{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:50:21Z","timestamp":1732035021745},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2016,2,25]],"date-time":"2016-02-25T00:00:00Z","timestamp":1456358400000},"content-version":"vor","delay-in-days":573,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":["j-biomed-inform.com","elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Biomedical Informatics"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1016\/j.jbi.2014.04.003","type":"journal-article","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T21:32:15Z","timestamp":1400103135000},"page":"234-243","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":195,"special_numbering":"C","title":["Private predictive analysis on encrypted medical data"],"prefix":"10.1016","volume":"50","author":[{"given":"Joppe W.","family":"Bos","sequence":"first","affiliation":[]},{"given":"Kristin","family":"Lauter","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Naehrig","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jbi.2014.04.003_b0005","series-title":"Proceedings of the first ACM cloud computing security workshop \u2013 CCSW","first-page":"103","article-title":"Patient controlled encryption: ensuring privacy of electronic medical records","author":"Benaloh","year":"2009"},{"key":"10.1016\/j.jbi.2014.04.003_b0010","series-title":"Proceedings of the 2nd ACM cloud computing security workshop \u2013 CCSW","first-page":"47","article-title":"Privacy preserving EHR system using attribute-based infrastructure","author":"Narayan","year":"2010"},{"key":"10.1016\/j.jbi.2014.04.003_b0015","series-title":"Proceedings of the 3rd ACM cloud computing security workshop \u2013 CCSW","first-page":"113","article-title":"Can homomorphic encryption be practical?","author":"Lauter","year":"2011"},{"issue":"6117","key":"10.1016\/j.jbi.2014.04.003_b0020","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1126\/science.1229566","article-title":"Identifying personal genomes by surname inference","volume":"339","author":"Gymrek","year":"2013","journal-title":"Science"},{"key":"10.1016\/j.jbi.2014.04.003_b0025","unstructured":"Sumner T. How to hide your genome, ScienceNow. http:\/\/news.sciencemag.org\/biology\/2014\/02\/how-hide-your-genome; 2014."},{"issue":"1","key":"10.1016\/j.jbi.2014.04.003_b0030","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1866739.1866758","article-title":"A firm foundation for private data analysis","volume":"54","author":"Dwork","year":"2011","journal-title":"ACM Commun"},{"key":"10.1016\/j.jbi.2014.04.003_b0035","series-title":"ICDE workshops","first-page":"88","article-title":"On syntactic anonymity and differential privacy","author":"Clifton","year":"2013"},{"issue":"11","key":"10.1016\/j.jbi.2014.04.003_b0040","doi-asserted-by":"crossref","first-page":"1731","DOI":"10.1176\/appi.ajp.157.11.1731","article-title":"Large medical databases, population-based research, and patient confidentiality","volume":"157","author":"Simon","year":"2000","journal-title":"Am J Psychiatry"},{"key":"10.1016\/j.jbi.2014.04.003_b0045","series-title":"Information security and cryptology \u2013 ICISC","first-page":"1","article-title":"ML confidential: machine learning on encrypted data","volume":"vol. 7839","author":"Graepel","year":"2012"},{"key":"10.1016\/j.jbi.2014.04.003_b0050","series-title":"CRYPTO","first-page":"465","article-title":"Non-interactive verifiable computing: outsourcing computation to untrusted workers","volume":"vol. 6223","author":"Gennaro","year":"2010"},{"key":"10.1016\/j.jbi.2014.04.003_b0055","series-title":"IEEE symposium on security and privacy","first-page":"238","article-title":"Pinocchio: nearly practical verifiable computation","author":"Parno","year":"2013"},{"issue":"1","key":"10.1016\/j.jbi.2014.04.003_b0060","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.gheart.2013.01.001","article-title":"Cardiovascular disease risk assessment: insights from Framingham","volume":"8","author":"D\u2019Agostino","year":"2013","journal-title":"Global Heart"},{"issue":"11","key":"10.1016\/j.jbi.2014.04.003_b0065","doi-asserted-by":"crossref","first-page":"1999","DOI":"10.2337\/diacare.25.11.1999","article-title":"A multivariate logistic regression equation to screen for diabetes development and validation","volume":"25","author":"Tabaei","year":"2002","journal-title":"Diabetes Care"},{"issue":"4","key":"10.1016\/j.jbi.2014.04.003_b0070","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1097\/00005373-198704000-00005","article-title":"Evaluating trauma care: the TRISS method","volume":"27","author":"Boyd","year":"1987","journal-title":"J Trauma Acute Care Surgery"},{"issue":"18","key":"10.1016\/j.jbi.2014.04.003_b0075","doi-asserted-by":"crossref","first-page":"2395","DOI":"10.1161\/CIRCULATIONAHA.106.682658","article-title":"Logistic regression","volume":"117","author":"LaValley","year":"2008","journal-title":"Circulation"},{"issue":"Suppl. 