End-to-end Security for Local and Remote Human Genetic Data Applications at the EGA.

08:00 EDT 14th May 2019 | BioPortfolio

Summary of "End-to-end Security for Local and Remote Human Genetic Data Applications at the EGA."

Sensitive genomic data should remain secure - whether on disk for storage, or analysis, or in transport. However, secure storage, delivery, and usage of genomic data is complicated by the size of files and diversity of workflows. This paper presents solutions developed by GA4GH and EGA to use customized encryption, encrypted file formats, toolchain integration, and intelligent APIs to help solve this problem.


Journal Details

This article was published in the following journal.

Name: IEEE/ACM transactions on computational biology and bioinformatics
ISSN: 1557-9964


DeepDyve research library

PubMed Articles [33995 Associated PubMed Articles listed on BioPortfolio]

Relative security of health care big data protection.

With China's implementing big data strategy, health care becomes one of the key areas in which the national big data strategy is highly promoted. However, as the health care big data industry grows ra...

The human experience of social transformation: Insights from comparative archaeology.

Archaeologists and other scholars have long studied the causes of collapse and other major social transformations and debated how they can be understood. This article instead focuses on the human expe...

Next-Generation Sequencing in Human Genetic Studies: Genome Technologies and Applications to Human Genetic Studies.

Social security of aging: problem statement.

The article raises the question of the need to consider aging in the context of social security. The author the author shows the main stages of the humanitarization of social security, the trend of de...

Multiple non-climatic drivers of food insecurity reinforce climate change maladaptation trajectories among Peruvian Indigenous Shawi in the Amazon.

Climate change is affecting food systems globally, with implications for food security, nutrition, and the health of human populations. There are limited data characterizing the current and future con...

Clinical Trials [11220 Associated Clinical Trials listed on BioPortfolio]

Telephone Versus Videoconference Communication for Remote Genetic Disclosure in the APOE4 Trial

The purpose of this study is to compare two methods for remote genetic counseling (telephone and two-way videoconferencing) for patients who are receiving disclosure of their APOE (apolipo...

Pre-Test Genetic Education and Remote Genetic Counseling in Communicating Tumor Profiling Results to Patients With Advanced Cancer

This research trial studies how well pre-test genetic education and remote genetic counseling works in communicating tumor profiling results to patients with advanced cancer. Web-based gen...

GRX With ReMOTE: First in Human in India

To evaluate the safety and performance of CorPath GRX POP System, in the ReMOTE (location outside hospital) delivery and manipulation of coronary guidewires and stent/balloon catheters, an...

Smartphone Application-Based Vital Sign Monitors

Health-related applications for smartphones represent a new and popular market for consumer oriented products. These applications are generally not considered medical devices and, as such,...

Electronic Patient Notification of Remote ICD Data: Impact of Patient Engagement on Outcomes in the Merlin.Net™

Remote monitoring of implantable cardioverter-defibrillators (ICDs) for patients has led to efficient, safe, and satisfying analysis of their device and cardiac status; resulting in an ove...

Medical and Biotech [MESH] Definitions

Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or data structures, especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or so-called computer hackers aiming to compromise stored data.

Observation and aquisition of physical data from a distance by viewing and making measurements from a distance or receiving transmitted data from observations made at distant location.

Various units or machines that operate in combination or in conjunction with a computer but are not physically part of it. Peripheral devices typically display computer data, store data from the computer and return the data to the computer on demand, prepare data for human use, or acquire data from a source and convert it to a form usable by a computer. (Computer Dictionary, 4th ed.)

Consultation via remote telecommunications, generally for the purpose of diagnosis or treatment of a patient at a site remote from the patient or primary physician.

Information application based on a variety of coding methods to minimize the amount of data to be stored, retrieved, or transmitted. Data compression can be applied to various forms of data, such as images and signals. It is used to reduce costs and increase efficiency in the maintenance of large volumes of data.

Quick Search


DeepDyve research library

Searches Linking to this Article