Academic literature on the topic 'Privacy attacks on genomic data'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy attacks on genomic data.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy attacks on genomic data"
Ayoz, Kerem, Erman Ayday, and A. Ercument Cicek. "Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons." Proceedings on Privacy Enhancing Technologies 2021, no. 3 (April 27, 2021): 28–48. http://dx.doi.org/10.2478/popets-2021-0036.
Full textAlmadhoun, Nour, Erman Ayday, and Özgür Ulusoy. "Inference attacks against differentially private query results from genomic datasets including dependent tuples." Bioinformatics 36, Supplement_1 (July 1, 2020): i136—i145. http://dx.doi.org/10.1093/bioinformatics/btaa475.
Full textMohammed Yakubu, Abukari, and Yi-Ping Phoebe Chen. "Ensuring privacy and security of genomic data and functionalities." Briefings in Bioinformatics 21, no. 2 (February 12, 2019): 511–26. http://dx.doi.org/10.1093/bib/bbz013.
Full textRaisaro, Jean Louis, Florian Tramèr, Zhanglong Ji, Diyue Bu, Yongan Zhao, Knox Carey, David Lloyd, et al. "Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks." Journal of the American Medical Informatics Association 24, no. 4 (February 20, 2017): 799–805. http://dx.doi.org/10.1093/jamia/ocw167.
Full textAziz, Md Momin Al, Shahin Kamali, Noman Mohammed, and Xiaoqian Jiang. "Online Algorithm for Differentially Private Genome-wide Association Studies." ACM Transactions on Computing for Healthcare 2, no. 2 (March 2021): 1–27. http://dx.doi.org/10.1145/3431504.
Full textÖksüz, Abdullah Çağlar, Erman Ayday, and Uğur Güdükbay. "Privacy-preserving and robust watermarking on sequential genome data using belief propagation and local differential privacy." Bioinformatics 37, no. 17 (February 25, 2021): 2668–74. http://dx.doi.org/10.1093/bioinformatics/btab128.
Full textAyoz, Kerem, Miray Aysen, Erman Ayday, and A. Ercument Cicek. "The effect of kinship in re-identification attacks against genomic data sharing beacons." Bioinformatics 36, Supplement_2 (December 2020): i903—i910. http://dx.doi.org/10.1093/bioinformatics/btaa821.
Full textHumbert, Mathias, Kévin Huguenin, Joachim Hugonot, Erman Ayday, and Jean-Pierre Hubaux. "De-anonymizing Genomic Databases Using Phenotypic Traits." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (June 1, 2015): 99–114. http://dx.doi.org/10.1515/popets-2015-0020.
Full textAsgiani, Piping, Chriswardani Suryawati, and Farid Agushybana. "A literature review: Security Aspects in the Implementation of Electronic Medical Records in Hospitals." MEDIA ILMU KESEHATAN 10, no. 2 (January 29, 2022): 161–66. http://dx.doi.org/10.30989/mik.v10i2.561.
Full textNarayan, Ashwin. "Current regulations will not protect patient privacy in the age of machine learning." MIT Science Policy Review 1 (August 20, 2020): 3–9. http://dx.doi.org/10.38105/spr.ax4o7jkyr3.
Full textDissertations / Theses on the topic "Privacy attacks on genomic data"
Shang, Hui. "Privacy Preserving Kin Genomic Data Publishing." Miami University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=miami1594835227299524.
Full textMaouche, Mohamed. "Protection against re-identification attacks in location privacy." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI089.
