2020
iDASH secure genome analysis competition 2018: blockchain genomic data access logging, homomorphic encryption on GWAS, and DNA segment searching
Kuo T, Jiang X, Tang H, Wang X, Bath T, Bu D, Wang L, Harmanci A, Zhang S, Zhi D, Sofia H, Ohno-Machado L. iDASH secure genome analysis competition 2018: blockchain genomic data access logging, homomorphic encryption on GWAS, and DNA segment searching. BMC Medical Genomics 2020, 13: 98. PMID: 32693816, PMCID: PMC7372776, DOI: 10.1186/s12920-020-0715-0.Peer-Reviewed Original ResearchThe Data Tags Suite (DATS) model for discovering data access and use requirements
Alter G, Gonzalez-Beltran A, Ohno-Machado L, Rocca-Serra P. The Data Tags Suite (DATS) model for discovering data access and use requirements. GigaScience 2020, 9: giz165. PMID: 32031623, PMCID: PMC7006671, DOI: 10.1093/gigascience/giz165.Peer-Reviewed Original ResearchConceptsData accessData discovery toolsPrivacy of subjectsData use agreementsConfidential dataMetadata itemsData reuseMetadata schemaAutomated systemDiscovery toolTechnical systemsStandard wayUse agreementsAccessPrivacyMetadataSchemaUse requirementsReuseResearchersResearch dataSystemRequirementsInformationData
2016
Genome privacy: challenges, technical approaches to mitigate risk, and ethical considerations in the United States
Wang S, Jiang X, Singh S, Marmor R, Bonomi L, Fox D, Dow M, Ohno‐Machado L. Genome privacy: challenges, technical approaches to mitigate risk, and ethical considerations in the United States. Annals Of The New York Academy Of Sciences 2016, 1387: 73-83. PMID: 27681358, PMCID: PMC5266631, DOI: 10.1111/nyas.13259.Peer-Reviewed Reviews, Practice Guidelines, Standards, and Consensus StatementsConceptsData privacySensitive individual informationComputer science communityReal-world problemsUnauthorized partiesHuman genomic dataPrivacy breachesData accessData sharingData accessibilityConfidentiality protectionGenomic dataSpectrum of techniquesIndividual informationPrivacyScience communityPhenotype informationTechnical approachPotential solutionsCurrent common practiceBiomedical researchResearch purposesConfidentialityInformationSharing