{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:10:50Z","timestamp":1742969450284,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319608150"},{"type":"electronic","value":"9783319608167"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60816-7_27","type":"book-chapter","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T01:42:40Z","timestamp":1497922960000},"page":"220-227","source":"Crossref","is-referenced-by-count":1,"title":["Cloud-Assisted Read Alignment and Privacy"],"prefix":"10.1007","author":[{"given":"Maria","family":"Fernandes","sequence":"first","affiliation":[]},{"given":"J\u00e9r\u00e9mie","family":"Decouchant","sequence":"additional","affiliation":[]},{"given":"Francisco M.","family":"Couto","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Esteves-Verissimo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,21]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.jbi.2015.05.022","volume":"56","author":"M Akg\u00fcn","year":"2015","unstructured":"Akg\u00fcn, M., Bayrak, A.O., Ozer, B., et al.: Privacy preserving processing of genomic data: a survey. J. Biomed. Inf. 56, 103\u2013111 (2015)","journal-title":"J. Biomed. Inf."},{"issue":"3","key":"27_CR2","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/S0022-2836(05)80360-2","volume":"215","author":"SF Altschul","year":"1990","unstructured":"Altschul, S.F., Gish, W., Miller, W., et al.: Basic local alignment search tool. J. Mol. Biol. 215(3), 403\u2013410 (1990)","journal-title":"J. Mol. Biol."},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Baron, J., El Defrawy, K., Minkovich, K., et al.: 5pm: secure pattern matching. In: SCN, pp. 222\u2013240 (2012)","DOI":"10.1007\/978-3-642-32928-9_13"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Bessani, A., Brandt, J., Bux, M., et al.: Biobankcloud: a platform for the secure storage, sharing, and processing of large biomedical data sets. In: DMAH (2015)","DOI":"10.1007\/978-3-319-41576-5_7"},{"issue":"1","key":"27_CR5","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1146\/annurev-genom-082410-101446","volume":"12","author":"IS Chan","year":"2011","unstructured":"Chan, I.S., Ginsburg, G.S.: Personalized medicine: progress and promise. Ann. Rev. Genomics Hum. Genet. 12(1), 217\u2013244 (2011)","journal-title":"Ann. Rev. Genomics Hum. Genet."},{"key":"27_CR6","unstructured":"Chen, Y., Peng, B., Wang, X., et al.: Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds. In: NDSS (2012)"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Cogo, V.V., Bessani, A., Couto, F.M., et al.: A high-throughput method to detect privacy-sensitive human genomic data. In: ACM WPES, pp. 101\u2013110 (2015)","DOI":"10.1145\/2808138.2808139"},{"key":"27_CR8","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.1038\/ejhg.2014.196","volume":"23","author":"ES Dove","year":"2015","unstructured":"Dove, E.S., Joly, Y., Tasse, A.M., et al.: Genomic cloud computing: legal and ethical points to consider. Eur. J. Hum. Genet. 23, 1271\u20131278 (2015)","journal-title":"Eur. J. Hum. Genet."},{"key":"27_CR9","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1038\/nrg3723","volume":"15","author":"Y Erlich","year":"2014","unstructured":"Erlich, Y., Narayanan, A.: Routes for breaching and protecting genetic privacy. Nat. Rev. Genet. 15, 409\u2013421 (2014)","journal-title":"Nat. Rev. Genet."},{"issue":"6117","key":"27_CR10","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek, M., McGuire, A.L., Golan, D., et al.: Identifying personal genomes by surname inference. Science 339(6117), 321\u2013324 (2013)","journal-title":"Science"},{"issue":"8","key":"27_CR11","doi-asserted-by":"crossref","first-page":"e1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"N Homer","year":"2008","unstructured":"Homer, N., Szelinger, S., Redman, M., et al.: Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLoS Genet. 4(8), e1000167 (2008)","journal-title":"PLoS Genet."},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Huang, Y., Evans, D., Katz, J., et al.