Security-oriented data grids for microarray expression profiles

Sinnott, R.O., Bayliss, C. and Jiang, J. (2007) Security-oriented data grids for microarray expression profiles. Studies in Health Technology and Informatics, 126, pp. 67-76.

[img] Text
7358.pdf

114kB

Abstract

Microarray experiments are one of the key ways in which gene activity can be identified and measured thereby shedding light and understanding for example on biological processes. The BBSRC funded Grid enabled Microarray Expression Profile Search (GEMEPS) project has developed an infrastructure which allows post-genomic life science researchers to ask and answer the following questions: who has undertaken microarray experiments that are in some way similar or relevant to mine; and how similar were these relevant experiments? Given that microarray experiments are expensive to undertake and may possess crucial information for future exploitation (both academically and commercially), scientists are wary of allowing unrestricted access to their data by the wider community until fully exploited locally. A key requirement is thus to have fine grained security that is easy to establish and simple (or ideally transparent) to use across inter-institutional virtual organisations. In this paper we present an enhanced security-oriented data Grid infrastructure that supports the definition of these kinds of queries and the analysis and comparison of microarray experiment results.

Item Type:Articles
Keywords:Microarray expression profiles, grid security, shibboleth
Status:Published
Refereed:Yes
Glasgow Author(s) Enlighten ID:Jiang, Mr Jipu and Sinnott, Professor Richard and Bayliss, Mr Christopher
Authors: Sinnott, R.O., Bayliss, C., and Jiang, J.
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
College/School:University Services > IT Services > Computing Service
Journal Name:Studies in Health Technology and Informatics
Publisher:IOS Press
ISSN:0926-9630
Copyright Holders:Copyright © 2007 IOS Press
First Published:First published in Studies in Health Technology and Informatics 126:67-76
Publisher Policy:Reproduced in accordance with the copyright policy of the publisher.

University Staff: Request a correction | Enlighten Editors: Update this record