Journal articles on the topic 'Genomic security and privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Genomic security and privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mohammed Yakubu, Abukari, and Yi-Ping Phoebe Chen. "Ensuring privacy and security of genomic data and functionalities." Briefings in Bioinformatics 21, no. 2 (February 12, 2019): 511–26. http://dx.doi.org/10.1093/bib/bbz013.
Full textSchwab, Abraham P., Hung S. Luu, Jason Wang, and Jason Y. Park. "Genomic Privacy." Clinical Chemistry 64, no. 12 (December 1, 2018): 1696–703. http://dx.doi.org/10.1373/clinchem.2018.289512.
Full textPark, Young-Hoon, Yejin Kim, and Junho Shim. "Blockchain-Based Privacy-Preserving System for Genomic Data Management Using Local Differential Privacy." Electronics 10, no. 23 (December 3, 2021): 3019. http://dx.doi.org/10.3390/electronics10233019.
Full textLlorente, Silvia, and Jaime Delgado. "Implementation of Privacy and Security for a Genomic Information System Based on Standards." Journal of Personalized Medicine 12, no. 6 (May 31, 2022): 915. http://dx.doi.org/10.3390/jpm12060915.
Full textMittos, Alexandros, Bradley Malin, and Emiliano De Cristofaro. "Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 87–107. http://dx.doi.org/10.2478/popets-2019-0006.
Full textAsgiani, Piping, Chriswardani Suryawati, and Farid Agushybana. "A literature review: Security Aspects in the Implementation of Electronic Medical Records in Hospitals." MEDIA ILMU KESEHATAN 10, no. 2 (January 29, 2022): 161–66. http://dx.doi.org/10.30989/mik.v10i2.561.
Full textVillanueva, Angela G., Robert Cook-Deegan, Jill O. Robinson, Amy L. McGuire, and Mary A. Majumder. "Genomic Data-Sharing Practices." Journal of Law, Medicine & Ethics 47, no. 1 (2019): 31–40. http://dx.doi.org/10.1177/1073110519840482.
Full textLerner, Barbara, Deborah Passey, Nina Sperber, and Sara Knight. "OP043: The evolving attitude towards privacy and security of personal genomic data." Genetics in Medicine 24, no. 3 (March 2022): S369. http://dx.doi.org/10.1016/j.gim.2022.01.590.
Full textCarter, Alexis B. "Considerations for Genomic Data Privacy and Security when Working in the Cloud." Journal of Molecular Diagnostics 21, no. 4 (July 2019): 542–52. http://dx.doi.org/10.1016/j.jmoldx.2018.07.009.
Full textDoll, Bruce, Mauricio J. De Castro, Melissa H. Fries, Arnyce R. Pock, Diane Seibert, and Wendy Yang. "Precision Medicine—A Demand Signal for Genomics Education." Military Medicine 187, Supplement_1 (December 30, 2021): 40–46. http://dx.doi.org/10.1093/milmed/usab406.
Full textRogith, Deevakar, Rafeek Adeyemi Yusuf, Shelly Renee Anstey Hovick, Susan K. Peterson, Allison Michelle Burton-Chase, Yisheng Li, Funda Meric-Bernstam, and Elmer Victor Bernstam. "Attitudes regarding privacy of genomic information in personalized cancer therapy." Journal of Clinical Oncology 31, no. 15_suppl (May 20, 2013): 9576. http://dx.doi.org/10.1200/jco.2013.31.15_suppl.9576.
Full textHubaux, Jean-Pierre, Stefan Katzenbeisser, and Bradley Malin. "Genomic Data Privacy and Security: Where We Stand and Where We Are Heading." IEEE Security & Privacy 15, no. 5 (2017): 10–12. http://dx.doi.org/10.1109/msp.2017.3681048.
Full textPascoal, Túlio, Jérémie Decouchant, Antoine Boutet, and Marcus Völp. "I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 437–54. http://dx.doi.org/10.56553/popets-2023-0026.
Full textBahmani, Amir, Kyle Ferriter, Vandhana Krishnan, Arash Alavi, Amir Alavi, Philip S. Tsao, Michael P. Snyder, and Cuiping Pan. "Swarm: A federated cloud framework for large-scale variant analysis." PLOS Computational Biology 17, no. 5 (May 12, 2021): e1008977. http://dx.doi.org/10.1371/journal.pcbi.1008977.
Full textWong, David C. S., Maximiliano Olivera, Jing Yu, Anita Szabo, Ismail Moghul, Konstantinos Balaskas, Robert Luben, Anthony P. Khawaja, Nikolas Pontikos, and Pearse A. Keane. "Cloud-based genomics pipelines for ophthalmology: reviewed from research to clinical practice." Modeling and Artificial Intelligence in Ophthalmology 3, no. 1 (September 17, 2021): 101–40. http://dx.doi.org/10.35119/maio.v3i1.115.
Full textБородин, Сергей, and Андрей Инюшкин. "GENOMIC RESEARCHES AND GENOMIC EDITING IN TERMS OF FORMING EFFECTIVE LEGAL REGIME." Rule-of-law state: theory and practice 16, no. 2 (February 1, 2020): 19–31. http://dx.doi.org/10.33184/pravgos-2020.2.3.
