Добірка наукової літератури з теми "Genomic security and privacy"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Genomic security and privacy".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Genomic security and privacy"
Mohammed Yakubu, Abukari, and Yi-Ping Phoebe Chen. "Ensuring privacy and security of genomic data and functionalities." Briefings in Bioinformatics 21, no. 2 (February 12, 2019): 511–26. http://dx.doi.org/10.1093/bib/bbz013.
Повний текст джерелаSchwab, Abraham P., Hung S. Luu, Jason Wang, and Jason Y. Park. "Genomic Privacy." Clinical Chemistry 64, no. 12 (December 1, 2018): 1696–703. http://dx.doi.org/10.1373/clinchem.2018.289512.
Повний текст джерелаPark, Young-Hoon, Yejin Kim, and Junho Shim. "Blockchain-Based Privacy-Preserving System for Genomic Data Management Using Local Differential Privacy." Electronics 10, no. 23 (December 3, 2021): 3019. http://dx.doi.org/10.3390/electronics10233019.
Повний текст джерелаLlorente, Silvia, and Jaime Delgado. "Implementation of Privacy and Security for a Genomic Information System Based on Standards." Journal of Personalized Medicine 12, no. 6 (May 31, 2022): 915. http://dx.doi.org/10.3390/jpm12060915.
Повний текст джерелаMittos, Alexandros, Bradley Malin, and Emiliano De Cristofaro. "Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 87–107. http://dx.doi.org/10.2478/popets-2019-0006.
Повний текст джерелаAsgiani, Piping, Chriswardani Suryawati, and Farid Agushybana. "A literature review: Security Aspects in the Implementation of Electronic Medical Records in Hospitals." MEDIA ILMU KESEHATAN 10, no. 2 (January 29, 2022): 161–66. http://dx.doi.org/10.30989/mik.v10i2.561.
Повний текст джерелаVillanueva, Angela G., Robert Cook-Deegan, Jill O. Robinson, Amy L. McGuire, and Mary A. Majumder. "Genomic Data-Sharing Practices." Journal of Law, Medicine & Ethics 47, no. 1 (2019): 31–40. http://dx.doi.org/10.1177/1073110519840482.
Повний текст джерелаLerner, Barbara, Deborah Passey, Nina Sperber, and Sara Knight. "OP043: The evolving attitude towards privacy and security of personal genomic data." Genetics in Medicine 24, no. 3 (March 2022): S369. http://dx.doi.org/10.1016/j.gim.2022.01.590.
Повний текст джерелаCarter, Alexis B. "Considerations for Genomic Data Privacy and Security when Working in the Cloud." Journal of Molecular Diagnostics 21, no. 4 (July 2019): 542–52. http://dx.doi.org/10.1016/j.jmoldx.2018.07.009.
Повний текст джерелаDoll, Bruce, Mauricio J. De Castro, Melissa H. Fries, Arnyce R. Pock, Diane Seibert, and Wendy Yang. "Precision Medicine—A Demand Signal for Genomics Education." Military Medicine 187, Supplement_1 (December 30, 2021): 40–46. http://dx.doi.org/10.1093/milmed/usab406.
Повний текст джерелаДисертації з теми "Genomic security and privacy"
Shang, Hui. "Privacy Preserving Kin Genomic Data Publishing." Miami University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=miami1594835227299524.
Повний текст джерелаFischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /." Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.
Повний текст джерелаЛитвиненко, Галина Іванівна, Галина Ивановна Литвиненко, Halyna Ivanivna Lytvynenko, and R. Pelepei. "Internet security and privacy." Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/16048.
Повний текст джерелаNaro, Daniel. "Security strategies in genomic files." Doctoral thesis, Universitat Politècnica de Catalunya, 2020. http://hdl.handle.net/10803/669108.
