Can you really anonymize the donors of genomic data in today’s digital world?
dc.citation.epage | 244 | en_US |
dc.citation.spage | 237 | en_US |
dc.contributor.author | Alser, Mohammed | en_US |
dc.contributor.author | Almadhoun, Nour | en_US |
dc.contributor.author | Nouri, Azita | en_US |
dc.contributor.author | Alkan, Can | en_US |
dc.contributor.author | Ayday, Erman | en_US |
dc.coverage.spatial | Vienna, Austria | |
dc.date.accessioned | 2018-04-12T11:42:19Z | |
dc.date.available | 2018-04-12T11:42:19Z | |
dc.date.issued | 2016-09 | en_US |
dc.department | Department of Computer Engineering | en_US |
dc.description | Date of Conference: 21-22 September, 2015 | |
dc.description | Conference name: DPM: International Workshop on Data Privacy Management QASA: International Workshop on Quantitative Aspects in Security Assuranc - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015 | |
dc.description.abstract | The rapid progress in genome sequencing technologies leads to availability of high amounts of genomic data. Accelerating the pace of biomedical breakthroughs and discoveries necessitates not only collecting millions of genetic samples but also granting open access to genetic databases. However, one growing concern is the ability to protect the privacy of sensitive information and its owner. In this work, we survey a wide spectrum of cross-layer privacy breaching strategies to human genomic data (using both public genomic databases and other public non-genomic data). We outline the principles and outcomes of each technique, and assess its technological complexity and maturation. We then review potential privacy-preserving countermeasure mechanisms for each threat. © Springer International Publishing Switzerland 2016. | en_US |
dc.description.provenance | Made available in DSpace on 2018-04-12T11:42:19Z (GMT). No. of bitstreams: 1 bilkent-research-paper.pdf: 179475 bytes, checksum: ea0bedeb05ac9ccfb983c327e155f0c2 (MD5) Previous issue date: 2016 | en |
dc.identifier.doi | 10.1007/978-3-319-29883-2_16 | en_US |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/11693/37504 | |
dc.language.iso | English | en_US |
dc.publisher | Springer | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1007/978-3-319-29883-2_16 | en_US |
dc.source.title | Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015 | en_US |
dc.subject | Bioinformatics | en_US |
dc.subject | Genomics | en_US |
dc.subject | Privacy | en_US |
dc.subject | Genes | en_US |
dc.subject | Digital world | en_US |
dc.subject | Genome sequencing | en_US |
dc.subject | Genomic database | en_US |
dc.subject | Privacy preserving | en_US |
dc.subject | Sensitive informations | en_US |
dc.subject | Technological complexity | en_US |
dc.subject | Wide spectrum | en_US |
dc.subject | Data privacy | en_US |
dc.title | Can you really anonymize the donors of genomic data in today’s digital world? | en_US |
dc.type | Conference Paper | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Can-you-Really-Anonymize-the-Donors.pdf
- Size:
- 932.66 KB
- Format:
- Adobe Portable Document Format
- Description:
- Full printable version