To refer to this page use:
|Abstract:||We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these data sets is vital for progress in biomedical research. However, a growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, indicate the underlying assumptions, and assess their technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications.|
|Electronic Publication Date:||8-May-2014|
|Citation:||Erlich, Y, Narayanan, A. (2014). Routes for breaching and protecting genetic privacy. Nature Reviews Genetics, 15 (409 - 421. doi:10.1038/nrg3723|
|Pages:||409 - 421|
|Type of Material:||Journal Article|
|Journal/Proceeding Title:||Nature Reviews Genetics|
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.