Full textWith the wide propagation of handheld devices, more and more mobile sensors are being used by end users on a daily basis. Those sensors could be leveraged to gather useful mobility data for city planners, business analysts and researches. However, gathering and exploiting mobility data raises many privacy threats. Sensitive information such as one’s home or workplace, hobbies, religious beliefs, political or sexual preferences can be inferred from the gathered data. In the last decade, Location Privacy Protection Mechanisms (LPPMs) have been proposed to protect user data privacy. They alter data mobility to enforce formal guarantees (e.g., k-anonymity or differential privacy), hide sensitive information (e.g., erase points of interests) or act as countermeasures for particular attacks. In this thesis, we focus on the threat of re-identification which aims at re-linking an anonymous mobility trace to the know past mobility of its user. First, we propose re-identification attacks (AP-Attack and ILL-Attack) that find vulnerabilities and stress current state-of-the-art LPPMs to quantify their effectiveness. We also propose a new protection mechanism HMC that uses heat maps to guide the transformation of mobility data to change the behaviour of a user, in order to make her look similar to someone else rather than her past self which preserves her from re-identification attacks. This alteration of mobility trace is constrained with the control of the utility of the data to minimize the distortion in the quality of the analysis realized on this data
Nuñez, del Prado Cortez Miguel. "Inference attacks on geolocated data." Thesis, Toulouse, INSA, 2013. http://www.theses.fr/2013ISAT0028/document.
Full textIn recent years, we have observed the development of connected and nomad devices suchas smartphones, tablets or even laptops allowing individuals to use location-based services(LBSs), which personalize the service they offer according to the positions of users, on a dailybasis. Nonetheless, LBSs raise serious privacy issues, which are often not perceived by the endusers. In this thesis, we are interested in the understanding of the privacy risks related to thedissemination and collection of location data. To address this issue, we developed inferenceattacks such as the extraction of points of interest (POI) and their semantics, the predictionof the next location as well as the de-anonymization of mobility traces, based on a mobilitymodel that we have coined as mobility Markov chain. Afterwards, we proposed a classificationof inference attacks in the context of location data based on the objectives of the adversary.In addition, we evaluated the effectiveness of some sanitization measures in limiting the efficiencyof inference attacks. Finally, we have developed a generic platform called GEPETO (forGEoPrivacy Enhancing Toolkit) that can be used to test the developed inference attacks
Chini, Foroushan Amir Hossein. "Protecting Location-Data Against Inference Attacks Using Pre-Defined Personas." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66792.
Full textMiracle, Jacob M. "De-Anonymization Attack Anatomy and Analysis of Ohio Nursing Workforce Data Anonymization." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1482825210051101.
Full textSun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.
Full textPh. D.
Sharma, Sagar. "Towards Data and Model Confidentiality in Outsourced Machine Learning." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1567529092809275.
Full textCarlander-Reuterfelt, Gallo Matias. "Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277921.
Full textSocial Manipulering som attackmetod har blivit ett ökande problem både för företag och individer. Från identitetsstöld till enorma ekonomiska förluster, är denna form av attack känd för att kunna påverka komplexa system, men är ofta i sig mycket enkel i sin form. Medans andra typer av cyberattacker kan skyddas med verktyg som antivirus och antimalware och tillförlitligt hålla privat och konfidentiell information säker så finns det inga motsvarande verktyg för att skydda sig mot Social Manipulering attacker. Det finns alltså inte idag ett pålitligt och säkert sätt att motstå Social Manipulering attacker och skydda personliga uppgifter och privat data. Syftet med denna rapport är att visa olika aspekterna hur datoranvändares data är sårbarhet för dessa typer av attacker, och med dessa utforma ett system som med viss mån av precision kan mäta resiliens mot Social Manipulering. Rapporten är ett resultat av studier av litteratur inom ämnet Social Manipulering och hur den relaterar sig till datorns data, konfiguration och personuppgifter. De olika delarna av utredningen leder var och en till ett mer omfattande sätt att koppla samman de olika uppgifterna och utforma ett rudimentärt sätt att uppskatta en persons resiliens mot Social Manipulering, detta genom att observera olika aspekter av datorns konfiguration. För syftet av rapporten så har uppgifterna varit rimligt tillgängliga, har respekterat integriteten och varit något som lätt kan anpassas från en användare till en annan. Baserat på observationerna av psykologiska data, beteendemönster och nätverkskonfigurationer, så kan vi dra slutsatsen att även om det finns data som stöder möjligheten att uppskatta resiliens, finns det idag inget empiriskt bevisat sätt att göra det på ett exakt sätt. En exempel av modell för att uppskatta resiliens finns i slutet av rapporten. Ramen för detta projekt gjorde det inte möjligt att göra ett praktiskt experiment för att validera teorierna.
