{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T23:59:36Z","timestamp":1648857576956},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11623-020-1229-9","type":"journal-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T13:34:43Z","timestamp":1583501683000},"page":"87-93","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Genomische Daten und der Datenschutz"],"prefix":"10.1007","volume":"44","author":[{"given":"Kay","family":"Hamacher","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Kussel","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Stammler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,5]]},"reference":[{"issue":"2","key":"1229_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1136\/jamia.2009.000026","volume":"17","author":"K Benitez","year":"2010","unstructured":"Benitez, Kathleen, und Bradley Malin. 2010. \u201eEvaluating re-identification risks with respect to the HIPAA privacy rule\u201c. Journal of the American Medical Informatics Association 17 (2): 169. https:\/\/doi.org\/10.1136\/jamia.2009.000026.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"1229_CR2","unstructured":"Bernstein, Daniel J. 2009. \u201eIntroduction to post-quantum cryptography\u201c. In Post-quantum cryptography, 1-14. Springer. http:\/\/link.springer.com\/chapter\/10.1007\/978-3-540-88702-7_1."},{"key":"1229_CR3","unstructured":"Buchmann, Johannes; Matthias Geihs, Kay Hamacher, Stefan Katzenbeisser, und Sebastian Stammler. 2017. \u201eLong-Term Integrity Protection of Genomic Data\u201c. In, 18. Orlando, FL. http:\/\/2017.genopri.org\/program.html."},{"key":"1229_CR4","unstructured":"Burkert, Herbert. 1980. \u201eDas Problem des Zusatzwissens\u201c. In Max Kaase et al. Datenzugang und Datenschutz, 143\u201347. Athen\u00e4um Verl."},{"key":"1229_CR5","doi-asserted-by":"crossref","unstructured":"Chen, Feng, Shuang Wang, Xiaoqian Jiang, Sijie Ding, Yao Lu, Jihoon Kim, S. Cenk Sahinalp, u. a. o. J. \u201ePRINCESS: Privacy-Protecting Rare Disease International Network Collaboration via Encryption through Software Guard extensionS\u201c. Bioinformatics (Oxford, England) 33 (6): 871\u201378. https:\/\/doi.org\/10.1093\/bioinformatics\/btw758].","DOI":"10.1093\/bioinformatics\/btw758"},{"issue":"2","key":"1229_CR6","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2014.24","volume":"12","author":"E De Cristofaro","year":"2014","unstructured":"Cristofaro, E. De. 2014. \u201eGenomic Privacy and the Rise of a New Research Community\u201c. IEEE Security Privacy 12 (2): 80\u201383. https:\/\/doi.org\/10.1109\/MSP.2014.24.","journal-title":"IEEE Security Privacy"},{"issue":"4","key":"1229_CR7","doi-asserted-by":"publisher","first-page":"E676","DOI":"10.1073\/pnas.1708207114","volume":"115","author":"DJM Crouch","year":"2018","unstructured":"Crouch, Daniel J. M., Bruce Winney, Willem P. Koppen, William J. Christmas, Katarzyna Hutnik, Tammy Day, Devendra Meena, u. a. 2018. \u201eGenetics of the Human Face: Identification of Large-Effect Single Gene Variants\u201c. Proceedings of the National Academy of Sciences 115 (4): E676\u2013E685. https:\/\/doi.org\/10.1073\/pnas.1708207114.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"1229_CR8","doi-asserted-by":"crossref","unstructured":"Demmler, Daniel, Kay Hamacher, Thomas Schneider, und Sebastian Stammler. 2018. \u201ePrivacy-Preserving Whole-Genome Variant Queries\u201c. In Cryptology and Network Security, herausgegeben von Srdjan Capkun und Sherman S. M. Chow, 71\u201392. Lecture Notes in Computer Science. Springer International Publishing.","DOI":"10.1007\/978-3-030-02641-7_4"},{"key":"1229_CR9","doi-asserted-by":"crossref","unstructured":"Demmler, Daniel, Peter Rindal, Mike Rosulek, und Ni Trieu. 