메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Toward A Practical Data Privacy Scheme for A Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm

Author keywords

data privacy; distributed computation; Smith Waterman algorithm

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; GENES; PERSONAL COMPUTERS; SUPERCOMPUTERS;

EID: 85129493630     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (20)

References (38)
  • 1
    • 0025230154 scopus 로고
    • Secure circuit evaluation: A protocol based on hiding information from an oracle
    • M. Abadi and J. Feigenbaum. Secure circuit evaluation: A protocol based on hiding information from an oracle. Journal of Cryptology, 2(1):1–12, 1990.
    • (1990) Journal of Cryptology , vol.2 , Issue.1 , pp. 1-12
    • Abadi, M.1    Feigenbaum, J.2
  • 5
    • 0023408117 scopus 로고
    • Processing encrypted data
    • N. Ahituv, Y. Lapid, and S. Neumann. Processing encrypted data. Commun. ACM, 30(9):777–780, 1987.
    • (1987) Commun. ACM , vol.30 , Issue.9 , pp. 777-780
    • Ahituv, N.1    Lapid, Y.2    Neumann, S.3
  • 7
    • 0029889221 scopus 로고    scopus 로고
    • Local alignment statistics
    • S. Altschul and W. Gish. Local alignment statistics. Methods Enzymol, 266:460–480, 1996.
    • (1996) Methods Enzymol , vol.266 , pp. 460-480
    • Altschul, S.1    Gish, W.2
  • 13
    • 0000724617 scopus 로고
    • Structure and function of nucleic acids as cell constituents
    • E. Chargaff. Structure and function of nucleic acids as cell constituents. Fed. Proc, 10:654–659, 1951.
    • (1951) Fed. Proc , vol.10 , pp. 654-659
    • Chargaff, E.1
  • 15
    • 0030577321 scopus 로고    scopus 로고
    • A new privacy homomorphism and applications
    • December
    • J. Domingo-Ferrer. A new privacy homomorphism and applications. Information Processing Letters, 60(5):277–282, December 1996.
    • (1996) Information Processing Letters , vol.60 , Issue.5 , pp. 277-282
    • Domingo-Ferrer, J.1
  • 17
    • 85034638281 scopus 로고
    • Encrypted problem instances, or... Can you take advantage of someone without having to trust him?
    • Springer-Verlag
    • J. Feigenbaum. Encrypted problem instances, or... Can you take advantage of someone without having to trust him? In Proceedings of Crypto’ 85, pages 477–488. Springer-Verlag, 1986.
    • (1986) Proceedings of Crypto’ 85 , pp. 477-488
    • Feigenbaum, J.1
  • 18
    • 85180621260 scopus 로고    scopus 로고
    • Genbank. http://www.ncbi.nlm.nih.gov/GenBank/GenBankOverview.html.
  • 23
    • 0025259313 scopus 로고
    • Methods for assessing the statistical significance of molecular sequence features by using general scoring schemes
    • March
    • S. Karlin and S. Altschul. Methods for assessing the statistical significance of molecular sequence features by using general scoring schemes. Proceedings of the National Academy of Sciences (USA), 87:2264–2268, March 1990.
    • (1990) Proceedings of the National Academy of Sciences (USA) , vol.87 , pp. 2264-2268
    • Karlin, S.1    Altschul, S.2
  • 24
    • 0027175241 scopus 로고
    • Applications and statistics for multiple high-scoring segments in molecular sequences
    • June
    • S. Karlin and S. Altschul. Applications and statistics for multiple high-scoring segments in molecular sequences. Proceedings of the National Academy of Sciences (USA), 90:5873–5877, June 1993.
    • (1993) Proceedings of the National Academy of Sciences (USA) , vol.90 , pp. 5873-5877
    • Karlin, S.1    Altschul, S.2
  • 26
    • 0014757386 scopus 로고
    • A general method applicable to the search for similarities in the amino acid sequence of two proteins
    • S. Needleman and C. Wunsch. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 48:443–453, 1970.
    • (1970) Journal of Molecular Biology , vol.48 , pp. 443-453
    • Needleman, S.1    Wunsch, C.2
  • 27
    • 0032512799 scopus 로고    scopus 로고
    • Empirical statistical estimates for sequence similariy searches
    • W. Pearson. Empirical statistical estimates for sequence similariy searches. Journal of Molecular Biology, 276:71–84, 1998.
    • (1998) Journal of Molecular Biology , vol.276 , pp. 71-84
    • Pearson, W.1
  • 29
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • R. D. Millo, D. Dobkin, A. Jones, and R. Lipton, editors, pages Academic Press, New York
    • R. Rivest, L. Adleman, and M. Dertouzos. On data banks and privacy homomorphisms. In R. D. Millo, D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 169–179. Academic Press, New York, 1978.
    • (1978) Foundations of Secure Computation , pp. 169-179
    • Rivest, R.1    Adleman, L.2    Dertouzos, M.3
  • 32
    • 0036499242 scopus 로고    scopus 로고
    • Sabotage-tolerance mechanisms for volunteer computing systems
    • March
    • L. Sarmenta. Sabotage-tolerance mechanisms for volunteer computing systems. Future Generation Computer Systems, 18(4):561–572, March 2002.
    • (2002) Future Generation Computer Systems , vol.18 , Issue.4 , pp. 561-572
    • Sarmenta, L.1
  • 33
    • 0019887799 scopus 로고
    • Identification of common molecular subsequences
    • T. Smith and M. Waterman. Identification of common molecular subsequences. Journal of Molecular Biology, 147:195–197, 1981.
    • (1981) Journal of Molecular Biology , vol.147 , pp. 195-197
    • Smith, T.1    Waterman, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.