Secure distributed genome analysis for GWAS and sequence comparison computation

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure distributed genome analysis for GWAS and sequence comparison computation

BACKGROUND The rapid increase in the availability and volume of genomic data makes significant advances in biomedical research possible, but sharing of genomic data poses challenges due to the highly sensitive nature of such data. To address the challenges, a competition for secure distributed processing of genomic data was organized by the iDASH research center. METHODS In this work we propo...

متن کامل

Secure Distributed Human Computation

This paper introduces a line of research on secure distributed human computation. We consider the general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are especially motivated by problem classes that appear to be difficult for computers to solve effectively, but are easier for humans to ...

متن کامل

On Necessary Conditions for Secure Distributed Computation

What assumptions are required to achieve an unconditionally secure distributed circuit evaluation in a fully connected network? This question was addressed with respect to the allowed number of malicious players [BGW, CCD, RB], given that every channel is unconditionally secure. In this paper we investigate whether the security of all channels is also a necessary condition. [BGW, CCD] showed ho...

متن کامل

Secure Distributed Computation on Private Inputs

The recent notion of encryption switching protocol (ESP) allows two players to obliviously switch between two encryption schemes. Instantiated from multiplicatively homomorphic encryption and additively homomorphic encryption, ESPs provide a generic solution to two-party computation and lead to particularly efficient protocols for arithmetic circuits in terms of interaction and communication. I...

متن کامل

Secure Computation of k-Anonymous Distributed Data

In a distributed environment, such as the World Wide Web, an individual leaves behind personal data at many different locations. To protect the privacy of an individual’s sensitive information, locations make separate releases of identifiable data (e.g. name or social security number), and sensitive data (e.g. visitor’s IP address). To the releasing location the data appears unlinkable, however...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: BMC Medical Informatics and Decision Making

سال: 2015

ISSN: 1472-6947

DOI: 10.1186/1472-6947-15-s5-s4