Повний текст джерелаHi han nous mètodes per la seqüenciació i el processament del codi genòmic, permetent descobrir eines de diagnòstic i tractaments en l’àmbit mèdic. El resultat de la seqüenciació d’un genoma es representa en un fitxer, que pot ocupar centenars de gigabytes. Degut a això, hi ha una necessitat d’una representació estandarditzada on la informació és comprimida. Dins de la ISO, el grup MPEG ha fet servir la seva experiència en compressió de dades multimèdia per comprimir dades genòmiques i desenvolupar l'estàndard MPEG-G, sent la seguretat un dels requeriments principals. L'objectiu de la tesi és garantir aquesta seguretat (encriptant, firmant i definint regles d¿ accés) tan per les dades seqüenciades com per les seves metadades. El primer pas és definir com transportar les dades, metadades i paràmetres de seguretat. Especifiquem un format de fitxer basat en contenidors per tal d'agrupar aquets elements a nivell sintàctic. La nostra solució proposa noves funcionalitats com agrupar múltiples resultats en un mateix fitxer. Pel que fa la seguretat de dades, la nostra proposta utilitza les propietats de la sortida del codificador. Aquesta sortida és estructurada en unitats, cadascuna dedicada a una regió concreta del genoma, permetent una encriptació i firma de dades específica a la unitat. Analitzem el compromís entre seguretat i un enfocament de gra més fi demostrant que configuracions aparentment vàlides poden no ser-ho: si es permet encriptar sols certes sub-unitats d'informació, creuant els continguts no encriptats, podem inferir el contingut encriptat. Quant a metadades, proposem una solució basada en XML separada en una especificació bàsica i en extensions. Podem adaptar l'esquema de metadades als diferents marcs de repositoris genòmics, sense imposar requeriments d’un marc a un altre. Per simplificar l'ús, plantegem la definició de perfils, és a dir, una llista de les extensions que han de ser present per un marc concret. Fem servir firmes XML i encriptació XML per implementar la seguretat de les metadades. Les nostres solucions per la privacitat limiten qui té accés a les dades, però no en limita l’ús. Proposem regles d’accés representades amb XACML per indicar en quines circumstàncies un usuari té dret d'executar una de les accions especificades a l'API de MPEG-G (per exemple, filtrar les dades per atributs). Presentem algoritmes per combinar regles, per tal de poder definir casos per defecte i excepcions. Els mecanismes de seguretat de MPEG-G protegeixen la informació durant el transport i l'accés. Una vegada l’usuari ha accedit a les dades, les podria publicar. Per tal d'identificar qui és l'origen del filtratge de dades, proposem un algoritme que genera modificacions úniques i virtualment no detectables. La nostra solució és pionera, ja que els canvis es poden desfer si el secret corresponent és publicat. Per tant, la utilitat de les dades és mantinguda. Demostrem que combinant varis secrets, podem evitar col·lusions. L'API seleccionada per MPEG-G, considera criteris de cerca que no són presents en les taules d’indexació. Basant-nos en aquesta API, hem desenvolupat una solució. És basada en un marc de col·laboració, on la combinació de les necessitats dels diferents usuaris i els requeriments de privacitat del pacient, es combinen en una representació ad-hoc que optimitza temps d’accessos tot i garantint la privacitat i autenticitat de les dades. La majoria de les nostres propostes s’han inclòs a la versió final de l'estàndard, fusionant-les amb altres proposes (com amb el format del fitxer), demostrant la seva superioritat (com amb els mecanismes de seguretat), i fins i tot sent acceptades directament (com amb les regles de privacitat).
Haver, Torstein. "Security and Privacy in RFID Applications." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9325.
Повний текст джерелаRadio Frequency Identification (RFID) is a very versatile technology. It has the potential to increase the efficiency of many common applications and is thus becoming increasingly popular. The main drawback is that the general principles the technology is built on are very vulnerable to attack. The ID imbedded in every chip combined with the openness of the radio interface exposes the users to tracking. As additional sensitive information may be stored on the tags, the user may also be exposed to other security and privacy threats. This thesis investigates how easily the reading distance of RFID tags can be increased by modifying a regular reader. A thorough presentation of general privacy and security threats to RFID systems is also given together with an analysis of how the results from the experiments influence these threats. General countermeasures to defend against threats are also evaluated. Finally, the thesis investigates how easily a user can reduce the reading distance of tags he is carrying by physical shielding. The general results are that moderately increasing the reading distance of RFID tags by modifying a regular reader is possible. It is, however, not trivial. Given that the attacker has extensive knowledge of the technology and its implementation, obtaining extensive increases in reading distance by using very sophisticated techniques may be possible. Users can, on the other hand, relatively easily decrease the reading distances of tags by physically shielding them. The obtainable reading distance using an electronics hobbyists tools, skills and knowledge is sufficient to greatly simplify the execution of several attacks aimed at RFID systems. As the technological development is likely to increase the obtainable reading distance even further, inclusion of on-tag security measures for the future is of great importance.
