Quantifying Interdependent Risks in Genomic Privacy
نویسندگان
چکیده
منابع مشابه
Privacy Risks from Genomic Data-Sharing Beacons.
The human genetics community needs robust protocols that enable secure sharing of genomic data from participants in genetic research. Beacons are web servers that answer allele-presence queries--such as "Do you have a genome that has a specific nucleotide (e.g., A) at a specific genomic position (e.g., position 11,272 on chromosome 1)?"--with either "yes" or "no." Here, we show that individuals...
متن کاملModeling interdependent risks.
In an interdependent world the risks faced by any one agent depend not only on its choices but also on those of all others. Expectations about others' choices will influence investments in risk management and the outcome can be suboptimal for everyone. We model this as the Nash equilibrium of a game and give conditions for such a suboptimal equilibrium to be tipped to an optimal one. We also ch...
متن کاملWhen Others Impinge upon Your Privacy: Interdependent Risks and Protection in a Connected World
Privacy is defined as the right to control, edit, manage, and delete information about oneself and decide when, how, and to what extent this information is communicated to others. Therefore, every person should ideally be empowered to manage and protect his own data, individually and independently of others. This assumption, however, barely holds in practice, because people are by nature biolog...
متن کاملQuantifying IT estimation risks
A statistical method is proposed for quantifying the impact of factors that influence the quality of the estimation of costs for IT-enabled business projects. We call these factors risk drivers as they influence the risk of the misestimation of project costs. The method can effortlessly be transposed for usage on other important IT key performance indicators (KPIs), such as schedule misestimati...
متن کاملQuantifying privacy in multiagent planning
Privacy is often cited as the main reason to adopt a multiagent approach for a certain problem. This also holds true for multiagent planning. Still, a metric to evaluate the privacy performance of planners is virtually non-existent. This makes it hard to compare di erent algorithms on their performance with regards to privacy. Moreover, it prevents multiagent planning methods from being designe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Privacy and Security
سال: 2017
ISSN: 2471-2566,2471-2574
DOI: 10.1145/3035538