Full textTownend, David. "EU Laws on Privacy in Genomic Databases and Biobanking." Journal of Law, Medicine & Ethics 44, no. 1 (2016): 128–42. http://dx.doi.org/10.1177/1073110516644204.
Full textMcGuire, Amy L., Rebecca Fisher, Paul Cusenza, Kathy Hudson, Mark A. Rothstein, Deven McGraw, Stephen Matteson, John Glaser, and Douglas E. Henley. "Confidentiality, privacy, and security of genetic and genomic test information in electronic health records: points to consider." Genetics in Medicine 10, no. 7 (July 2008): 495–99. http://dx.doi.org/10.1097/gim.0b013e31817a8aaa.
Full textBlanton, Marina, and Fattaneh Bayatbabolghani. "Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (October 1, 2016): 144–64. http://dx.doi.org/10.1515/popets-2016-0033.
Full textYohe, Sophia L., Alexis B. Carter, John D. Pfeifer, James M. Crawford, Allison Cushman-Vokoun, Samuel Caughron, and Debra G. B. Leonard. "Standards for Clinical Grade Genomic Databases." Archives of Pathology & Laboratory Medicine 139, no. 11 (November 1, 2015): 1400–1412. http://dx.doi.org/10.5858/arpa.2014-0568-cp.
Full textArshad, Saadia, Junaid Arshad, Muhammad Mubashir Khan, and Simon Parkinson. "Analysis of security and privacy challenges for DNA-genomics applications and databases." Journal of Biomedical Informatics 119 (July 2021): 103815. http://dx.doi.org/10.1016/j.jbi.2021.103815.
Full textOstrak, Andre, Jaak Randmets, Ville Sokk, Sven Laur, and Liina Kamm. "Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification." Cryptography 5, no. 3 (August 20, 2021): 21. http://dx.doi.org/10.3390/cryptography5030021.
Full textJin, Xiao-Ling, Miao Zhang, Zhongyun Zhou, and Xiaoyu Yu. "Application of a Blockchain Platform to Manage and Secure Personal Genomic Data: A Case Study of LifeCODE.ai in China." Journal of Medical Internet Research 21, no. 9 (September 10, 2019): e13587. http://dx.doi.org/10.2196/13587.
Full textBlanton, Marina, and Fattaneh Bayatbabolghani. "Improving the Security and Efficiency of Private Genomic Computation Using Server Aid." IEEE Security & Privacy 15, no. 5 (2017): 20–28. http://dx.doi.org/10.1109/msp.2017.3681056.
Full textTasci, Erdal, Ying Zhuge, Kevin Camphausen, and Andra V. Krauze. "Bias and Class Imbalance in Oncologic Data—Towards Inclusive and Transferrable AI in Large Scale Oncology Data Sets." Cancers 14, no. 12 (June 12, 2022): 2897. http://dx.doi.org/10.3390/cancers14122897.
Full textBurns, Shohei, and Eric Andrew Collisson. "Blockchain-authenticated sharing of cancer patient genomic and clinical outcomes data." Journal of Clinical Oncology 38, no. 15_suppl (May 20, 2020): e19358-e19358. http://dx.doi.org/10.1200/jco.2020.38.15_suppl.e19358.
Full textPerez-Pozuelo, Ignacio, Dimitris Spathis, Jordan Gifford-Moore, Jessica Morley, and Josh Cowls. "Digital phenotyping and sensitive health data: Implications for data governance." Journal of the American Medical Informatics Association 28, no. 9 (February 27, 2021): 2002–8. http://dx.doi.org/10.1093/jamia/ocab012.
Full textHusereau, Don, Lotte Steuten, Vivek Muthu, David M. Thomas, Daryl S. Spinner, Craig Ivany, Michael Mengel, et al. "Effective and Efficient Delivery of Genome-Based Testing-What Conditions Are Necessary for Health System Readiness?" Healthcare 10, no. 10 (October 19, 2022): 2086. http://dx.doi.org/10.3390/healthcare10102086.
Full textSchlosberg, Arran. "Data security in genomics: A review of Australian privacy requirements and their relation to cryptography in data storage." Journal of Pathology Informatics 7, no. 1 (2016): 6. http://dx.doi.org/10.4103/2153-3539.175793.
Full textTahir, Muhammad, Muhammad Sardaraz, and Usman Aziz. "Critical Review of Blockchain Consensus Algorithms: challenges and opportunities." Vol 4 Issue 5 4, no. 5 (June 30, 2022): 52–64. http://dx.doi.org/10.33411/ijist/2022040505.
Full textA/P Mathiallahan, Puvanamathi, Kaniemozhi A/P Katheravan, and Nabeel Mahdi Althabhawi. "SCIENCE AND TECHNOLOGY'S INFLUENCE ON LAW: THE PERSPECTIVE OF JURISPRUDENCE." Economic Growth and Environment Sustainability 1, no. 2 (2022): 32–35. http://dx.doi.org/10.26480/egnes.02.2022.32.35.
