Hamosh, A.1
  • 22
    • 0001325611 scopus 로고
    • Wald's test as applied to hypotheses in logit analysis
    • Hauck, W. W., Jr and Donner, A. (1977) Wald's test as applied to hypotheses in logit analysis. J. Am. Stat. Assoc., 72, 851-853.
    • (1977) J. Am. Stat. Assoc. , vol.72 , pp. 851-853
    • Hauck, W.W.1    Donner, A.2
  • 23
    • 50849101381 scopus 로고    scopus 로고
    • Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays
    • Homer, N. et al. (2008) Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet., 4, e1000167.
    • (2008) PLoS Genet. , vol.4 , pp. e1000167
    • Homer, N.1
  • 25
    • 84904403560 scopus 로고    scopus 로고
    • Reducing false-positive incidental findings with ensemble genotyping and logistic regression based variant filtering methods
    • Hwang, K.-B. et al. (2014) Reducing false-positive incidental findings with ensemble genotyping and logistic regression based variant filtering methods. Hum. Mutat., 35, 936-944.
    • (2014) Hum. Mutat. , vol.35 , pp. 936-944
    • Hwang, K.-B.1
  • 26
    • 84964313265 scopus 로고    scopus 로고
    • A community assessment of privacy preserving techniques on human genome data
    • Jiang, X. et al. (2014) A community assessment of privacy preserving techniques on human genome data. BMC, 14(Suppl 1), S1.
    • (2014) BMC , vol.14 , pp. S1
    • Jiang, X.1
  • 27
    • 84875595667 scopus 로고    scopus 로고
    • A new way to protect privacy in large-scale genomewide association studies
    • Kamm, L. et al. (2013) A new way to protect privacy in large-scale genomewide association studies. Bioinformatics, 29, 886-93.
    • (2013) Bioinformatics , vol.29 , pp. 886-893
    • Kamm, L.1
  • 29
    • 3042849144 scopus 로고    scopus 로고
    • Genomic research and human subject privacy
    • Lin, Z. et al. (2004) Genomic research and human subject privacy. Science, 305, 183.
    • (2004) Science , vol.305 , pp. 183
    • Lin, Z.1
  • 30
    • 84890260477 scopus 로고    scopus 로고
    • Whole-exome sequencing of 2 000 Danish individuals and the role of rare coding variants in type 2 diabetes
    • Lohmueller, K. E. et al. (2013) Whole-exome sequencing of 2 000 Danish individuals and the role of rare coding variants in type 2 diabetes. Am. J. Hum. Genet., 93, 1072-1086.
    • (2013) Am. J. Hum. Genet. , vol.93 , pp. 1072-1086
    • Lohmueller, K.E.1
  • 31
    • 2942522665 scopus 로고    scopus 로고
    • How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems
    • Malin, B. And Sweeney, L. (2004) How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. J. Biomed. Inform., 37, 179-192.
    • (2004) J. Biomed. Inform. , vol.37 , pp. 179-192
    • Malin, B.1    Sweeney, L.2
  • 33
    • 0442293931 scopus 로고    scopus 로고
    • Efficient Monte Carlo Methods for Conditional Logistic Regression
    • Mehta, C. R. et al. (2000) Efficient Monte Carlo Methods for Conditional Logistic Regression. J. Am. Stat. Assoc., 95, 99-108.
    • (2000) J. Am. Stat. Assoc. , vol.95 , pp. 99-108
    • Mehta, C.R.1
  • 34
    • 0029022967 scopus 로고
    • Exact logistic regression: Theory and examples
    • Mehta, C. R. And Patel, N. R. (1995) Exact logistic regression: Theory and examples. Stat. Med., 14, 2143-2160.
    • (1995) Stat. Med. , vol.14 , pp. 2143-2160
    • Mehta, C.R.1    Patel, N.R.2
  • 37
    • 84875312984 scopus 로고    scopus 로고
    • Low concordance of multiple variant-calling pipelines: Practical implications for exome and genome sequencing
    • O'Rawe, J. et al. (2013) Low concordance of multiple variant-calling pipelines: practical implications for exome and genome sequencing. Genome med, 5, 28.
    • (2013) Genome Med , vol.5 , pp. 28
    • O'Rawe, J.1
  • 38
    • 84863115554 scopus 로고    scopus 로고
    • IDASH. Integrating data for analysis, anonymization, and sharing
    • Ohno-Machado, L. et al. (2012) iDASH. Integrating data for analysis, anonymization, and sharing. J. Am. Med. Informatics Assoc., 19, 196-201.
