Skip to main content
. 2017 Jul 21;33(23):3716–3725. doi: 10.1093/bioinformatics/btx470

Fig. 1.

Fig. 1.

A workflow for privacy-protecting data access from DP TDT. (1) A data user sends queries to different datasets. (2) Data owners compute the true results based on the query. (3) Instead of returning the true results, data owners return perturbed, DP TDT results. (4) The data user compares the utility among different datasets to prioritize requests for data. (5) The data user files a data access application to obtain participant-level data