Full textKazi, A. Mujeeb, Niaz Ali, Amir Ibrahim, Abdul Aziz Napar, M. Jamil, Sajjad Hussain, Zahid Mahmood, et al. "Tissue Culture Mediated Allelic Diversification and Genomic Enrichment of Wheat to Combat Production Constraints and Address Food Security." Plant Tissue Culture and Biotechnology 27, no. 1 (December 27, 2017): 89–140. http://dx.doi.org/10.3329/ptcb.v27i1.35018.
Full textShamshurina, N. G. "THE SOCIAL PERSPECTIVES OF DIGITIZATION OF HEALTH CARE: THE MEDICAL SOCIOLOGICAL ASPECT." Sociology of Medicine 18, no. 1 (June 15, 2019): 50–54. http://dx.doi.org/10.18821/1728-2810-2019-18-1-50-54.
Full textMott, Richard, Christian Fischer, Pjotr Prins, and Robert William Davies. "Private Genomes and Public SNPs: Homomorphic Encryption of Genotypes and Phenotypes for Shared Quantitative Genetics." Genetics 215, no. 2 (April 23, 2020): 359–72. http://dx.doi.org/10.1534/genetics.120.303153.
Full textMokhov, A. A. "Genome Registration in Russia: Problems and Prospects of Development." Actual Problems of Russian Law 15, no. 7 (August 7, 2020): 103–13. http://dx.doi.org/10.17803/1994-1471.2020.116.7.103-113.
Full textAllen, Caitlin G., Leslie Lenert, Kelly Hunt, Amy Jackson, Elissa Levin, Catherine Clinton, John T. Clark, et al. "Lessons Learned from the Pilot Phase of a Population-Wide Genomic Screening Program: Building the Base to Reach a Diverse Cohort of 100,000 Participants." Journal of Personalized Medicine 12, no. 8 (July 27, 2022): 1228. http://dx.doi.org/10.3390/jpm12081228.
Full textBird, Stephanie J. "Security and Privacy: Why Privacy Matters." Science and Engineering Ethics 19, no. 3 (July 27, 2013): 669–71. http://dx.doi.org/10.1007/s11948-013-9458-z.
Full textGuynes, Carl S., Grichard G. Vedder, and Michael T. Vanecek. "Privacy and security." ACM SIGCAS Computers and Society 26, no. 1 (March 1996): 11–13. http://dx.doi.org/10.1145/229403.229409.
Full textWalters, Gregory J. "Privacy and security." ACM SIGCAS Computers and Society 31, no. 2 (June 2001): 8–23. http://dx.doi.org/10.1145/503345.503347.
Full textMilojicic, D. "Security and privacy." IEEE Concurrency 8, no. 2 (April 2000): 70–79. http://dx.doi.org/10.1109/mcc.2000.846196.
Full textKenneally, Erin. "Privacy and Security." IEEE Internet of Things Magazine 1, no. 1 (September 2018): 8–10. http://dx.doi.org/10.1109/miot.2018.8552484.
Full textPujals, Joseph M. "Security and privacy." Computers & Security 12, no. 1 (February 1993): 22–27. http://dx.doi.org/10.1016/0167-4048(93)90005-p.
Full textO’Brien, Ralph. "Privacy and security." Business Information Review 33, no. 2 (June 2016): 81–84. http://dx.doi.org/10.1177/0266382116650297.
Full textJasny, Barbara R. "Genomic crowdsourcing with privacy." Science 360, no. 6393 (June 7, 2018): 1083.6–1084. http://dx.doi.org/10.1126/science.360.6393.1083-f.
Full textIreni-Saban, Liza. "Genomics Governance in the United States and the United Kingdom." European Journal of Comparative Law and Governance 1, no. 3 (July 13, 2014): 244–65. http://dx.doi.org/10.1163/22134514-00103003.
Full textGostin, Lawrence O. "Genetic Privacy." Journal of Law, Medicine & Ethics 23, no. 4 (1995): 320–30. http://dx.doi.org/10.1111/j.1748-720x.1995.tb01374.x.
Full textKumar, Ritik, Arjunaditya, Divyangi Singh, Kathiravan Srinivasan, and Yuh-Chung Hu. "AI-Powered Blockchain Technology for Public Health: A Contemporary Review, Open Challenges, and Future Research Directions." Healthcare 11, no. 1 (December 27, 2022): 81. http://dx.doi.org/10.3390/healthcare11010081.
Full textLever, Annabelle. "Privacy, democracy, and security." Philosophers' Magazine, no. 63 (2013): 99–105. http://dx.doi.org/10.5840/tpm201363133.
Full textHwang, Seoyeon, Ercan Ozturk, and Gene Tsudik. "Balancing Security and Privacy in Genomic Range Queries*." ACM Transactions on Privacy and Security, December 9, 2022. http://dx.doi.org/10.1145/3575796.
Full textAlsaffar, Muhalb M., Mohammad Hasan, Gavin P. McStay, and Mohamed Sedky. "Digital DNA lifecycle security and privacy: an overview." Briefings in Bioinformatics 23, no. 2 (January 31, 2022). http://dx.doi.org/10.1093/bib/bbab607.
Full text