Appendix B: References

Appendix B: References#

[Ref1]

National Institute of Standards and Technology (2021) NIST Privacy Risk Assessment Methodology (PRAM). https://www.nist.gov/privacy-framework/nist-pram

[Ref2]

LINDDUN Privacy Threat Modeling. Available at https://linddun.org/

[Ref3]

MITRE PANOPTIC Privacy Threat Model. Available at https://ptmworkshop.gitlab.io/#/panoptic

[Ref4]

NIST. Privacy Framework. https://www.nist.gov/privacy-framework

[Ref5]

Martin N, et al. (2023) Cybersecurity Framework Profile for Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), Initial Public Draft NIST Interagency or Internal Report (IR) 8467. https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8467.2pd.pdf

[Ref6]

National Institute of Standards and Technology (2025) Special Publication SP 800-53 Rev.5 https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final

[Ref7]

Pulivarti R, Wagner J, Zook, J, Kreider B, Wilson K, Snyder J, Wojtyniak M, Ross S, Whitlow P, Sheldon J, Brown I, Pape P, Alim E (2024) Cybersecurity Threat Modeling the Genomic Data Sequencing Workflow: An example threat model implementation for genomic data sequencing and analysis. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Cybersecurity White Paper (CSWP) NIST CSWP 35 ipd. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.35.ipd.pdf

[Ref8]

Garfinkel S, Guttman B, Near J, Dajani A, Singer P (2023) De-identifying Government Datasets: Techniques and Governance. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication 800-188. https://doi.org/10.6028/NIST.SP.800-188

[Ref9]

Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8062. https://doi.org/10.6028/NIST.IR.8062

[Ref10]

OECD, Recommendation of the Council concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, OECD/LEGAL/0188. Available at https://legalinstruments.oecd.org/en/instruments/OECD-LEGAL-0188

[Ref11]

Pulivarti R, Martin N, Byers F, Wagner J, Maragh S, Wilson K, Wojtyniak M, Kreider B, Frances A, Edwards S, Morris T, Sheldon J, Ross S, Whitlow P (2023) Cybersecurity of Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8432. https://doi.org/10.6028/NIST.IR.8432

[Ref12]

Grace T, Nolan T, Burke K, Dudley R, White G, Good T (2006) Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-84. https://doi.org/10.6028/NIST.SP.800-84