Identifiability in biobanks: models, measures, and mitigation strategies
暂无分享,去创建一个
[1] Xiaohong Su,et al. Improvements on a privacy-protection algorithm for DNA sequences with generalization lattices , 2012, Comput. Methods Programs Biomed..
[2] S. Haga,et al. Public Perspectives Regarding Data-Sharing Practices in Genomics Research , 2011, Public Health Genomics.
[3] M. Guyer,et al. Charting a course for genomic medicine from base pairs to bedside , 2011, Nature.
[4] Bradley Malin,et al. Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule , 2011, J. Am. Medical Informatics Assoc..
[5] Wendy A. Wolf,et al. The eMERGE Network: A consortium of biorepositories linked to electronic medical records data for conducting genomic studies , 2011, BMC Medical Genomics.
[6] Bradley Malin,et al. Beyond safe harbor: automatic discovery of health information de-identification policy alternatives , 2010, IHI.
[7] S. Fullerton,et al. Confronting real time ethical, legal, and social issues in the Electronic Medical Records and Genomics (eMERGE) Consortium , 2010, Genetics in Medicine.
[8] Jin Fan,et al. Leveraging informatics for genetic studies: use of the electronic medical record to enable a genome-wide association study of peripheral arterial disease , 2010, J. Am. Medical Informatics Assoc..
[9] D. Clayton. On inferring presence of an individual in a mixture: a Bayesian approach , 2010, Biostatistics.
[10] Joshua C. Denny,et al. The disclosure of diagnosis codes can breach research participants' privacy , 2010, J. Am. Medical Informatics Assoc..
[11] B. Malin,et al. Anonymization of electronic medical records for validating genome-wide association studies , 2010, Proceedings of the National Academy of Sciences.
[12] Melissa A. Basford,et al. Robust replication of genotype-phenotype associations across multiple diseases in an electronic medical record. , 2010, American journal of human genetics.
[13] F. Collins. Has the revolution arrived? , 2010, Nature.
[14] Khaled El Emam,et al. A method for evaluating marketer re-identification risk , 2010, EDBT '10.
[15] Bradley Malin,et al. Evaluating re-identification risks with respect to the HIPAA privacy rule , 2010, J. Am. Medical Informatics Assoc..
[16] Wendy A. Wolf,et al. Public and Biobank Participant Attitudes toward Genetic Research Participation and Data Sharing , 2010, Public Health Genomics.
[17] Bradley Malin,et al. Technical and Policy Approaches to Balancing Patient Privacy and Data Sharing in Clinical and Translational Research , 2010, Journal of Investigative Medicine.
[18] Joan Scott,et al. Public opinion about the importance of privacy in biobank research. , 2009, American journal of human genetics.
[19] Haixu Tang,et al. Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.
[20] Erin Murphy,et al. Relative Doubt: Familial Searches of DNA Databases , 2009 .
[21] Jean-Pierre Corriveau,et al. A globally optimal k-anonymity method for the de-identification of health data. , 2009, Journal of the American Medical Informatics Association : JAMIA.
[22] Michael I. Jordan,et al. Genomic privacy and limits of individual detection in a pool , 2009, Nature Genetics.
[23] Peter M Schneider,et al. DNA-based prediction of human externally visible characteristics in forensics: motivations, scientific challenges, and ethical considerations. , 2009, Forensic science international. Genetics.
[24] S. Levy,et al. An agenda for personalized medicine , 2009, Nature.
[25] E. Zerhouni,et al. Protecting Aggregate Genomic Data , 2008, Science.
[26] D. Roden,et al. Development of a Large‐Scale De‐Identified DNA Biobank to Enable Personalized Medicine , 2008, Clinical pharmacology and therapeutics.
[27] S. Nelson,et al. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.
[28] Amy L McGuire,et al. Confidentiality, privacy, and security of genetic and genomic test information in electronic health records: points to consider , 2008, Genetics in Medicine.
[29] Khaled El Emam,et al. Heuristics for De-identifying Health Data , 2008, IEEE Secur. Priv..
[30] John Glaser,et al. White Paper: Advancing Personalized Health Care through Health Information Technology: An Update from the American Health Information Community's Personalized Health Care Workgroup , 2008, J. Am. Medical Informatics Assoc..
[31] Tony Pan,et al. Sharing Data and Analytical Resources Securely in a Biomed Research Grid Environment , 2008 .
[32] G. Church,et al. From genetic privacy to open consent , 2008, Nature Reviews Genetics.
[33] Blaz Zupan,et al. Predictive data mining in clinical medicine: Current issues and guidelines , 2008, Int. J. Medical Informatics.
[34] Bradley Malin,et al. k-Unlinkability: A privacy protection model for distributed data , 2008, Data Knowl. Eng..
[35] A. McGuire,et al. DNA data sharing: research participants' perspectives , 2008, Genetics in Medicine.
[36] Christopher A Cassa,et al. My sister's keeper?: genomic research and the identifiability of siblings , 2008, BMC Medical Genomics.
[37] A. Abu-Bakar,et al. Balancing benefits of human genetic research against civic concerns: Essentially Yours and beyond - the case of Australia. , 2007, Personalized medicine.
