메뉴 건너뛰기




Volumn 6756 LNCS, Issue PART 2, 2011, Pages 60-76

On the relation between differential privacy and quantitative information flow

Author keywords

[No Author keywords available]

Indexed keywords

ADJACENCY RELATIONS; CERTAIN ANSWERS; CONCEPTUAL FRAMEWORKS; CONFIDENTIAL INFORMATION; DEGREE OF ACCURACY; DERIVE BOUNDS; DIFFERENTIAL PRIVACIES; INFORMATION FLOWS; MIN-ENTROPY; MUTUAL INFORMATIONS; OPTIMAL UTILITY; QUANTITATIVE INFORMATION; STATISTICAL DATABASE; STATISTICAL QUERIES; UTILITY FUNCTIONS;

EID: 79960008635     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22012-8_4     Document Type: Conference Paper
Times cited : (45)

References (19)
  • 3
    • 77951595720 scopus 로고    scopus 로고
    • Computing the leakage of information-hiding systems
    • Esparza, J., Majumdar, R. (eds.) TACAS 2010 Springer, Heidelberg
    • Andrés, M.E., Palamidessi, C., van Rossum, P., Smith, G.: Computing the leakage of information-hiding systems. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol. 6015, pp. 373-389. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6015 , pp. 373-389
    • Andrés, M.E.1    Palamidessi, C.2    Van Rossum, P.3    Smith, G.4
  • 4
    • 80052677847 scopus 로고    scopus 로고
    • Information-theoretic bounds for differentially private mechanisms
    • to appear
    • Barthe, G., Köpf, B.: Information-theoretic bounds for differentially private mechanisms. In: Proc. of CSF (to appear, 2011)
    • (2011) Proc. of CSF
    • Barthe, G.1    Köpf, B.2
  • 5
    • 79953166100 scopus 로고    scopus 로고
    • Asymptotic information leakage under one-try attacks
    • Hofmann, M. (ed.) FOSSACS 2011 Springer, Heidelberg
    • Boreale, M., Pampaloni, F., Paolini, M.: Asymptotic information leakage under one-try attacks. In: Hofmann, M. (ed.) FOSSACS 2011. LNCS, vol. 6604, pp. 396-410. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6604 , pp. 396-410
    • Boreale, M.1    Pampaloni, F.2    Paolini, M.3
  • 6
    • 47249145678 scopus 로고    scopus 로고
    • Compositional methods for information-hiding
    • Amadio, R.M. (ed.) FOSSACS 2008 Springer, Heidelberg
    • Braun, C., Chatzikokolakis, K., Palamidessi, C.: Compositional methods for information-hiding. In: Amadio, R.M. (ed.) FOSSACS 2008. LNCS, vol. 4962, pp. 443-457. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4962 , pp. 443-457
    • Braun, C.1    Chatzikokolakis, K.2    Palamidessi, C.3
  • 7
    • 68549126859 scopus 로고    scopus 로고
    • Quantitative notions of leakage for one-try attacks
    • Elsevier, Amsterdam
    • Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative notions of leakage for one-try attacks. In: Proc. of MFPS. ENTCS, vol. 249, pp. 75-91. Elsevier, Amsterdam (2009)
    • (2009) Proc. of MFPS. ENTCS , vol.249 , pp. 75-91
    • Braun, C.1    Chatzikokolakis, K.2    Palamidessi, C.3
  • 8
    • 35048859323 scopus 로고    scopus 로고
    • Probability of error in information-hiding protocols
    • IEEE, Los Alamitos
    • Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Probability of error in information-hiding protocols. In: Proc. of CSF, pp. 341-354. IEEE, Los Alamitos (2007)
    • (2007) Proc. of CSF , pp. 341-354
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 10
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006 Springer, Heidelberg
    • Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 12
    • 78650804208 scopus 로고    scopus 로고
    • A firm foundation for private data analysis
    • Dwork, C.: A firm foundation for private data analysis. Communications of the ACM 54(1), 86-96 (2011)
    • (2011) Communications of the ACM , vol.54 , Issue.1 , pp. 86-96
    • Dwork, C.1
  • 15
    • 77953239541 scopus 로고    scopus 로고
    • Applied quantitative information flow and statistical databases
    • Degano, P., Guttman, J.D. (eds.) FAST 2009 Springer, Heidelberg
    • Heusser, J., Malacaria, P.: Applied quantitative information flow and statistical databases. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 96-110. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5983 , pp. 96-110
    • Heusser, J.1    Malacaria, P.2
  • 16
    • 77957606219 scopus 로고    scopus 로고
    • Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
    • IEEE, Los Alamitos
    • Köpf, B., Smith, G.: Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In: Proc. of CSF, pp. 44-56. IEEE, Los Alamitos (2010)
    • (2010) Proc. of CSF , pp. 44-56
    • Köpf, B.1    Smith, G.2
  • 17
    • 77955318658 scopus 로고    scopus 로고
    • Compositional closure for bayes risk in probabilistic noninterference
    • Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010 Springer, Heidelberg
    • McIver, A., Meinicke, L., Morgan, C.: Compositional closure for bayes risk in probabilistic noninterference. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6199, pp. 223-235. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6199 , pp. 223-235
    • McIver, A.1    Meinicke, L.2    Morgan, C.3
  • 19
    • 68549087948 scopus 로고    scopus 로고
    • On the foundations of quantitative information flow
    • de Alfaro, L. (ed.) FOSSACS 2009 Springer, Heidelberg
    • Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288-302. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5504 , pp. 288-302
    • Smith, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.