Appendix B: References ====================== .. [Ref1] National Institute of Standards and Technology (2021) NIST Privacy Risk Assessment Methodology (PRAM). https://www.nist.gov/privacy-framework/nist-pram .. [Ref2] LINDDUN Privacy Threat Modeling. Available at https://linddun.org/ .. [Ref3] MITRE PANOPTIC Privacy Threat Model. Available at https://ptmworkshop.gitlab.io/#/panoptic .. [Ref4] NIST. Privacy Framework. https://www.nist.gov/privacy-framework .. [Ref5] Martin N, et al. (2023) Cybersecurity Framework Profile for Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), Initial Public Draft NIST Interagency or Internal Report (IR) 8467. https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8467.2pd.pdf .. [Ref6] National Institute of Standards and Technology (2025) Special Publication SP 800-53 Rev.5 https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final .. [Ref7] Pulivarti R, Wagner J, Zook, J, Kreider B, Wilson K, Snyder J, Wojtyniak M, Ross S, Whitlow P, Sheldon J, Brown I, Pape P, Alim E (2024) Cybersecurity Threat Modeling the Genomic Data Sequencing Workflow: An example threat model implementation for genomic data sequencing and analysis. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Cybersecurity White Paper (CSWP) NIST CSWP 35 ipd. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.35.ipd.pdf .. [Ref8] Garfinkel S, Guttman B, Near J, Dajani A, Singer P (2023) De-identifying Government Datasets: Techniques and Governance. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication 800-188. https://doi.org/10.6028/NIST.SP.800-188 .. [Ref9] Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8062. https://doi.org/10.6028/NIST.IR.8062 .. [Ref10] OECD, Recommendation of the Council concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, OECD/LEGAL/0188. Available at https://legalinstruments.oecd.org/en/instruments/OECD-LEGAL-0188 .. [Ref11] Pulivarti R, Martin N, Byers F, Wagner J, Maragh S, Wilson K, Wojtyniak M, Kreider B, Frances A, Edwards S, Morris T, Sheldon J, Ross S, Whitlow P (2023) Cybersecurity of Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8432. https://doi.org/10.6028/NIST.IR.8432 .. [Ref12] Grace T, Nolan T, Burke K, Dudley R, White G, Good T (2006) Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-84. https://doi.org/10.6028/NIST.SP.800-84