{"id":"https://openalex.org/W1987035212","doi":"https://doi.org/10.1109/gensips.2011.6169474","title":"Personal genome privacy protection with feature-based hierarchical dual-stage encryption","display_name":"Personal genome privacy protection with feature-based hierarchical dual-stage encryption","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W1987035212","doi":"https://doi.org/10.1109/gensips.2011.6169474","mag":"1987035212"},"language":"en","primary_location":{"id":"doi:10.1109/gensips.2011.6169474","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gensips.2011.6169474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE International Workshop on Genomic Signal Processing and Statistics (GENSIPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087196191","display_name":"Xukai Zou","orcid":"https://orcid.org/0000-0001-5762-8876"},"institutions":[{"id":"https://openalex.org/I135191193","display_name":"University of Indianapolis","ror":"https://ror.org/052133d12","country_code":"US","type":"education","lineage":["https://openalex.org/I135191193"]},{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xukai Zou","raw_affiliation_strings":["Department of Computer & Information Science, Purdue University, Indianapolis, IN, USA","Department of Computer & Information Science, Purdue University, Indianapolis, 46202, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer & Information Science, Purdue University, Indianapolis, IN, USA","institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"]},{"raw_affiliation_string":"Department of Computer & Information Science, Purdue University, Indianapolis, 46202, USA","institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346838","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5694-6271"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["College of Information Science and Technology, Pennslyvania State University, University Park, PA, USA","College of Information Science and Technology, Penn State University, University Park, 16802, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Pennslyvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"College of Information Science and Technology, Penn State University, University Park, 16802, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058469124","display_name":"Jake Y. Chen","orcid":"https://orcid.org/0000-0001-8829-7504"},"institutions":[{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jake Y. Chen","raw_affiliation_strings":["School of Informatics, Indiana University, Indianapolis, IN, USA","School of Informatics, Indiana University, Indianapolis, 46202, USA"],"affiliations":[{"raw_affiliation_string":"School of Informatics, Indiana University, Indianapolis, IN, USA","institution_ids":["https://openalex.org/I55769427"]},{"raw_affiliation_string":"School of Informatics, Indiana University, Indianapolis, 46202, USA","institution_ids":["https://openalex.org/I55769427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087196191"],"corresponding_institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"],"apc_list":null,"apc_paid":null,"fwci":0.1303,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50686267,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"20","issue":null,"first_page":"178","last_page":"181"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7635573148727417},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6465851068496704},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.598691463470459},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.564174234867096},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.5395402908325195},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.47017616033554077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.436549574136734},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3651641607284546}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7635573148727417},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6465851068496704},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.598691463470459},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.564174234867096},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.5395402908325195},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.47017616033554077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.436549574136734},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3651641607284546},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gensips.2011.6169474","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gensips.2011.6169474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE International Workshop on Genomic Signal Processing and Statistics (GENSIPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1951707894","https://openalex.org/W2031338211","https://openalex.org/W2035452705","https://openalex.org/W2067060025","https://openalex.org/W2092133457","https://openalex.org/W2113713626","https://openalex.org/W2118469945","https://openalex.org/W2135227684","https://openalex.org/W4255797651","https://openalex.org/W6655821723"],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W4396832952","https://openalex.org/W3046095319","https://openalex.org/W3197497514","https://openalex.org/W1591172238","https://openalex.org/W2111194702","https://openalex.org/W2972172135","https://openalex.org/W2116878667","https://openalex.org/W315296216","https://openalex.org/W1787552957"],"abstract_inverted_index":{"Personal":[0],"Genomic":[1],"information":[2,23,36,71],"is":[3,37],"becoming":[4],"increasingly":[5],"important":[6],"to":[7,86,100,120],"both":[8],"scientific":[9],"research":[10],"and":[11,73,90,105],"clinical":[12],"practice.":[13],"However,":[14],"security":[15],"breach,":[16],"misuse,":[17],"or":[18,53],"unintended":[19],"disclosure":[20],"of":[21,33,80,107],"this":[22,57],"may":[24],"result":[25],"in":[26,39,128],"severe":[27],"privacy":[28,31,64,88,109],"breaches.":[29],"Traditional":[30],"preservation":[32],"personal":[34,124],"genome":[35,46,70,125],"implemented":[38,119],"an":[40,44],"\u201call-or-none\u201d":[41],"manner,":[42],"i.e.,":[43],"entire":[45],"being":[47],"controlled":[48],"as":[49],"either":[50],"fully":[51,54],"accessible":[52],"inaccessible.":[55],"In":[56],"paper,":[58],"we":[59],"propose":[60],"a":[61],"new":[62],"fine-grained":[63],"protection":[65,72],"method":[66,76],"for":[67],"flexible":[68],"multi-level":[69],"access.":[74,94],"The":[75,111],"can":[77,116],"make":[78],"use":[79],"any":[81],"user-defined":[82],"hierarchical":[83,93],"knowledge":[84],"structure":[85],"define":[87],"levels":[89],"control":[91],"cryptography-based":[92],"It":[95],"also":[96],"implements":[97],"dual-stage":[98],"encryptions":[99],"allow":[101],"efficient":[102],"definition,":[103],"addition,":[104],"update":[106],"feature-based":[108],"protections.":[110],"experiments":[112],"show":[113],"that":[114],"it":[115],"be":[117],"effectively":[118],"deal":[121],"with":[122],"real":[123],"data":[126],"sets":[127],"the":[129],"future.":[130]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
