22 Hits in 7.8 sec

PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS

Feng Chen, Shuang Wang, Xiaoqian Jiang, Sijie Ding, Yao Lu, Jihoon Kim, S. Cenk Sahinalp, Chisato Shimizu, Jane C. Burns, Victoria J. Wright, Eileen Png, Martin L. Hibberd (+7 others)
2017 Bioinformatics  
Motivation: We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents.  ...  PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation.  ...  Funding This work has been supported by NIH through grants R00HG008175, NLM R01HG007078, R21LM012060 and U54HL108460.  ... 
doi:10.1093/bioinformatics/btw758 pmid:28065902 pmcid:PMC5860394 fatcat:lfxqvbmiqzb3bnywvcyhksfphq

Federated Learning Approach to Protect Healthcare Data over Big Data Scenario

Gaurav Dhiman, Sapna Juneja, Hamidreza Mohafez, Ibrahim El-Bayoumy, Lokesh Kumar Sharma, Maryam Hadizadeh, Mohammad Aminul Islam, Wattana Viriyasitavat, Mayeen Uddin Khandaker
2022 Sustainability  
The privacy protection of medical and health big data is carried out under the supervision of machine learning during the data analysis stage.  ...  Finally, acceptable ideas are put forward from the management level as a result of the general privacy protection concerns that exist throughout the life cycle of medical big data throughout the industry  ...  Acknowledgments: This work was financially supported by the Malaysian Ministry of Higher Education through an FRGS grant: FRGS/1/2020/TK0/UM/02/33.  ... 
doi:10.3390/su14052500 doaj:4fb6a1d0daa04f3d9af6c283794b038e fatcat:osoiyq4hongfzkllidk26jcg7y

Overview of Privacy Protection Technology of Big Data in Healthcare

GUO Zijing, LUO Yuchuan, CAI Zhiping, ZHENG Tengfei
2021 Jisuanji kexue yu tansuo  
However, the issue how to protect the privacy security effectively in the process deserves attentions as well.  ...  Due to the characteristics of big data in healthcare and the storage environment, privacy protection faces severe challenges.  ...  , 为 数 据 提 供 隐 私 保 SGX(software guard extensions)技术, 一种罕见病 基因数据分析系统 PRINCESS (privacy-protecting rare disease international network collaboration via encryption through software guard extensions)被 提 出  ... 
doi:10.3778/j.issn.1673-9418.2009071 doaj:0afcc985f292428c937b3ef1b92b7694 fatcat:ynsj5jh5mjgsdnnrnfoop35gfy

The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution

A. Michael Froomkin
1995 University of Pennsylvania law review  
Agencies may make legislative rules through formal or informal rule making. Formal rule making is rarely used.  ...  See infra part I.C.1.c.i (describing U.S. export control of encryption software under the International Traffic in Arms Regulations (ITAR)). part of the encryption algorithm known as S-boxes, that would  ...  Encryption has much to offer the commercial, professional, and personal users of telephones, computers, and computer networks.  ... 
doi:10.2307/3312529 fatcat:2lx6judk65b2flyzwpnkcusj4e

It Takes Two to #MeToo - Using Enclaves to Build Autonomous Trusted Systems [article]

Danny Harnik and Paula Ta-Shma and Eliad Tsfadia
2018 arXiv   pre-print
The main idea is to manage all data access via a cluster of autonomous computation agents running inside Intel SGX enclaves.  ...  Functional encryption using SGX was studied by Fisch et al. (Iron) [33] . Princess [30] is a collaboration framework for analyzing rare diseases using SGX for privacy preserving collaboration.  ...  BACKGROUND 3.1 SGX and Enclaves Intel Software Guard Extensions (SGX) [44] is a set of instructions on some of Intel's latest X86 platforms which aims to allow application developers to run parts of  ... 
arXiv:1808.02708v1 fatcat:eb56ph6fyjhk7pvuca52uqbbyq

An extensible big data software architecture managing a research resource of real-world clinical radiology data linked to other health data from the whole Scottish population

Thomas Nind, James Sutherland, Gordon McAllister, Douglas Hardy, Ally Hume, Ruairidh MacLeod, Jacqueline Caldwell, Susan Krueger, Leandro Tramma, Ross Teviotdale, Mohammed Abdelatif, Kenny Gillen (+15 others)
2020 GigaScience  
Results An extensive software platform has been developed to host, extract, and link data from cohorts to answer research questions.  ...  We have developed an architecture and platform to securely extract a copy of those data, link it to other clinical or social datasets, remove personal data to protect privacy, and make the resulting data  ...  are also extremely flexible when linked to extensive electronic medical records, allowing for a wide range of disease areas to be examined.  ... 
doi:10.1093/gigascience/giaa095 pmid:32990744 fatcat:wf2fx7s4zneyfcqtylhq6rqjba

