Subject: bepress|Life Sciences|Biology | Data and Text Mining | bepress|Life Sciences|Bioinformatics | Original Papers
Motivation: Developing targeted therapeutics and identifying biomarkers relies on large amounts of research participant data. Beyond human DNA, scientists now investigate the DNA of micro-organisms inhabiting the human body. Recent work shows that an individual’s collec... View more
 Erman Ayday, Jean Louis Raisaro, Mc Laren, Paul Jack, Jacques Fellay, and Jean-Pierre Hubaux. Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data. In Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech" 13), 2013.
 Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, and Gene Tsudik. Countering gattaca: E cient and secure testing of fully-sequenced human genomes. In CCS, 2011.
 George M Church. The personal genome project. Molecular Systems Biology, 2005.
 Yaniv Erlich and Arvind Narayanan. Routes for breaching and protecting genetic privacy. Nature Reviews Genetics, 2014.
 Noah Fierer, Christian L Lauber, Nick Zhou, Daniel McDonald, Elizabeth K Costello, and Rob Knight. Forensic identi cation using skin bacterial communities. Proceedings of the National Academy of Sciences, 2010.
 Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella, et al. Fairplay-secure two-party computation system. In USENIX Security Symposium, volume 4. San Diego, CA, USA, 2004.
 Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, JeanPierre Hubaux, and Carl Gunter. Controlled functional encryption. In CCS, 2014.
 Joseph N Paulson, O Colin Stine, Hector Corrada Bravo, and Mihai Pop. Di erential abundance analysis for microbial marker-gene surveys. Nature methods, 2013.
 Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, and Thomas Ristenpart. Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing. Mortality, 2014.
 Yan Huang, David Evans, Jonathan Katz, and Lior Malka. Faster secure two-party computation using garbled circuits. In USENIX Security Symposium, 2011.