Добірка наукової літератури з теми "Privacy attacks on genomic data"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Privacy attacks on genomic data".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Privacy attacks on genomic data"
Ayoz, Kerem, Erman Ayday, and A. Ercument Cicek. "Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons." Proceedings on Privacy Enhancing Technologies 2021, no. 3 (April 27, 2021): 28–48. http://dx.doi.org/10.2478/popets-2021-0036.
Повний текст джерелаAlmadhoun, Nour, Erman Ayday, and Özgür Ulusoy. "Inference attacks against differentially private query results from genomic datasets including dependent tuples." Bioinformatics 36, Supplement_1 (July 1, 2020): i136—i145. http://dx.doi.org/10.1093/bioinformatics/btaa475.
Повний текст джерелаMohammed Yakubu, Abukari, and Yi-Ping Phoebe Chen. "Ensuring privacy and security of genomic data and functionalities." Briefings in Bioinformatics 21, no. 2 (February 12, 2019): 511–26. http://dx.doi.org/10.1093/bib/bbz013.
Повний текст джерелаRaisaro, Jean Louis, Florian Tramèr, Zhanglong Ji, Diyue Bu, Yongan Zhao, Knox Carey, David Lloyd, et al. "Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks." Journal of the American Medical Informatics Association 24, no. 4 (February 20, 2017): 799–805. http://dx.doi.org/10.1093/jamia/ocw167.
Повний текст джерелаAziz, Md Momin Al, Shahin Kamali, Noman Mohammed, and Xiaoqian Jiang. "Online Algorithm for Differentially Private Genome-wide Association Studies." ACM Transactions on Computing for Healthcare 2, no. 2 (March 2021): 1–27. http://dx.doi.org/10.1145/3431504.
Повний текст джерелаÖksüz, Abdullah Çağlar, Erman Ayday, and Uğur Güdükbay. "Privacy-preserving and robust watermarking on sequential genome data using belief propagation and local differential privacy." Bioinformatics 37, no. 17 (February 25, 2021): 2668–74. http://dx.doi.org/10.1093/bioinformatics/btab128.
Повний текст джерелаAyoz, Kerem, Miray Aysen, Erman Ayday, and A. Ercument Cicek. "The effect of kinship in re-identification attacks against genomic data sharing beacons." Bioinformatics 36, Supplement_2 (December 2020): i903—i910. http://dx.doi.org/10.1093/bioinformatics/btaa821.
Повний текст джерелаHumbert, Mathias, Kévin Huguenin, Joachim Hugonot, Erman Ayday, and Jean-Pierre Hubaux. "De-anonymizing Genomic Databases Using Phenotypic Traits." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (June 1, 2015): 99–114. http://dx.doi.org/10.1515/popets-2015-0020.
Повний текст джерелаAsgiani, Piping, Chriswardani Suryawati, and Farid Agushybana. "A literature review: Security Aspects in the Implementation of Electronic Medical Records in Hospitals." MEDIA ILMU KESEHATAN 10, no. 2 (January 29, 2022): 161–66. http://dx.doi.org/10.30989/mik.v10i2.561.
Повний текст джерелаNarayan, Ashwin. "Current regulations will not protect patient privacy in the age of machine learning." MIT Science Policy Review 1 (August 20, 2020): 3–9. http://dx.doi.org/10.38105/spr.ax4o7jkyr3.
Повний текст джерелаДисертації з теми "Privacy attacks on genomic data"
Shang, Hui. "Privacy Preserving Kin Genomic Data Publishing." Miami University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=miami1594835227299524.
Повний текст джерелаMaouche, Mohamed. "Protection against re-identification attacks in location privacy." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI089.