2018. \u201ePIR-PSI: Scaling Private Contact Discovery\u201c. Proceedings on Privacy Enhancing Technologies (PoPETs), Juli. Proceedings on Privacy Enhancing Technologies (PoPETs).","DOI":"10.1515\/popets-2018-0037"},{"key":"1229_CR10","volume-title":"Textbook of Biochemistry with clinical correlations","author":"TM Devlin","year":"1997","unstructured":"Devlin, Thomas M. 1997. Textbook of Biochemistry with clinical correlations. 4. Aufl. New York: Wiley-Liss.","edition":"4"},{"key":"1229_CR11","doi-asserted-by":"crossref","unstructured":"Dugan, T., und X. Zou. 2016. \u201eA Survey of Secure Multiparty Computation Protocols for Privacy Preserving Genetic Tests\u201c. In 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 173\u201382. https:\/\/doi.org\/10.1109\/CHASE.2016.71.","DOI":"10.1109\/CHASE.2016.71"},{"issue":"12","key":"1229_CR12","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1160\/TH13-05-0363","volume":"110","author":"M Franchini","year":"2013","unstructured":"Franchini, M., und P. M. Mannucci. 2013. \u201eAcquired haemophilia A: A 2013 update\u201c. Thrombosis and Haemostasis 110 (12): 1114\u201320.","journal-title":"Thrombosis and Haemostasis"},{"issue":"3","key":"1229_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.istr.2012.10.001","volume":"17","author":"M Franz","year":"2013","unstructured":"Franz, M., B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, und H. Schr\u00f6der. 2013. \u201eSecure computations on non-integer values with applications to privacy-preserving sequence analysis\u201c. Information Security Technical Report, Security and Privacy for Digital Ecosystems, 17 (3): 117\u201328. https:\/\/doi.org\/10.1016\/j.istr.2012.10.001.","journal-title":"Information Security Technical Report, Security and Privacy for Digital Ecosystems"},{"key":"1229_CR14","unstructured":"Goodfellow, Ian J., Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, und Yoshua Bengio. 2014. \u201eGenerative Adversarial Networks\u201c. arXiv:1406.2661 [cs, stat], Juni. http:\/\/arxiv.org\/abs\/1406.2661."},{"key":"1229_CR15","unstructured":"Hamacher, K. 2014. \u201eA Taxonomy of Genomic Privacy and Beyond\u201c. In. PETS Genome Privacy Workshop. Amsterdam, The Netherlands. http:\/\/www.kay-hamacher.de\/PDF\/TaxonomyProblemsGenomicPrivacy2014.pdf."},{"key":"1229_CR16","doi-asserted-by":"crossref","unstructured":"Hazay, Carmit, und Muthuramakrishnan Venkitasubramaniam. 2017. \u201eScalable Multi-Party Private Set-Intersection\u201c. 027. https:\/\/eprint.iacr.org\/2017\/027.","DOI":"10.1007\/978-3-662-54365-8_8"},{"key":"1229_CR17","unstructured":"\u201eHessenrecht Landesrechtsprechungsdatenbank Entscheidungen Der Hessischen Gerichte\u201c. 2017. http:\/\/www.lareda.hessenrecht.hessen.de\/lexsoft\/default\/hessenrecht_lareda.html#docid:7860914."},{"key":"1229_CR18","doi-asserted-by":"crossref","unstructured":"Karvelas, Nikolaos, Andreas Peter, Stefan Katzenbeisser, Erik Tews, und Kay Hamacher. 2014. \u201ePrivacy-Preserving Whole Genome Sequence Processing Through Proxy-Aided ORAM\u201c. In Proceedings of the 13th Workshop on Privacy in the Electronic Society, 1-10. WPES\u201914. New York, NY, USA: ACM. https:\/\/doi.org\/10.1145\/2665943.2665962.","DOI":"10.1145\/2665943.2665962"},{"key":"1229_CR19","doi-asserted-by":"crossref","unstructured":"Kiss, Jian Liu, Thomas Schneider, N. Asokan, und Benny Pinkas. 2017. \u201ePrivate Set Intersection for Unequal Set Sizes with Mobile Applications\u201c. Proceedings on Privacy Enhancing Technologies (PoPETs) 2017 (4). De Gruyter Open: 97\u2013117. http:\/\/thomaschneider.de\/papers\/KLSAP17.pdf.","DOI":"10.1515\/popets-2017-0044"},{"key":"1229_CR20","series-title":"Privacy Enhancing Technologies","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-22263-4_10","volume-title":"Privacy-Friendly Aggregation for the Smart-Grid","author":"K Kursawe","year":"2011","unstructured":"Kursawe, Klaus, George Danezis, und Markulf Kohlweiss. 2011. \u201ePrivacy-Friendly Aggregation for the Smart-Grid\u201c. In Privacy Enhancing Technologies, 175-191. Springer Berlin Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-22263-4_10."