Wilson, Aponte Natalia. "La protección de la intimidad y de la autonomía en relación con los datos genómicos." Doctoral thesis, Universitat de Girona, 2020. http://hdl.handle.net/10803/672234.
Full textEl tratamiento de datos genómicos puede causar serios problemas tanto a los titulares de los datos como a terceros, especialmente, respecto de la lesión de los derechos fundamentales a la intimidad y a la autonomía. Asimismo, el tratamiento de datos genómicos de los miembros de ciertas colectividades, puede chocar con los intereses de esta última y causar daños a sus miembros y a la colectividad. En la Tesis se examinan los riesgos relacionados con el uso inadecuado de los datos genómicos, teniendo en cuenta que es palmario encontrar un equilibrio entre los beneficios de la investigación genética y la necesidad de prevenir esos riesgos mediante la implementación de medidas de protección. Igualmente, se hace referencia a los mecanismos de tutela de carácter civil y administrativo con los que cuenta la víctima de un tratamiento de datos, cuando se ha causado un daño o se ha infringido el régimen jurídico correspondiente
Programa de Doctorat Interuniversitari en Dret, Economia i Empresa
"DeRef: a privacy-preserving defense mechanism against request forgery attacks." 2011. http://library.cuhk.edu.hk/record=b5894609.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (p. 58-63).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Background and Related Work --- p.7
Chapter 2.1 --- Request Forgery Attacks --- p.7
Chapter 2.2 --- Current Defense Approaches --- p.10
Chapter 2.3 --- Lessons Learned --- p.13
Chapter 3 --- Design of DeRef --- p.15
Chapter 3.1 --- Threat Model --- p.16
Chapter 3.2 --- Fine-Grained Access Control --- p.18
Chapter 3.3 --- Two-Phase Privacy-Preserving Checking --- p.24
Chapter 3.4 --- Putting It All Together --- p.29
Chapter 3.5 --- Implementation --- p.33
Chapter 4 --- Deployment Case Studies --- p.36
Chapter 4.1 --- WordPress --- p.37
Chapter 4.2 --- Joomla! and Drupal --- p.42
Chapter 5 --- Evaluation --- p.44
Chapter 5.1 --- Performance Overhead of DeRef in Real Deployment --- p.45
Chapter 5.2 --- Performance Overhead of DeRef with Various Configurations --- p.50
Chapter 6 --- Conclusions --- p.56
Bibliography --- p.58
Books on the topic "Privacy attacks on genomic data"
Privacy, California Legislature Senate Committee on. Informational hearing: Privacy vs. security : the increase [sic] tension between privacy and security issues as a result of the September 11th terrorist attack. Sacramento, Calif. [1020 N St., B-53, Sacramento 95814]: Senate Publications, 2001.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Protecting personal consumer information from cyber attacks and data breaches: Hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014. Washington: U.S. Government Publishing Office, 2014.
Find full textCalifornia. Legislature. Senate. Committee on Privacy. Informational hearing: Recent hacking of state employee records at the Teale Data Center. Sacramento, CA. [1020 N St., B-53, Sacramento 95814]: Senate Publications, 2002.
Find full textHallinan, Dara. Protecting Genetic Privacy in Biobanking through Data Protection Law. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192896476.001.0001.
Full textRegan, Priscilla M. Global Privacy Issues. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.205.
Full textBook chapters on the topic "Privacy attacks on genomic data"
Humbert, Mathias, Erman Ayday, Jean-Pierre Hubaux, and Amalio Telenti. "On Non-cooperative Genomic Privacy." In Financial Cryptography and Data Security, 407–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_24.
Full textAyday, Erman. "Cryptographic Solutions for Genomic Privacy." In Financial Cryptography and Data Security, 328–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53357-4_22.
Full textAyday, Erman, and Jean-Pierre Hubaux. "Threats and Solutions for Genomic Data Privacy." In Medical Data Privacy Handbook, 463–92. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23633-9_18.