[38] Á. Carracedo,et al. Inferring ancestral origin using a single multiplex assay of ancestry-informative marker SNPs. , 2007, Forensic science international. Genetics.
[39] B. Psaty,et al. Personalized medicine in the era of genomics. , 2007, JAMA.
[40] K. Sirotkin,et al. The NCBI dbGaP database of genotypes and phenotypes , 2007, Nature Genetics.
[41] Francis S. Collins,et al. Identifiability in Genomic Research , 2007, Science.
[42] G. Colditz,et al. Key Elements of Access Policies for Biorepositories Associated with Population Science Research , 2007, Cancer Epidemiology Biomarkers & Prevention.
[43] K. Hoeyer,et al. Will forensic use of medical biobanks decrease public trust in healthcare services? Some empirical observations , 2007, Scandinavian Journal of Public Health.
[44] Bradley Malin,et al. A computational model to protect patient data from location-based re-identification , 2007, Artif. Intell. Medicine.
[45] Alon Y. Halevy,et al. Data integration and genomic medicine , 2007, J. Biomed. Informatics.
[46] M. García-Sancho,et al. The rise and fall of the idea of genetic information (1948-2006) , 2006, Genomics, society, and policy.
[47] K. El Emam,et al. Evaluating Common De-Identification Heuristics for Personal Health Information , 2006, Journal of medical Internet research.
[48] L. Wolf,et al. Sleeping better at night: investigators' experiences with certificates of confidentiality. , 2006, IRB.
[49] Philippe Golle,et al. Revisiting the uniqueness of simple demographics in the US population , 2006, WPES '06.
[50] Russ B Altman,et al. Confidentiality in Genome Research , 2006, Science.
[51] S. Hansson,et al. Bioethics in Sweden. , 2006, Cambridge quarterly of healthcare ethics : CQ : the international journal of healthcare ethics committees.
[52] Pilar N. Ossorio,et al. About Face: Forensic Genetic Testing for Race and Visible Traits , 2006, Journal of Law, Medicine & Ethics.
[53] Jane Kaye,et al. Police collection and access to DNA samples , 2006 .
[54] Richard A. Gibbs,et al. No Longer De-Identified , 2006, Science.
[55] Amy L McGuire,et al. Genetics. No longer de-identified. , 2006, Science.
[56] Russ B Altman,et al. Health-information altruists--a potentially critical resource. , 2005, The New England journal of medicine.
[57] Francis S Collins,et al. Realizing the promise of genomics in biomedical research. , 2005, JAMA.
[58] Tim Sprosen,et al. UK Biobank: from concept to reality. , 2005, Pharmacogenomics.
[59] Peter M Currie,et al. Balancing privacy protections with efficient research: institutional review boards and the use of certificates of confidentiality. , 2005, IRB.
[60] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[61] Bradley Malin,et al. Technical Evaluation: An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future , 2004, J. Am. Medical Informatics Assoc..
[62] B A Malin,et al. Protecting Genomic Sequence Anonymity with Generalization Lattices , 2005, Methods of Information in Medicine.
[63] Tsan-sheng Hsu,et al. Medical privacy protection based on granular computing , 2004, Artif. Intell. Medicine.
[64] Allen D. Roses,et al. Pharmacogenetics and drug development: the path to safer and more effective drugs , 2004, Nature Reviews Genetics.
[65] Zhen Lin,et al. Genomic Research and Human Subject Privacy , 2004, Science.
[66] Bradley Malin,et al. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems , 2004, J. Biomed. Informatics.
[67] C. McCartney. Forensic DNA Sampling and the England and Wales National DNA Database: A Sceptical Approach , 2004 .
[68] Russ B Altman,et al. Genetics. Genomic research and human subject privacy. , 2004, Science.
[69] Tsan-sheng Hsu,et al. Preserving confidentiality when sharing medical database with the Cellsecu system , 2003, Int. J. Medical Informatics.
[70] Noreen Clancy,et al. Case Studies of Existing Human Tissue Repositories , 2003 .
[71] Noreen Clancy,et al. Case Studies of Existing Human Tissue Repositories: "Best Practices" for a Biospecimen Resource for the Genomic and Proteomic Era , 2003 .
[72] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[73] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[74] Hhs Office for Civil Rights. Standards for privacy of individually identifiable health information. Final rule. , 2002, Federal register.
[75] G. Ginsburg,et al. The path to personalized medicine. , 2002, Current opinion in chemical biology.
[76] Zhen Lin,et al. Using binning to maintain confidentiality of medical data , 2002, AMIA.
[77] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[78] J. Botkin,et al. Protecting the privacy of family members in survey and pedigree research. , 2001, JAMA.
[79] Lucila Ohno-Machado,et al. Hiding information by cell suppression , 2001, AMIA.
[80] L Sweeney,et al. Weaving Technology and Policy Together to Maintain Confidentiality , 1997, Journal of Law, Medicine & Ethics.
[81] Ton de Waal,et al. Statistical Disclosure Control in Practice , 1996 .
[82] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..