[AISWorld] CALL FOR PARTICIPANTS: IDASH PRIVACY & SECURITY WORKSHOP 2016

Idash Workshop idashworkshops at gmail.com
Sat Feb 13 02:31:04 EST 2016


*IDASH PRIVACY & SECURITY WORKSHOP 2016*
*CALL FOR PARTICIPANTS*
*IMPORTANT DATES*
*    Registration: 02/12/2016 – 03/31/2016*
*    Submission: 08/31/2016*
*    Workshop: 11/11/2016*
*LOCATION*
*Northwestern University            *[image: Description:
http://www.ncenglishteachersassociation.org/storage/images/buttons/reg_now_button.jpg?__SQUARESPACE_CACHEVERSION=1406756765112]
*Chicago, Illinois, 60208*
*Right before AMIA 2016 Annual Symposium*

*SPONSORS*



*Competition organizers*

*Indiana University Team:*

*Haixu Tang *

*(hatang at indiana.edu <hatang at indiana.edu>)*

*XiaoFeng Wang *

*(xw7 at indiana.edu <xw7 at indiana.edu>)*

*UC San Diego team:*

*Shuang Wang*

*(shw070 at ucsd.edu <shw070 at ucsd.edu>)*

*Xiaoqian Jiang *

*(x1jiang at ucsd.edu <x1jiang at ucsd.edu>)*

*Local organizers*

*Bradley Malin(b.malin at vanderbilt.edu <b.malin at vanderbilt.edu>)*
*Abel Kho *
*(abel.kho at nm.org <abel.kho at nm.org>)*

*General chair*

*Lucila Ohno-MachadoUC San Diego*



*CONTACT*



*UC, San Diego Department of Biomedical Informatics9500 Gilman Dr.,
#0728, La Jolla, CA 92093*

*Highlights*
·  Builds on the success of previous competitions in 2014
<http://www.humangenomeprivacy.org/2014> and 2015
<http://www.humangenomeprivacy.org/2015>
·  Fosters research efforts aimed to address privacy and security issues in
genomics
·  Brings together a highly interdisciplinary community involved in all
aspects of genome privacy and security research
·  Seeks participants from privacy, security and bioinformatics communities
to evaluate the performance of state-of-the-art methods that ensures
rigorous data confidentiality during genomic data analysis
·  Will publish accepted papers in a special issue of a journal

*Competition tasks:*

Ø *Track 1: Practical Protection of Genomic Data Sharing through Beacon
Services (privacy-preserving output release)*

Given a sample Beacon, we will ask participating team to develop solutions
to mitigate the Bustamante attack
<http://www.cell.com/ajhg/abstract/S0002-9297(15)00374-2>. We will evaluate
each algorithm based on the maximum number of correct queries that it can
respond before any individual in the Beacon can be re-identified.

Ø *Track 2: Privacy-Preserving Search of Similar Cancer Patients across
Organizations (secure multiparty computing)*

The scenario of this track is to find top-*k* most similar patients in a
database on a panel of genes. The similarity is measured by the edit
distance between a query sequence and sequences in the database (two
party). We expect participating teams come up with different algorithms
that can provide good approximation to the actual edit distance and also be
efficient.

Ø *Track 3: Testing for Genetic Diseases on Encrypted Genomes  (secure
outsourcing)*

This is to calculate the probability of genetic diseases through matching a
set of biomarkers to encrypted genomes that stored in a commercial cloud
service. The requirement is that the entire matching process needs to be
carried out using homomorphic encryption so that no trace is left behind
during the computation.

*Task evaluation:*
Each team should submit a suite of programs that implements their
protocols, for which the performance will be evaluated by the organizers on
large datasets.

For details: http://www.humangenomeprivacy.org/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image004.png
Type: image/png
Size: 5065 bytes
Desc: not available
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20160212/a767aa89/attachment.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image006.png
Type: image/png
Size: 3488 bytes
Desc: not available
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20160212/a767aa89/attachment-0001.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.png
Type: image/png
Size: 16597 bytes
Desc: not available
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20160212/a767aa89/attachment-0002.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image008.png
Type: image/png
Size: 3691 bytes
Desc: not available
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20160212/a767aa89/attachment-0003.png>


More information about the AISWorld mailing list