Повний текст джерелаWith the wide propagation of handheld devices, more and more mobile sensors are being used by end users on a daily basis. Those sensors could be leveraged to gather useful mobility data for city planners, business analysts and researches. However, gathering and exploiting mobility data raises many privacy threats. Sensitive information such as one’s home or workplace, hobbies, religious beliefs, political or sexual preferences can be inferred from the gathered data. In the last decade, Location Privacy Protection Mechanisms (LPPMs) have been proposed to protect user data privacy. They alter data mobility to enforce formal guarantees (e.g., k-anonymity or differential privacy), hide sensitive information (e.g., erase points of interests) or act as countermeasures for particular attacks. In this thesis, we focus on the threat of re-identification which aims at re-linking an anonymous mobility trace to the know past mobility of its user. First, we propose re-identification attacks (AP-Attack and ILL-Attack) that find vulnerabilities and stress current state-of-the-art LPPMs to quantify their effectiveness. We also propose a new protection mechanism HMC that uses heat maps to guide the transformation of mobility data to change the behaviour of a user, in order to make her look similar to someone else rather than her past self which preserves her from re-identification attacks. This alteration of mobility trace is constrained with the control of the utility of the data to minimize the distortion in the quality of the analysis realized on this data
Nuñez, del Prado Cortez Miguel. "Inference attacks on geolocated data." Thesis, Toulouse, INSA, 2013. http://www.theses.fr/2013ISAT0028/document.
Повний текст джерелаIn recent years, we have observed the development of connected and nomad devices suchas smartphones, tablets or even laptops allowing individuals to use location-based services(LBSs), which personalize the service they offer according to the positions of users, on a dailybasis. Nonetheless, LBSs raise serious privacy issues, which are often not perceived by the endusers. In this thesis, we are interested in the understanding of the privacy risks related to thedissemination and collection of location data. To address this issue, we developed inferenceattacks such as the extraction of points of interest (POI) and their semantics, the predictionof the next location as well as the de-anonymization of mobility traces, based on a mobilitymodel that we have coined as mobility Markov chain. Afterwards, we proposed a classificationof inference attacks in the context of location data based on the objectives of the adversary.In addition, we evaluated the effectiveness of some sanitization measures in limiting the efficiencyof inference attacks. Finally, we have developed a generic platform called GEPETO (forGEoPrivacy Enhancing Toolkit) that can be used to test the developed inference attacks
Chini, Foroushan Amir Hossein. "Protecting Location-Data Against Inference Attacks Using Pre-Defined Personas." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66792.
Повний текст джерелаMiracle, Jacob M. "De-Anonymization Attack Anatomy and Analysis of Ohio Nursing Workforce Data Anonymization." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1482825210051101.
Повний текст джерелаSun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.
Повний текст джерелаPh. D.
Sharma, Sagar. "Towards Data and Model Confidentiality in Outsourced Machine Learning." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1567529092809275.
Повний текст джерелаCarlander-Reuterfelt, Gallo Matias. "Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277921.
Повний текст джерелаSocial Manipulering som attackmetod har blivit ett ökande problem både för företag och individer. Från identitetsstöld till enorma ekonomiska förluster, är denna form av attack känd för att kunna påverka komplexa system, men är ofta i sig mycket enkel i sin form. Medans andra typer av cyberattacker kan skyddas med verktyg som antivirus och antimalware och tillförlitligt hålla privat och konfidentiell information säker så finns det inga motsvarande verktyg för att skydda sig mot Social Manipulering attacker. Det finns alltså inte idag ett pålitligt och säkert sätt att motstå Social Manipulering attacker och skydda personliga uppgifter och privat data. Syftet med denna rapport är att visa olika aspekterna hur datoranvändares data är sårbarhet för dessa typer av attacker, och med dessa utforma ett system som med viss mån av precision kan mäta resiliens mot Social Manipulering. Rapporten är ett resultat av studier av litteratur inom ämnet Social Manipulering och hur den relaterar sig till datorns data, konfiguration och personuppgifter. De olika delarna av utredningen leder var och en till ett mer omfattande sätt att koppla samman de olika uppgifterna och utforma ett rudimentärt sätt att uppskatta en persons resiliens mot Social Manipulering, detta genom att observera olika aspekter av datorns konfiguration. För syftet av rapporten så har uppgifterna varit rimligt tillgängliga, har respekterat integriteten och varit något som lätt kan anpassas från en användare till en annan. Baserat på observationerna av psykologiska data, beteendemönster och nätverkskonfigurationer, så kan vi dra slutsatsen att även om det finns data som stöder möjligheten att uppskatta resiliens, finns det idag inget empiriskt bevisat sätt att göra det på ett exakt sätt. En exempel av modell för att uppskatta resiliens finns i slutet av rapporten. Ramen för detta projekt gjorde det inte möjligt att göra ett praktiskt experiment för att validera teorierna.
