’s disease and other dementias: A priority for European science and society. The Lancet Neurology, 15(5), 455–532. 10.1016/S1474-4422(16)00062-4 Winblad B. Amouyel P. Andrieu S. Ballard C. Brayne C. Brodaty H. Zetterberg H. 2016 Defeating Alzheimer’s disease and other dementias: A priority for European science and society The Lancet Neurology 15 5 455 532
Yokoyama, J.S., Wang, Y., Schork, A.J., Thompson, W.K., Karch, C.M., Cruchaga, C., . . . & Desikan, R.S. (2016). Association between genetic traits for immune-mediated diseases and Alzheimer disease. JAMA Neurology, 73
hypothesis ( Swanson, 1993 ).
Don made further analyses of complementary un-connected literatures, both by himself ( Swanson, 1990 ) and in collaboration with me (e.g. Swanson, Smalheiser, & Bookstein, 2001 ; Smalheiser & Swanson, 1994 , 1996a , 1996b , 1998 ). It is noteworthy that late in his career, Don proposed a link between atrial fibrillation and running ( Swanson, 2006 ). Exercise is known to be a risk factor for atrial fibrillation, and he proposed that this may be mediated by gastroesophageal reflux, which in turn may be alleviated by taking proton pump
Luís T. A. N. Brandão, Nicolas Christin, George Danezis and Anonymous
Available online public/governmental services requiring authentication by citizens have considerably expanded in recent years. This has hindered the usability and security associated with credential management by users and service providers. To address the problem, some countries have proposed nation-scale identification/authentication systems that intend to greatly reduce the burden of credential management, while seemingly offering desirable privacy benefits. In this paper we analyze two such systems: the Federal Cloud Credential Exchange (FCCX) in the United States and GOV.UK Verify in the United Kingdom, which altogether aim at serving more than a hundred million citizens. Both systems propose a brokered identification architecture, where an online central hub mediates user authentications between identity providers and service providers. We show that both FCCX and GOV.UK Verify suffer from serious privacy and security shortcomings, fail to comply with privacy-preserving guidelines they are meant to follow, and may actually degrade user privacy. Notably, the hub can link interactions of the same user across different service providers and has visibility over private identifiable information of citizens. In case of malicious compromise it is also able to undetectably impersonate users. Within the structural design constraints placed on these nation-scale brokered identification systems, we propose feasible technical solutions to the privacy and security issues we identified. We conclude with a strong recommendation that FCCX and GOV.UK Verify be subject to a more in-depth technical and public review, based on a defined and comprehensive threat model, and adopt adequate structural adjustments.
Irwin Reyes, Primal Wijesekera, Joel Reardon, Amit Elazari Bar On, Abbas Razaghpanah, Narseo Vallina-Rodriguez and Serge Egelman
We present a scalable dynamic analysis framework that allows for the automatic evaluation of the privacy behaviors of Android apps. We use our system to analyze mobile apps’ compliance with the Children’s Online Privacy Protection Act (COPPA), one of the few stringent privacy laws in the U.S. Based on our automated analysis of 5,855 of the most popular free children’s apps, we found that a majority are potentially in violation of COPPA, mainly due to their use of thirdparty SDKs. While many of these SDKs offer configuration options to respect COPPA by disabling tracking and behavioral advertising, our data suggest that a majority of apps either do not make use of these options or incorrectly propagate them across mediation SDKs. Worse, we observed that 19% of children’s apps collect identifiers or other personally identifiable information (PII) via SDKs whose terms of service outright prohibit their use in child-directed apps. Finally, we show that efforts by Google to limit tracking through the use of a resettable advertising ID have had little success: of the 3,454 apps that share the resettable ID with advertisers, 66% transmit other, non-resettable, persistent identifiers as well, negating any intended privacy-preserving properties of the advertising ID.
Computation based on genomic data is becoming increasingly popular today, be it for medical or other purposes. Non-medical uses of genomic data in a computation often take place in a server-mediated setting where the server offers the ability for joint genomic testing between the users. Undeniably, genomic data is highly sensitive, which in contrast to other biometry types, discloses a plethora of information not only about the data owner, but also about his or her relatives. Thus, there is an urgent need to protect genomic data. This is particularly true when the data is used in computation for what we call recreational non-health-related purposes. Towards this goal, in this work we put forward a framework for server-aided secure two-party computation with the security model motivated by genomic applications. One particular security setting that we treat in this work provides stronger security guarantees with respect to malicious users than the traditional malicious model. In particular, we incorporate certified inputs into secure computation based on garbled circuit evaluation to guarantee that a malicious user is unable to modify her inputs in order to learn unauthorized information about the other user’s data. Our solutions are general in the sense that they can be used to securely evaluate arbitrary functions and offer attractive performance compared to the state of the art. We apply the general constructions to three specific types of genomic tests: paternity, genetic compatibility, and ancestry testing and implement the constructions. The results show that all such private tests can be executed within a matter of seconds or less despite the large size of one’s genomic data.
 Lavendelis, E. and Grundspenkis, J., “Multi-Agent Auction Based Simulation Tool for an Insurance Policy Market,” International Scientific Journal of RTU, Applied Computer Systems , vol. 15, pp. 5–13, 2014. http://dx.doi.org/10.2478/acss-2014-0001
 David, E., et al . (eds.), “Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets,” AMEC and TADA 2012, Valencia, Spain, June 4th, 2012, Revised Selected Papers. Lecture Notes in Business Information Processing . vol. 136, p. 160, 2013
 E. David, C. Kiekintveld, V. Robu, O. Shehory and S. Stein Eds. Agent- Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets. AMEC and TADA 2012, Valencia, Spain, June 4th, 2012, Revised Selected Papers. Lecture Notes in Business Information Processing. Volume 136, 160 p. 2013.
 J. Debenham and S. Simoff, “Three Technologies for Automated Trading” in Artificial Intelligence in Theory and Practice. IFIP International Federation for Information Processing Volume 217
 W. Almesberger. TCP connection passing. In Linux Symposium , volume 1, July 2004.
 A. Aurelius, C. Lagerstedt, and M. Kihl. Streaming media over the Internet: Flow based analysis in live access networks. In Broadband Multimedia Systems and Broadcasting, 2011 IEEE International Symposium on , 2011.
 J. Boyan. The Anonymizer: Protecting user privacy on the web. Computer-Mediated Communication Magazine , 4(9), Sept. 1997.
 C. Brubaker, A. Houmansadr, and V. Shmatikov. Cloud-Transport: Using cloud storage for
Christoph Bösch, Benjamin Erb, Frank Kargl, Henning Kopp and Stefan Pfattheicher
 N. B. Ellison, C. Steinfield, and C. Lampe, “The benefits of facebook "friends:" social capital and college students’ use of online social network sites,” Journal of Computer- Mediated Communication, vol. 12, no. 4, pp. 1143-1168, 2007.
 R. H. Fazio, “Multiple processes by which attitudes guide behavior: The MODE model as an integrative framework,” Advances in Experimental Social Psychology, vol. 23, pp. 75-109, 1990.
 L. Festinger, A theory of cognitive dissonance. Stanford university press, 1962
 C. Kam, J. Wilking, and E. Zechmeister. Beyond the “narrow data base”: Another convenience sample for experimental research. Political Behavior, 29(4):415-440, Dec. 2007.
 A. Kavanaugh, J. Carroll, M. Rosson, T. Zin, and D. Reese. Community networks: Where offline communities meet online. Journal of Computer-Mediated Communication, 10(4), 2005.
 P. Kelley, L. F. Cranor, and N. Sadeh. Privacy as part of the app decision-making process. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), pages