DeYoung, Mark E. "Privacy Preserving Network Security Data Analytics." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82909.
Повний текст джерелаPh. D.
Groat, Stephen Lawrence. "Privacy and Security in IPv6 Addressing." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/76978.
Повний текст джерелаMaster of Science
Taylor, Vincent. "Security and privacy in app ecosystems." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:01f3b0ca-b24e-4949-9efa-ec56dfba7a36.
Повний текст джерелаPurandare, Darshan. "ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY." Master's thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2998.
Повний текст джерелаM.S.
School of Computer Science
Engineering and Computer Science
Computer Science
Wakim, Mike. "Employing Android Security Features for Enhanced Security and Privacy Preservation." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36353.
Повний текст джерелаКниги з теми "Genomic security and privacy"
Stănică, Pantelimon, Sugata Gangopadhyay, and Sumit Kumar Debnath, eds. Security and Privacy. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6781-4.
Повний текст джерелаStănică, Pantelimon, Sihem Mesnager, and Sumit Kumar Debnath, eds. Security and Privacy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90553-8.
Повний текст джерелаNandi, Sukumar, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, and Parvez Faruki, eds. Security and Privacy. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7561-3.
Повний текст джерелаStalla-Bourdillon, Sophie, Joshua Phillips, and Mark D. Ryan. Privacy vs. Security. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9.
Повний текст джерелаInstitute, Pennsylvania Bar. Privacy and security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2006.
Знайти повний текст джерелаMather, Tim. Cloud security and privacy. Beijing: O'Reilly, 2009.
Знайти повний текст джерелаKierkegaard, Sylvia Mercado. Cyberlaw, security and privacy. Ankara, Turkey: Ankara Bar Association Press, 2007.
Знайти повний текст джерелаBaek, Joonsang, and Sushmita Ruj, eds. Information Security and Privacy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5.
Повний текст джерелаLi, Yingjiu, Robert H. Deng, and Elisa Bertino. RFID Security and Privacy. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-02340-8.
Повний текст джерелаBoyd, Colin, and Leonie Simpson, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39059-3.
Повний текст джерелаЧастини книг з теми "Genomic security and privacy"
Humbert, Mathias, Erman Ayday, Jean-Pierre Hubaux, and Amalio Telenti. "On Non-cooperative Genomic Privacy." In Financial Cryptography and Data Security, 407–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_24.
Повний текст джерелаAyday, Erman. "Cryptographic Solutions for Genomic Privacy." In Financial Cryptography and Data Security, 328–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53357-4_22.
Повний текст джерелаAyday, Erman, Jean Louis Raisaro, Urs Hengartner, Adam Molyneaux, and Jean-Pierre Hubaux. "Privacy-Preserving Processing of Raw Genomic Data." In Data Privacy Management and Autonomous Spontaneous Security, 133–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54568-9_9.
Повний текст джерелаAyday, Erman. "Genome Privacy." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1563-1.
Повний текст джерелаTeruya, Tadanori, Koji Nuida, Kana Shimizu, and Goichiro Hanaoka. "On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data." In Advances in Information and Computer Security, 242–61. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22425-1_15.
Повний текст джерелаDemmler, Daniel, Kay Hamacher, Thomas Schneider, and Sebastian Stammler. "Privacy-Preserving Whole-Genome Variant Queries." In Cryptology and Network Security, 71–92. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02641-7_4.
Повний текст джерелаZhang, Yanjun, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, and Ryan K. L. Ko. "Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis." In Computer Security – ESORICS 2021, 395–416. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88428-4_20.
Повний текст джерелаHuynh, Hiep Xuan, Toan Bao Tran, Quyen Ngoc Pham, and Hai Thanh Nguyen. "Genome-Wide Association Analysis for Oat Genetics Using Support Vector Machines." In Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 452–60. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4370-2_33.
Повний текст джерелаBurmester, Mike, Yvo Desmedt, Rebecca N. Wright, and Alec Yasinsac. "Accountable Privacy." In Security Protocols, 83–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11861386_10.
Повний текст джерелаVakalis, Ioannis. "Airport Security Controls." In Digital Privacy, 721–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19050-6_27.