Wilson, Aponte Natalia. "La protección de la intimidad y de la autonomía en relación con los datos genómicos." Doctoral thesis, Universitat de Girona, 2020. http://hdl.handle.net/10803/672234.
Повний текст джерелаEl tratamiento de datos genómicos puede causar serios problemas tanto a los titulares de los datos como a terceros, especialmente, respecto de la lesión de los derechos fundamentales a la intimidad y a la autonomía. Asimismo, el tratamiento de datos genómicos de los miembros de ciertas colectividades, puede chocar con los intereses de esta última y causar daños a sus miembros y a la colectividad. En la Tesis se examinan los riesgos relacionados con el uso inadecuado de los datos genómicos, teniendo en cuenta que es palmario encontrar un equilibrio entre los beneficios de la investigación genética y la necesidad de prevenir esos riesgos mediante la implementación de medidas de protección. Igualmente, se hace referencia a los mecanismos de tutela de carácter civil y administrativo con los que cuenta la víctima de un tratamiento de datos, cuando se ha causado un daño o se ha infringido el régimen jurídico correspondiente
Programa de Doctorat Interuniversitari en Dret, Economia i Empresa
"DeRef: a privacy-preserving defense mechanism against request forgery attacks." 2011. http://library.cuhk.edu.hk/record=b5894609.
Повний текст джерелаThesis (M.Phil.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (p. 58-63).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Background and Related Work --- p.7
Chapter 2.1 --- Request Forgery Attacks --- p.7
Chapter 2.2 --- Current Defense Approaches --- p.10
Chapter 2.3 --- Lessons Learned --- p.13
Chapter 3 --- Design of DeRef --- p.15
Chapter 3.1 --- Threat Model --- p.16
Chapter 3.2 --- Fine-Grained Access Control --- p.18
Chapter 3.3 --- Two-Phase Privacy-Preserving Checking --- p.24
Chapter 3.4 --- Putting It All Together --- p.29
Chapter 3.5 --- Implementation --- p.33
Chapter 4 --- Deployment Case Studies --- p.36
Chapter 4.1 --- WordPress --- p.37
Chapter 4.2 --- Joomla! and Drupal --- p.42
Chapter 5 --- Evaluation --- p.44
Chapter 5.1 --- Performance Overhead of DeRef in Real Deployment --- p.45
Chapter 5.2 --- Performance Overhead of DeRef with Various Configurations --- p.50
Chapter 6 --- Conclusions --- p.56
Bibliography --- p.58
Книги з теми "Privacy attacks on genomic data"
Privacy, California Legislature Senate Committee on. Informational hearing: Privacy vs. security : the increase [sic] tension between privacy and security issues as a result of the September 11th terrorist attack. Sacramento, Calif. [1020 N St., B-53, Sacramento 95814]: Senate Publications, 2001.
Знайти повний текст джерелаUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Protecting personal consumer information from cyber attacks and data breaches: Hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014. Washington: U.S. Government Publishing Office, 2014.
Знайти повний текст джерелаCalifornia. Legislature. Senate. Committee on Privacy. Informational hearing: Recent hacking of state employee records at the Teale Data Center. Sacramento, CA. [1020 N St., B-53, Sacramento 95814]: Senate Publications, 2002.
Знайти повний текст джерелаHallinan, Dara. Protecting Genetic Privacy in Biobanking through Data Protection Law. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192896476.001.0001.
Повний текст джерелаRegan, Priscilla M. Global Privacy Issues. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.205.
Повний текст джерелаЧастини книг з теми "Privacy attacks on genomic data"
Humbert, Mathias, Erman Ayday, Jean-Pierre Hubaux, and Amalio Telenti. "On Non-cooperative Genomic Privacy." In Financial Cryptography and Data Security, 407–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47854-7_24.
Повний текст джерелаAyday, Erman. "Cryptographic Solutions for Genomic Privacy." In Financial Cryptography and Data Security, 328–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53357-4_22.
Повний текст джерелаAyday, Erman, and Jean-Pierre Hubaux. "Threats and Solutions for Genomic Data Privacy." In Medical Data Privacy Handbook, 463–92. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23633-9_18.
Повний текст джерелаShen, Hong, and Jian Ma. "Privacy Challenges of Genomic Big Data." In Healthcare and Big Data Management, 139–48. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6041-0_8.