Full textShen, Hong, and Jian Ma. "Privacy Challenges of Genomic Big Data." In Healthcare and Big Data Management, 139–48. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6041-0_8.
Full textEbrahimi, Maryam, Ahmed J. Obaid, and Kamran Yeganegi. "Protecting Cloud Data Privacy Against Attacks." In Learning and Analytics in Intelligent Systems, 421–34. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65407-8_37.
Full textQu, Youyang, Mohammad Reza Nosouhi, Lei Cui, and Shui Yu. "Leading Attacks in Privacy Protection Domain." In Personalized Privacy Protection in Big Data, 15–21. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3750-6_3.
Full textAyday, Erman, Jean Louis Raisaro, Urs Hengartner, Adam Molyneaux, and Jean-Pierre Hubaux. "Privacy-Preserving Processing of Raw Genomic Data." In Data Privacy Management and Autonomous Spontaneous Security, 133–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54568-9_9.
Full textLaouir, Ala Eddine, and Abdessamad Imine. "On Privacy of Multidimensional Data Against Aggregate Knowledge Attacks." In Privacy in Statistical Databases, 92–104. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13945-1_7.
Full textShirazi, Hossein, Bruhadeshwar Bezawada, Indrakshi Ray, and Charles Anderson. "Adversarial Sampling Attacks Against Phishing Detection." In Data and Applications Security and Privacy XXXIII, 83–101. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22479-0_5.
Full textGe, Linqiang, Wei Yu, Paul Moulema, Guobin Xu, David Griffith, and Nada Golmie. "Detecting Data Integrity Attacks in Smart Grid." In Security and Privacy in Cyber-Physical Systems, 281–303. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781119226079.ch14.
Full textConference papers on the topic "Privacy attacks on genomic data"
Huang, Zhicong, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, and Ari Juels. "GenoGuard: Protecting Genomic Data against Brute-Force Attacks." In 2015 IEEE Symposium on Security and Privacy (SP). IEEE, 2015. http://dx.doi.org/10.1109/sp.2015.34.
Full textGoodrich, Michael T. "The Mastermind Attack on Genomic Data." In 2009 30th IEEE Symposium on Security and Privacy (SP). IEEE, 2009. http://dx.doi.org/10.1109/sp.2009.4.
Full textChen, Junjie, Wendy Hui Wang, and Xinghua Shi. "Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data." In Pacific Symposium on Biocomputing 2021. WORLD SCIENTIFIC, 2020. http://dx.doi.org/10.1142/9789811232701_0003.
Full textNaveed, Muhammad. "Hurdles for Genomic Data Usage Management." In 2014 IEEE Security and Privacy Workshops (SPW). IEEE, 2014. http://dx.doi.org/10.1109/spw.2014.44.
Full textSimmons, Sean, Bonnie Berger, and Cenk Sahinalp. "Protecting Genomic Data Privacy with Probabilistic Modeling." In Proceedings of the Pacific Symposium. WORLD SCIENTIFIC, 2018. http://dx.doi.org/10.1142/9789813279827_0037.
Full textPoon, Anna, Steve Jankly, and Tingting Chen. "Privacy Preserving Fisher’s Exact Test on Genomic Data." In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018. http://dx.doi.org/10.1109/bigdata.2018.8622575.
Full textShang, Hui, and Zaobo He. "Kin Genomic Data Inference Attacks Through Factor Graph." In 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW). IEEE, 2019. http://dx.doi.org/10.1109/massw.2019.00010.
Full textYilmaz, Emre, Tianxi Ji, Erman Ayday, and Pan Li. "Genomic Data Sharing under Dependent Local Differential Privacy." In CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508398.3511519.
Full textOprisanu, Bristena, Georgi Ganev, and Emiliano De Cristofaro. "On Utility and Privacy in Synthetic Genomic Data." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.24092.
Full textGkountouna, O., K. Lepenioti, and M. Terrovitis. "Privacy against aggregate knowledge attacks." In 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW 2013). IEEE, 2013. http://dx.doi.org/10.1109/icdew.2013.6547435.
Full text