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium, vol. 201(1) (2011)","DOI":"10.1007\/978-3-642-25560-1_2"},{"issue":"5","key":"27_CR13","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1038\/nrg2573","volume":"10","author":"J Kaye","year":"2009","unstructured":"Kaye, J., Heeney, C., Hawkins, N., et al.: Data sharing in genomics re-shaping scientific practice. Nat. Rev. Genet. 10(5), 331\u2013335 (2009)","journal-title":"Nat. Rev. Genet."},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Kienzler, R., Bruggmann, R., Ranganathan, A., et al.: Large-scale DNA sequence analysis in the cloud: a stream-based approach. In: ICPP, vol. 2, pp. 467\u2013476 (2012)","DOI":"10.1007\/978-3-642-29740-3_52"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Matsunaga, A., Tsugawa, M., Fortes, J.: Cloudblast: combining mapreduce and virtualization on distributed resources for bioinformatics applications. In: ESCIENCE 2008, pp. 222\u2013229 (2008)","DOI":"10.1109\/eScience.2008.62"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Namazi, M., Troncoso-Pastoriza, J.R., P\u00e9rez-Gonz\u00e1lez, F.: Dynamic privacy-preserving genomic susceptibility testing. In: ACM MMSec, pp. 45\u201350 (2016)","DOI":"10.1145\/2909827.2930791"},{"issue":"1","key":"27_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2767007","volume":"48","author":"M Naveed","year":"2015","unstructured":"Naveed, M., Ayday, E., Clayton, E.W., et al.: Privacy in the genomic era. ACM CSUR 48(1), 1\u201344 (2015)","journal-title":"ACM CSUR"},{"key":"27_CR18","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1038\/ejhg.2008.198","volume":"17","author":"DR Nyholt","year":"2009","unstructured":"Nyholt, D.R., Yu, C.E., Visscher, P.M.: On Jim Watsons apoe status: genetic information is hard to hide. Eur. J. Hum. Genet. 17, 147\u2013149 (2009)","journal-title":"Eur. J. Hum. Genet."},{"issue":"5","key":"27_CR19","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1016\/j.jbi.2013.07.001","volume":"46","author":"A O\u2019Driscoll","year":"2013","unstructured":"O\u2019Driscoll, A., Daugelaite, J., Sleator, R.D.: \u201cBig data\u201d, hadoop and cloud computing in genomics. J. Biomed. Inf. 46(5), 774\u2013781 (2013)","journal-title":"J. Biomed. Inf."},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Rocha, F., Correia, M.: Lucy in the sky without diamonds: stealing confidential data in the cloud. In: DSNW, pp. 129\u2013134 (2011)","DOI":"10.1109\/DSNW.2011.5958798"},{"issue":"5","key":"27_CR21","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1186\/gb-2010-11-5-207","volume":"11","author":"LD Stein","year":"2010","unstructured":"Stein, L.D.: The case for cloud computing in genome informatics. Genome Biol. 11(5), 207 (2010)","journal-title":"Genome Biol."},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Talukder, A., Gandham, S., Prahalad, H., et al.: Cloud-maq: the cloud-enabled scalable whole genome reference assembly application. In: WOCN, pp. 1\u20135 (2010)","DOI":"10.1109\/WOCN.2010.5587308"},{"issue":"1","key":"27_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pmed.1001937","volume":"13","author":"E Vayena","year":"2016","unstructured":"Vayena, E., Gasser, U.: Between openness and privacy in genomics. PLoS Med. 13(1), 1\u20137 (2016)","journal-title":"PLoS Med."},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, K., Zhou, X., Chen, Y., et al.: Sedic: Privacy-aware data intensive computing on hybrid clouds. In: ACM CCS, pp. 515\u2013526 (2011)","DOI":"10.1145\/2046707.2046767"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, X., Peng, B., Li, Y.F., et al.: To release or not to release: Evaluating information leaks in aggregate human-genome data. In: ESORICS, pp. 607\u2013627 (2011)","DOI":"10.1007\/978-3-642-23822-2_33"}],"container-title":["Advances in Intelligent Systems and Computing","11th International Conference on Practical Applications of Computational Biology &amp; Bioinformatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60816-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T05:29:28Z","timestamp":1569475768000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60816-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319608150","9783319608167"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60816-7_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}