Skip to main content

Routes for breaching and protecting genetic privacy

Author(s): Erlich, Y; Narayanan, Arvind

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr13q2j
Full metadata record
DC FieldValueLanguage
dc.contributor.authorErlich, Y-
dc.contributor.authorNarayanan, Arvind-
dc.date.accessioned2018-07-20T15:10:36Z-
dc.date.available2018-07-20T15:10:36Z-
dc.date.issued2014en_US
dc.identifier.citationErlich, Y, Narayanan, A. (2014). Routes for breaching and protecting genetic privacy. Nature Reviews Genetics, 15 (409 - 421. doi:10.1038/nrg3723en_US
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr13q2j-
dc.description.abstractWe are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these data sets is vital for progress in biomedical research. However, a growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, indicate the underlying assumptions, and assess their technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications.en_US
dc.format.extent409 - 421en_US
dc.language.isoen_USen_US
dc.relation.ispartofNature Reviews Geneticsen_US
dc.rightsAuthor's manuscripten_US
dc.titleRoutes for breaching and protecting genetic privacyen_US
dc.typeJournal Articleen_US
dc.identifier.doidoi:10.1038/nrg3723-
dc.date.eissued2014-05-08en_US
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/journal-articleen_US

Files in This Item:
File Description SizeFormat 
Routes for breaching and protecting genetic privacy.pdf381.8 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.