    • (2012) J. Am. Med. Informatics Assoc. , vol.19 , pp. 196-201
    • Ohno-Machado, L.1
  • 39
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer Verlagpp
    • Paillier, P. (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology-EUROCRYPT'99, LNCS 1592, Springer Verlagpp. 223-238.
    • (1999) Advances in Cryptology-EUROCRYPT'99, LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 40
    • 84959909911 scopus 로고    scopus 로고
    • (12 September 2015 date last accessed)
    • Pavlov, I. (2007) 7zip file archive application. https://ford. ischool. utexas. edu/ handle/2081/8999 (12 September 2015, date last accessed).
    • (2007) 7zip File Archive Application
    • Pavlov, I.1
  • 41
    • 80054975975 scopus 로고    scopus 로고
    • Deep resequencing of GWAS loci identifies independent rare variants associated with inflammatory bowel disease
    • Rivas, M. A. et al. (2011) Deep resequencing of GWAS loci identifies independent rare variants associated with inflammatory bowel disease. Nat. Genet., 43, 1066-1073.
    • (2011) Nat. Genet. , vol.43 , pp. 1066-1073
    • Rivas, M.A.1
  • 43
    • 84899638695 scopus 로고    scopus 로고
    • Severe osteoarthritis of the hand associates with common variants within the ALDH1A2 gene and with rare variants at 1p31
    • Styrkarsdottir, U. et al. (2014) Severe osteoarthritis of the hand associates with common variants within the ALDH1A2 gene and with rare variants at 1p31. Nat. Genet., 46, 498-502.
    • (2014) Nat. Genet. , vol.46 , pp. 498-502
    • Styrkarsdottir, U.1
  • 44
    • 84959898398 scopus 로고    scopus 로고
    • Identifying participants in the personal genome project by name (A Re-identification experiment)
    • Harvard University, Cambridge, MA
    • Sweeney, L. et al. (2013) Identifying participants in the personal genome project by name (A Re-identification experiment). White Paper 1021-1. Data Privacy Lab, Harvard University, Cambridge, MA.
    • (2013) White Paper 1021-1. Data Privacy Lab
    • Sweeney, L.1
  • 46
    • 84862909349 scopus 로고    scopus 로고
    • Five years of GWAS discovery
    • Visscher, P. M. et al. (2012) Five years of GWAS discovery. Am. J. Hum. Genet., 90, 7-24.
    • (2012) Am. J. Hum. Genet. , vol.90 , pp. 7-24
    • Visscher, P.M.1
  • 48
    • 84964314800 scopus 로고    scopus 로고
    • Differentially private genome data dissemination through top-down specialization
    • Wang, S. et al. (2014) Differentially private genome data dissemination through top-down specialization. BMC Med. Inform. Decis. Mak., 14, S2.
    • (2014) BMC Med. Inform. Decis. Mak. , vol.14 , pp. S2
    • Wang, S.1
  • 49
    • 84930733962 scopus 로고    scopus 로고
    • SecureMA: Protecting participant privacy in genetic association meta-analysis
    • Xie, W. et al. (2014) SecureMA: protecting participant privacy in genetic association meta-analysis. Bioinformatics, 30, 3334-3341.
    • (2014) Bioinformatics , vol.30 , pp. 3334-3341
    • Xie, W.1
  • 50
    • 84964313111 scopus 로고    scopus 로고
    • Scalable privacy-preserving data sharing methodology for genome-wide association studies: An application to iDASH healthcare privacy protection challenge
    • Yu, F. And Ji, Z. (2014) Scalable privacy-preserving data sharing methodology for genome-wide association studies: An application to iDASH healthcare privacy protection challenge. BMC Med. Inform. Decis. Mak., 14, S3.
    • (2014) BMC Med. Inform. Decis. Mak. , vol.14 , pp. S3
    • Yu, F.1    Ji, Z.2
  • 51
    • 84938572122 scopus 로고    scopus 로고
    • Choosing blindly but wisely: Differentially private solicitation of DNA datasets for disease marker discovery
    • Zhao, Y. et al. (2015) Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery. J. Am. Med. Inform. Assoc., 22, 100-108.
    • (2015) J. Am. Med. Inform. Assoc. , vol.22 , pp. 100-108
    • Zhao, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.