},{"key":"1229_CR21","unstructured":"Lenz, Stefan, Daniela Z\u00f6ller, Moritz Hess, und Harald Binder. 2018. \u201eArchitectures for Distributed Privacy-Preserving Deep Learning\u201c. Herausgegeben von Biometrie Und Epidemiologie Deutsche Gesellschaft F\u00fcr Medizinische Informatik. 63. Jahrestagung der Deutschen Gesellschaft f\u00fcr Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS), August. https:\/\/doi.org\/10.3205\/18gmds097."},{"issue":"2","key":"1229_CR22","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1093\/genetics\/129.2.513","volume":"129","author":"WH Li","year":"1991","unstructured":"Li, W H, und L A Sadler. 1991. \u201eLow nucleotide diversity in man\u201c. Genetics 129 (2). Genetics: 513\u2013523.","journal-title":"Genetics"},{"issue":"5681","key":"1229_CR23","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1126\/science.1095019","volume":"305","author":"Z. Lin","year":"2004","unstructured":"Lin, Zhen, Art B. Owen, und Russ B. Altman. 2004. \u201eGenomic Research and Human Subject Privacy\u201c. Science 305 (5681). American Association for the Advancement of Science: 183-183. https:\/\/doi.org\/10.1126\/science.1095019.","journal-title":"Science"},{"issue":"3","key":"1229_CR24","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s00439-011-1042-5","volume":"130","author":"B Malin","year":"2011","unstructured":"Malin, Bradley, Grigorios Loukides, Kathleen Benitez, und Ellen Wright Clayton. 2011. \u201eIdentifiability in bio-banks: models, measures, and mitigation strategies\u201c. Human Genetics 130 (3): 383. https:\/\/doi.org\/10.1007\/s00439-011-1042-5.","journal-title":"Human Genetics"},{"key":"1229_CR25","unstructured":"Marlinspike, Moxie. 2014. \u201eThe Difficulty of Private Contact Discovery\u201c. Open Whisper Systems Blog. https:\/\/whispersystems.org\/blog\/contact-discovery\/."},{"issue":"8","key":"1229_CR26","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1038\/gim.2015.167","volume":"18","author":"PJ McLaren","year":"2016","unstructured":"McLaren, Paul J., Jean Louis Raisaro, Manel Aouri, Margalida Rotger, Erman Ayday, Istv\u00e1n Bartha, Maria B. Delgado, u.\u00a0a. 2016. \u201ePrivacy-preserving genomic testing in the clinic: a model using HIV treatment\u201c. Genetics in Medicine 18 (8): 814-822. https:\/\/doi.org\/10.1038\/gim.2015.167.","journal-title":"Genetics in Medicine"},{"key":"1229_CR27","unstructured":"Mosca, Michele. 2017. \u201eThe Quantum Threat to Cybersecurity (for CxOs)\u201c. In ETSI \/ IQC Quantum Safe Workshop, 34."},{"key":"1229_CR28","first-page":"1701","volume":"57","author":"P Ohm","year":"2010","unstructured":"Ohm, Paul. 2010. \u201eBroken promises of privacy: Responding to the surprising failure of anonymization\u201c. UCLA law review 57: 1701.","journal-title":"UCLA law review"},{"key":"1229_CR29","unstructured":"Pinkas, Benny, Thomas Schneider, Gil Segev, und Michael Zohner. 2015. \u201ePhasing: Private Set Intersection using Permutation-based Hashing\u201c. In 24. USENIX Security Symposium (USENIX Security\u201915), 515-530. USENIX. http:\/\/thomaschneider.de\/papers\/PSSZ15.pdf."},{"key":"1229_CR30","unstructured":"Pinkas, Benny, Thomas Schneider, und Michael Zohner. 2014. \u201eFaster Private Set Intersection based on OT Extension\u201c. In 23. USENIX Security Symposium (USENIX Security\u201914), 797\u2013812. USENIX. http:\/\/thomaschneider.de\/papers\/PSZ14.pdf."},{"key":"1229_CR31","unstructured":"Prasser, Fabian, Florian Kohlmayer, Ronald Lautenschl\u00e4ger, und Klaus A. Kuhn. 2014. \u201eARX \u2013 A Comprehensive Tool for Anonymizing Biomedical Data\u201c. AMIA Annual Symposium Proceedings 2014 (November): 984-993. http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4419984\/."