How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.
about
Genetics. No longer de-identifiedEyes wide open: the personal genome project, citizen science and veracity in informed consentPrivacy technology to support data sharing for comparative effectiveness research: a systematic reviewIdentifiability in biobanks: models, measures, and mitigation strategiesPrivacy in the Genomic EraImproving the informed consent process in international collaborative rare disease research: effective consent for effective research.Translational integrity and continuity: personalized biomedical data integrationPatient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study.Size matters: how population size influences genotype-phenotype association studies in anonymized dataDevelopment of a web service for analysis in a distributed networkQuantifying the Correctness, Computational Complexity, and Security of Privacy-Preserving String Comparators for Record LinkageEthical issues in human genomics research in developing countriesAn Entropy Approach to Disclosure Risk Assessment: Lessons from Real Applications and Simulated DomainsNever too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy RuleThe disclosure of diagnosis codes can breach research participants' privacyAssessing the privacy risks of data sharing in genomicsAnatomy of data integrationTechnical and policy approaches to balancing patient privacy and data sharing in clinical and translational researchDesigning and managing a flexible and dynamic biorepository system: a 15 year perspective from the CPCRA, ESPRIT, and INSIGHT clinical trial networksThe false security of blind dates: chrononymization's lack of impact on data privacy of laboratory data.A survey aimed at general citizens of the US and Japan about their attitudes toward electronic medical data handlingDifferentially private genome data dissemination through top-down specializationAn evaluation of the current state of genomic data privacy protection technology and a roadmap for the future.Biomedical data integration: using XML to link clinical and research data sets.A secure protocol to distribute unlinkable health data.Is deidentification sufficient to protect health privacy in research?Enabling genomic-phenomic association discovery without sacrificing anonymity.Direct-to-consumer genetic testing: failure is not an option.Confronting real time ethical, legal, and social issues in the Electronic Medical Records and Genomics (eMERGE) Consortium.A Probabilistic Approach to Mitigate Composition Attacks on Privacy in Non-Coordinated Environments.Challenges in biobank governance in Sub-Saharan Africa.Re-identification of familial database records.Genetics researchers' and IRB professionals' attitudes toward genetic research review: a comparative analysis.HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWASReducing patient re-identification risk for laboratory results within research datasets.A practical approach to achieve private medical record linkage in light of public resources.Personalized medicine: challenges and opportunities for translational bioinformatics.Ethical and practical challenges to studying patients who opt out of large-scale biorepository research.Clinical and ethical considerations of massively parallel sequencing in transplantation science.Stem cells and ethics: current issues.
P2860
Q24550730-80639076-9411-493E-B3C3-5C141E8E119CQ24634042-07A588C0-2775-4269-BFCF-D0BD8477AC6DQ27009097-9D8D3C49-B35B-4DD7-A1AC-03716F608C11Q27010356-9CE05799-B5B9-4B77-866F-B4FD77C8D9EBQ27316478-B481FC68-4DBF-4946-85B9-95D1DCF1B625Q27324539-6CABFE4A-1F31-4CCF-9821-64AB03DE9CC5Q28388444-F758CDD9-8DDF-4140-8849-1069E1424118Q28611321-CDEFB281-8B90-4169-B717-FF93B2704316Q28650103-8047D615-C0F8-49B8-BFB3-E8805F44B455Q28651865-67398E7B-CB46-4F90-AF16-96CA77497707Q28728442-FDBA5870-BCF4-4980-9648-47EF9C3FC2F4Q28741128-ABB6A29E-22D0-4F78-911E-80CBFA8D7E99Q28744009-2880072B-5B0B-456C-BA3C-16549ED968FBQ28744069-57676EBB-F030-4E49-9947-DE2B98D0BFE7Q28744507-EDAED548-C235-4940-A7D4-6EE227B7B61EQ28752082-BEAF179B-1527-4069-A716-C6C30EA0D5E7Q28756640-2413DCE1-D040-43AC-ABFE-365EF0513BFAQ28761553-D4F5C5E7-5D35-46D2-AFD9-4A547C00B5CFQ28972361-6828A5BE-4182-4850-A8E6-D4BCFA350969Q30621184-768981DA-0E27-4A2D-AC8C-846217A39F53Q30810805-04919841-C367-44F6-9A2C-ED6730C2D3FFQ30880490-D2B89085-9958-4E0F-AD0B-E57622F47560Q30970886-EF9F1D0F-1327-44E3-8934-04043C3F4739Q30991340-1846C74C-95A9-449E-ABE5-2BB74D8C505FQ31044464-B500F37D-0A9E-4495-A8FE-CDBB1423D308Q34545786-7315337C-B4DE-4C5A-9624-8BD240F08F87Q34583874-4F6660FD-B9D2-45BD-9CFD-1F6DC7B645E5Q34916020-255F9A3E-B707-45B1-B0CD-BE0C7293671DQ34960752-8E366A19-9F09-41DE-828E-CB78D4209AA8Q34966134-8834B219-E7BD-4F6D-8006-18DC9A5E1993Q34985268-48AD5450-4D01-4AE1-9095-DD0B4AE94C0FQ35726697-4A010813-08A3-4D1C-B8D7-C98587E259C3Q36250992-0222991B-EA3F-420B-B2E5-1506C97B4495Q36538189-D50CEDD0-A045-4C86-9496-AFD4B4B8372CQ36563330-BE177C37-F9F5-49EB-8ABA-18F48D997950Q36800577-291267E8-E31A-4532-92B9-FE64B426E537Q37163366-6C031234-5664-4ACC-B970-25E243359F7EQ37389470-C705F0AA-156C-4B89-ABC1-0B4ADB42C847Q37428559-4C1FF85C-8143-43B2-8269-4F02386D8DF3Q37600705-0AF15E5B-AFF8-42F5-8F0F-3001DBC01127
P2860
How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.
description
2004 nî lūn-bûn
@nan
2004 թուականի Յունիսին հրատարակուած գիտական յօդուած
@hyw
2004 թվականի հունիսին հրատարակված գիտական հոդված
@hy
2004年の論文
@ja
2004年論文
@yue
2004年論文
@zh-hant
2004年論文
@zh-hk
2004年論文
@zh-mo
2004年論文
@zh-tw
2004年论文
@wuu
name
How (not) to protect genomic d ...... anonymity protection systems.
@ast
How (not) to protect genomic d ...... anonymity protection systems.
@en
type
label
How (not) to protect genomic d ...... anonymity protection systems.
@ast
How (not) to protect genomic d ...... anonymity protection systems.
@en
prefLabel
How (not) to protect genomic d ...... anonymity protection systems.
@ast
How (not) to protect genomic d ...... anonymity protection systems.
@en
P1476
How (not) to protect genomic d ...... anonymity protection systems.
@en
P2093
Latanya Sweeney
P304
P356
10.1016/J.JBI.2004.04.005
P577
2004-06-01T00:00:00Z