9","key":"10.1016\/j.jbi.2014.04.003_b0080","first-page":"323","article-title":"Female gender is an independent predictor of operative mortality after coronary artery bypass graft surgery contemporary analysis of 31 midwestern hospitals","volume":"112","author":"Blankstein","year":"2005","journal-title":"Circulation"},{"issue":"3","key":"10.1016\/j.jbi.2014.04.003_b0085","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1161\/01.CIR.0000153341.46271.40","article-title":"Cholesteryl ester transfer protein TaqIB variant, high-density lipoprotein cholesterol levels, cardiovascular risk, and efficacy of pravastatin treatment","volume":"111","author":"Boekholdt","year":"2005","journal-title":"Circulation"},{"issue":"25","key":"10.1016\/j.jbi.2014.04.003_b0090","doi-asserted-by":"crossref","first-page":"3465","DOI":"10.1161\/CIRCULATIONAHA.104.512079","article-title":"Nuclear magnetic resonance lipoprotein abnormalities in prediabetic subjects in the insulin resistance atherosclerosis study","volume":"111","author":"Festa","year":"2005","journal-title":"Circulation"},{"issue":"6","key":"10.1016\/j.jbi.2014.04.003_b0095","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1161\/CIRCULATIONAHA.107.699579","article-title":"General cardiovascular risk profile for use in primary care: the Framingham Heart Study","volume":"117","author":"D\u2019Agostino","year":"2008","journal-title":"Circulation"},{"issue":"1","key":"10.1016\/j.jbi.2014.04.003_b0100","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1186\/1471-2377-8-12","article-title":"Framingham stroke risk profile and poor cognitive function: a population-based study","volume":"8","author":"Llewellyn","year":"2008","journal-title":"BMC Neurol"},{"key":"10.1016\/j.jbi.2014.04.003_b0105","unstructured":"Flowers C. RSCH 8140 \u2013 Multivariate Statistics (Doctoral). http:\/\/coedpages.uncc.edu\/cpflower\/rsch8140\/logisticregressionexample.htm; 2013."},{"key":"10.1016\/j.jbi.2014.04.003_b0110","doi-asserted-by":"crossref","unstructured":"Gentry C, Fully homomorphic encryption using ideal lattices. In: STOC; 2009. p. 169\u201378.","DOI":"10.1145\/1536414.1536440"},{"key":"10.1016\/j.jbi.2014.04.003_b0115","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Vaikuntanathan V. Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway P, editor. Advances in cryptology \u2013 CRYPTO. Lecture notes in computer science, vol. 6841; 2011. p. 505\u201324.","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"10.1016\/j.jbi.2014.04.003_b0120","first-page":"111","article-title":"Fully homomorphic encryption without bootstrapping","volume":"18","author":"Brakerski","year":"2011","journal-title":"Electr Colloquium Comput Complex (ECCC)"},{"key":"10.1016\/j.jbi.2014.04.003_b0125","unstructured":"Fan J, Vercauteren F. Somewhat practical fully homomorphic encryption. Cryptology ePrint archive, report 2012\/144. (minutes 12:52\u201316:20); 2014."}],"container-title":["Journal of Biomedical Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1532046414000884?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1532046414000884?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T13:16:42Z","timestamp":1565443002000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1532046414000884"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":39,"alternative-id":["S1532046414000884"],"URL":"https:\/\/doi.org\/10.1016\/j.jbi.2014.04.003","relation":{},"ISSN":["1532-0464"],"issn-type":[{"value":"1532-0464","type":"print"}],"subject":[],"published":{"date-parts":[[2014,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Private predictive analysis on encrypted medical data","name":"articletitle","label":"Article Title"},{"value":"Journal of Biomedical Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jbi.2014.04.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}