Повний текст джерелаEbrahimi, Maryam, Ahmed J. Obaid, and Kamran Yeganegi. "Protecting Cloud Data Privacy Against Attacks." In Learning and Analytics in Intelligent Systems, 421–34. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65407-8_37.
Повний текст джерелаQu, Youyang, Mohammad Reza Nosouhi, Lei Cui, and Shui Yu. "Leading Attacks in Privacy Protection Domain." In Personalized Privacy Protection in Big Data, 15–21. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3750-6_3.
Повний текст джерелаAyday, Erman, Jean Louis Raisaro, Urs Hengartner, Adam Molyneaux, and Jean-Pierre Hubaux. "Privacy-Preserving Processing of Raw Genomic Data." In Data Privacy Management and Autonomous Spontaneous Security, 133–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54568-9_9.
Повний текст джерелаLaouir, Ala Eddine, and Abdessamad Imine. "On Privacy of Multidimensional Data Against Aggregate Knowledge Attacks." In Privacy in Statistical Databases, 92–104. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13945-1_7.
Повний текст джерелаShirazi, Hossein, Bruhadeshwar Bezawada, Indrakshi Ray, and Charles Anderson. "Adversarial Sampling Attacks Against Phishing Detection." In Data and Applications Security and Privacy XXXIII, 83–101. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22479-0_5.
Повний текст джерелаGe, Linqiang, Wei Yu, Paul Moulema, Guobin Xu, David Griffith, and Nada Golmie. "Detecting Data Integrity Attacks in Smart Grid." In Security and Privacy in Cyber-Physical Systems, 281–303. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781119226079.ch14.
Повний текст джерелаТези доповідей конференцій з теми "Privacy attacks on genomic data"
Huang, Zhicong, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, and Ari Juels. "GenoGuard: Protecting Genomic Data against Brute-Force Attacks." In 2015 IEEE Symposium on Security and Privacy (SP). IEEE, 2015. http://dx.doi.org/10.1109/sp.2015.34.
Повний текст джерелаGoodrich, Michael T. "The Mastermind Attack on Genomic Data." In 2009 30th IEEE Symposium on Security and Privacy (SP). IEEE, 2009. http://dx.doi.org/10.1109/sp.2009.4.
Повний текст джерелаChen, Junjie, Wendy Hui Wang, and Xinghua Shi. "Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data." In Pacific Symposium on Biocomputing 2021. WORLD SCIENTIFIC, 2020. http://dx.doi.org/10.1142/9789811232701_0003.
Повний текст джерелаNaveed, Muhammad. "Hurdles for Genomic Data Usage Management." In 2014 IEEE Security and Privacy Workshops (SPW). IEEE, 2014. http://dx.doi.org/10.1109/spw.2014.44.
Повний текст джерелаSimmons, Sean, Bonnie Berger, and Cenk Sahinalp. "Protecting Genomic Data Privacy with Probabilistic Modeling." In Proceedings of the Pacific Symposium. WORLD SCIENTIFIC, 2018. http://dx.doi.org/10.1142/9789813279827_0037.
Повний текст джерелаPoon, Anna, Steve Jankly, and Tingting Chen. "Privacy Preserving Fisher’s Exact Test on Genomic Data." In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018. http://dx.doi.org/10.1109/bigdata.2018.8622575.
Повний текст джерелаShang, Hui, and Zaobo He. "Kin Genomic Data Inference Attacks Through Factor Graph." In 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW). IEEE, 2019. http://dx.doi.org/10.1109/massw.2019.00010.
Повний текст джерелаYilmaz, Emre, Tianxi Ji, Erman Ayday, and Pan Li. "Genomic Data Sharing under Dependent Local Differential Privacy." In CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508398.3511519.
Повний текст джерелаOprisanu, Bristena, Georgi Ganev, and Emiliano De Cristofaro. "On Utility and Privacy in Synthetic Genomic Data." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2022. http://dx.doi.org/10.14722/ndss.2022.24092.
Повний текст джерелаGkountouna, O., K. Lepenioti, and M. Terrovitis. "Privacy against aggregate knowledge attacks." In 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW 2013). IEEE, 2013. http://dx.doi.org/10.1109/icdew.2013.6547435.
Повний текст джерела