Повний текст джерелаТези доповідей конференцій з теми "Genomic security and privacy"
Ayday, Erman, and Jean-Pierre Hubaux. "Privacy and Security in the Genomic Era." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2976749.2976751.
Повний текст джерелаWagner, Isabel. "Genomic Privacy Metrics: A Systematic Comparison." In 2015 IEEE Security and Privacy Workshops (SPW). IEEE, 2015. http://dx.doi.org/10.1109/spw.2015.15.
Повний текст джерелаJha, Somesh, Louis Kruger, and Vitaly Shmatikov. "Towards Practical Privacy for Genomic Computation." In 2008 IEEE Symposium on Security and Privacy (sp 2008). IEEE, 2008. http://dx.doi.org/10.1109/sp.2008.34.
Повний текст джерелаNaveed, Muhammad. "Hurdles for Genomic Data Usage Management." In 2014 IEEE Security and Privacy Workshops (SPW). IEEE, 2014. http://dx.doi.org/10.1109/spw.2014.44.
Повний текст джерелаNamazi, Mina, Juan Ramón Troncoso-Pastoriza, and Fernando Pérez-González. "Dynamic Privacy-Preserving Genomic Susceptibility Testing." In IH&MMSec '16: ACM Information Hiding and Multimedia Security Workshop. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2909827.2930791.
Повний текст джерелаYilmaz, Emre, Erman Ayday, Tianxi Ji, and Pan Li. "Preserving Genomic Privacy via Selective Sharing." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3411497.3420214.
Повний текст джерелаDing, Xuhua, Ercan Ozturk, and Gene Tsudik. "Balancing Security and Privacy in Genomic Range Queries." In the 18th ACM Workshop. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3338498.3358652.
Повний текст джерелаOprisanu, Bristena, Georgi Ganev, and Emiliano De Cristofaro. "On Utility and Privacy in Synthetic Genomic Data." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.24092.
Повний текст джерелаGoodrich, Michael T. "The Mastermind Attack on Genomic Data." In 2009 30th IEEE Symposium on Security and Privacy (SP). IEEE, 2009. http://dx.doi.org/10.1109/sp.2009.4.
Повний текст джерелаHuang, Zhicong, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, and Ari Juels. "GenoGuard: Protecting Genomic Data against Brute-Force Attacks." In 2015 IEEE Symposium on Security and Privacy (SP). IEEE, 2015. http://dx.doi.org/10.1109/sp.2015.34.
Повний текст джерелаЗвіти організацій з теми "Genomic security and privacy"
Weinberger, P., C. Callan, W. Dally, A. Peterson, and W. Press. Security and Privacy in the NII,. Fort Belvoir, VA: Defense Technical Information Center, February 1995. http://dx.doi.org/10.21236/ada293475.
Повний текст джерелаElkins, M. MIME Security with Pretty Good Privacy (PGP). RFC Editor, October 1996. http://dx.doi.org/10.17487/rfc2015.
Повний текст джерелаSmith, S. W., and J. D. Tygar. Security and Privacy for Partial Order Time. Fort Belvoir, VA: Defense Technical Information Center, April 1994. http://dx.doi.org/10.21236/ada278953.
Повний текст джерелаCooper, A., F. Gont, and D. Thaler. Security and Privacy Considerations for IPv6 Address Generation Mechanisms. RFC Editor, March 2016. http://dx.doi.org/10.17487/rfc7721.
Повний текст джерелаGilbert, Dennis M. 1989 Computer Security and Privacy Plans (CSSP) review project:. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4409.
Повний текст джерелаJansen, W., and T. Grance. Guidelines on security and privacy in public cloud computing. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-144.
Повний текст джерелаHaney, Julie M., Susanne M. Furman, and Yasemin Acar. Research Report: User Perceptions of Smart Home Privacy and Security. National Institute of Standards and Technology, November 2020. http://dx.doi.org/10.6028/nist.ir.8330.
Повний текст джерелаHuitema, C., and D. Kaiser. DNS-Based Service Discovery (DNS-SD) Privacy and Security Requirements. RFC Editor, September 2020. http://dx.doi.org/10.17487/rfc8882.
Повний текст джерелаMehta, Ketan. Security and Privacy Considerations for Implementing Mobile Driving License (mDL). Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8440.
Повний текст джерелаFainman, Y. Quantum and Classical Cryptography for Security and Privacy of Photonic Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada388577.
Повний текст джерела