},{"issue":"4","key":"1229_CR32","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1109\/TCBB.2018.2854776","volume":"16","author":"Jean Louis Raisaro","year":"2019","unstructured":"Raisaro, J. L., J. Troncoso-Pastoriza, M. Misbach, J. S\u00e1 Sousa, S. Pradervand, E. Missiaglia, O. Michielin, B. Ford, und J. Hubaux. 2018. \u201eMedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data\u201c. IEEE\/ACM Transactions on Computational Biology and Bioinformatics, 1-1. https:\/\/doi.org\/10.1109\/TCBB.2018.2854776.","journal-title":"IEEE\/ACM Transactions on Computational Biology and Bioinformatics"},{"key":"1229_CR33","unstructured":"Shi, E., H. T. H. Chan, E. Rieffel, R. Chow, und D. Song. 2011. \u201ePrivacy-Preserving Aggregation of Time-Series Data\u201c. http:\/\/hub.hku.hk\/handle\/10722\/135709."},{"issue":"5","key":"1229_CR34","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1016\/j.ajhg.2015.09.010","volume":"97","author":"SS Shringarpure","year":"2015","unstructured":"Shringarpure, Suyash S., und Carlos D. Bustamante. 2015. \u201ePrivacy Risks from Genomic Data-Sharing Beacons\u201c. The American Journal of Human Genetics 97 (5): 631-646. https:\/\/doi.org\/10.1016\/j.ajhg.2015.09.010.","journal-title":"The American Journal of Human Genetics"},{"key":"1229_CR35","unstructured":"\u201eSignal Blog Technology Preview: Private Contact Discovery for Signal\u201c. o. J. https:\/\/signal.org\/blog\/private-contact-discovery\/."},{"key":"1229_CR36","doi-asserted-by":"crossref","unstructured":"\u201eSpecial Issue: Genome Privacy and Security\u201c. 2017. IEEE Security & Privacy 15 (5). https:\/\/doi.org\/doi.ieeecomputersociety.org\/10.1109\/MSP.2017.3681067.","DOI":"10.1109\/MSP.2017.3681053"},{"key":"1229_CR37","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-45381-1_11","volume-title":"Privacy in Statistical Databases","author":"Sebastian Stammler","year":"2016","unstructured":"Stammler, Sebastian, Stefan Katzenbeisser, und Kay Hamacher. 2016. \u201eCorrecting Finite Sampling Issues in Entropy l-diversity\u201c. In Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14-16, 2016, Proceedings, herausgegeben von Josep Domingo-Ferrer und Mirjana Peji\u0107-Bach, 135-146. Cham: Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-45381-1_11."},{"key":"1229_CR38","unstructured":"Wang, Victoria, und John V. Tucker. 2014. \u201eFormalising Surveillance and Identity\u201c. arXiv:1408.3439 [cs], August. http:\/\/arxiv.org\/abs\/1408.3439."},{"issue":"3","key":"1229_CR39","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s11623-019-1082-x","volume":"43","author":"T Weichert","year":"2019","unstructured":"Weichert, Thilo. 2019. \u201eGenetische Genealogie und Datenschutz\u201c. Datenschutz und Datensicherheit \u2013 DuD 43 (3): 149-153. https:\/\/doi.org\/10.1007\/s11623-019-1082-x.","journal-title":"Datenschutz und Datensicherheit \u2013 DuD"},{"issue":"5","key":"1229_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1472-6947-15-S5-S4","volume":"15","author":"Y Zhang","year":"2015","unstructured":"Zhang, Yihua, Marina Blanton, und Ghada Almas-haqbeh. 2015. \u201eSecure distributed genome analysis for GWAS and sequence comparison computation\u201c. BMC Medical Informatics and Decision Making 15 (5): 1\u201312. https:\/\/doi.org\/10.1186\/1472-6947-15-S5-S4.","journal-title":"BMC Medical Informatics and Decision Making"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1229-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-020-1229-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1229-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T00:08:15Z","timestamp":1612397295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-020-1229-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1229"],"URL":"https:\/\/doi.org\/10.1007\/s11623-020-1229-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2]]},"assertion":[{"value":"5 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}