Corruption and Financial Crime

Sam Vaknin
2018 Figshare  
Essays about corruption, money laundering, crime, and international finance.  ...  This reminds many of the FBI's Carnivore massive network sniffer software. It also revives the old dilemma between privacy and security.  ...  Others keep it a closely guarded secret ("to protect commercial interests and secrets").  ... 
doi:10.6084/m9.figshare.7176539 fatcat:pjcdb2c32vh4fp2rlzx3p6qoke

Experience marketing as a modern promotion strategy for hotels chains
Маркетинг опыта как современная стратегия продвижения гостиничных сетей

Анна Чуракова
2019 Маркетинг и маркетинговые исследования  
They expect you to protect their privacy (hence privacy statements are de rigueur for every web site).  ...  After this comes privacy and security. Respect and protect your customers' privacy. Ensure and reassure them of security.  ...  Bid-management software Software or web-based services which partially automate the management of paid search advertising across a range of paid search networks by applying rules to display ads for specific  ... 
doi:10.36627/2074-5095-2019-3-3-186-196 fatcat:35jotkp3zrhmza7e5t4vqgiglq

KPNW's Safety Net for Preventive Services: The Challenge of Reaching the Unscreened

Nancy Stevens
1998 The Permanente Journal  
We must also guard against external threats to our access to our records for legitimate research resulting from overzealous protection of privacy.  ...  , and encryption.  ...  where they can communicate electronically and post draft documents or works-in-progress for discussion. • Webside Consults: In Regions with electronic mail capability, physicians can advise each other via  ... 
doi:10.7812/tpp/98-053 fatcat:ybdh5rgzk5ggbh6hflscamjrou

Dr. Eric Archambault Profile

2016 Against the Grain  
We must pool our resources and collaborate on efforts to make as much scholarship as possible accessible to all in a manner that honors our values: intellectual freedom, privacy, social responsibility,  ...  In addition, through our Gale Primary Sources program, we're focused on digitizing more global and diverse content through our network of partner institutions across the world.  ...  potential purchases in relation to whether they transform the scholarly communication system towards openness, or make a positive impact on the scholarly communication environment in some way, whether via  ... 
doi:10.7771/2380-176x.7476 fatcat:c6dlj5luf5auxgy3ajzowrk4pq

The organisation of London's street gangs

J.A. Densley
2012 Global crime  
Anonymised transcripts, a data source of some 400,000 words, were password protected and encrypted using recommended encryption software in an attempt to better safeguard interviewees' anonymity and confidentiality  ...  Directions are then sent via the encrypted network of Blackberry's instant-message service, or, in the case of the Avengers, instructions recorded on MP3 players.  ...  Yes No Interviewer has ensured that the participant understands that this project has been reviewed by, and received ethics clearance through, the University of Oxford Central University Research Ethics  ... 
doi:10.1080/17440572.2011.632497 fatcat:rlxect46wjf37f6wbsj3wt5f4y

Teen Girls' Online Participation: An Australian Study

Roberta Anne Thompson, University, My, Parlo Singh
The study was framed in the broad context of networked culture and the changing social environment associated with the Web 2.0 phenomenon.  ...  One of the more common ways to protect privacy was to share "important information on social networking sites" (S72-B15) through private messaging facilities not public feeds.  ...  Many of the girls talked about using encryption strategies and other processes of concealment to protect online messages from out-of-group people.  ... 
doi:10.25904/1912/3404 fatcat:jhn6rwew6rccbif6773mvo72bi

Obstacles to wearable computing

Helen Oliver, Apollo-University Of Cambridge Repository, Jonathon Crowcroft, Richard Mortier
the software infrastructure.  ...  For the purposes of privacy, augmenting device functionality through interoperability, and integration into an Internet of Things (IoT) ecosystem, I used the Hub-of-All-Things personal data store to provide  ...  I thank Irene Ng of Dataswift and Jonathan Holtby, the Community Manager at HAT-DeX, for making the software available for this project.  ... 
doi:10.17863/cam.78712 fatcat:ckzmccr4afh4npwrwnummx6pzm

Architecture in the Data-driven City

Frederick Peter Ortner
Winy Maas is said to have hired body-guards to protect himself from animal-rights activists.  ...  To his credit, Pentland is a leader in creating the data-rich world, by working on privacy protection standards and on open data.  ...  Though presented via an engineering diagram this is undeniably a subjective value judgment; a judgment about what is the 'good' way to live together in the city.  ... 
doi:10.5075/epfl-thesis-9554 fatcat:mpq7n242ijgw5o3aq6hn5yf7he


Alyson Thelin, Alyson Thelin
Because of the extensive reach of such forums, one particular region, New Jersey, will be examined.  ...  Information is disseminated through online media attention, advertising, and computer mediated communication.  ...  Analytic Software, Inc.  ... 
« Previous Showing results 1 — 15 out of 22 results