메뉴 건너뛰기




Volumn 276, Issue 1, 2011, Pages 61-79

Formal verification of differential privacy for interactive systems (extended abstract)

Author keywords

Bisimulation; Differential Privacy; Formal Methods; Privacy; Verification

Indexed keywords

BISIMULATIONS; BOUNDED MEMORIES; DIFFERENTIAL PRIVACIES; DIFFERENTIAL PRIVACY; EXTENDED ABSTRACTS; FORMAL VERIFICATIONS; INTERACTIVE SYSTEM; PRIVACY PRESERVING; PROBABILISTIC AUTOMATA; PROBABILISTIC BISIMULATIONS; SOUND VERIFICATION;

EID: 80054887187     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2011.09.015     Document Type: Conference Paper
Times cited : (45)

References (45)
  • 3
    • 80054881362 scopus 로고    scopus 로고
    • The reactive simulatability framework for asynchronous systems
    • preprint on IACR ePrint 2004/082
    • Backes, M., B. Pfitzmann and M. Waidner, The reactive simulatability framework for asynchronous systems, Information and Computation (2007), preprint on IACR ePrint 2004/082.
    • Information and Computation (2007)
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 4
    • 0034140755 scopus 로고    scopus 로고
    • Deciding bisimilarity and similarity for probabilistic processes
    • DOI 10.1006/jcss.1999.1683
    • C. Baier, B. Engelen, and M. Majster-Cederbaum Deciding bisimilarity and similarity for probabilistic processes Journal of Computer and System Sciences 60 2000 187 231 (Pubitemid 30568401)
    • (2000) Journal of Computer and System Sciences , vol.60 , Issue.1 , pp. 187-231
    • Baier, C.1    Engelen, B.2    Majster-Cederbaum, M.3
  • 8
    • 39549105169 scopus 로고    scopus 로고
    • Time-bounded task-pioas: A framework for analyzing security protocols
    • short version appeared In 20th Symposium on Distributed Computing (DISC), 2006
    • R. Canetti, L. Cheung, D. Kaynar, M. Liskov, N. Lynch, O. Pereira, and R. Segala Time-bounded task-pioas: A framework for analyzing security protocols Journal of Discrete Event Dynamic Systems 18 2008 111 159 short version appeared In 20th Symposium on Distributed Computing (DISC), 2006
    • (2008) Journal of Discrete Event Dynamic Systems , vol.18 , pp. 111-159
    • Canetti, R.1    Cheung, L.2    Kaynar, D.3    Liskov, M.4    Lynch, N.5    Pereira, O.6    Segala, R.7
  • 9
    • 84874725869 scopus 로고    scopus 로고
    • Decision algorithms for probabilistic bisimulation
    • L. Brim, P. Jancar, M. Kretínský, A. Kucera, LNCS
    • S. Cattani, and R. Segala Decision algorithms for probabilistic bisimulation L. Brim, P. Jancar, M. Kretínský, A. Kucera, CONCUR 02: Proceedings of the 13th International Conference on Concurrency Theory LNCS vol. 2421 2002 371 385 URL citeseer.ist.psu.edu/cattani02decision.html
    • (2002) CONCUR 02: Proceedings of the 13th International Conference on Concurrency Theory , vol.2421 , pp. 371-385
    • Cattani, S.1    Segala, R.2
  • 11
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • D. Clark, S. Hunt, and P. Malacaria A static analysis for quantifying information flow in a simple imperative language Journal of Computer Security 15 2007 321 371 (Pubitemid 46868450)
    • (2007) Journal of Computer Security , vol.15 , Issue.3 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 15
    • 70350645515 scopus 로고    scopus 로고
    • The differential privacy frontier (extended abstract)
    • Lecture Notes in Computer Science
    • C. Dwork The differential privacy frontier (extended abstract) 6th Theory of Cryptography Conference Lecture Notes in Computer Science vol. 5444 2009 496 502
    • (2009) 6th Theory of Cryptography Conference , vol.5444 , pp. 496-502
    • Dwork, C.1
  • 23
    • 0026157130 scopus 로고
    • Toward a mathematical foundation for information flow security
    • Gray, J. W., III, Toward a mathematical foundation for information flow security, in: IEEE Symposium on Security and Privacy, 1991, pp. 21-35.
    • (1991) IEEE Symposium on Security and Privacy , pp. 21-35
    • Gray Iii, J.W.1
  • 24
    • 84974759639 scopus 로고
    • Toward a mathematical foundation for information
    • J.W. Gray Toward a mathematical foundation for information Journal of Computer Security 1 1992 255 294
    • (1992) Journal of Computer Security , vol.1 , pp. 255-294
    • Gray, J.W.1
  • 25
    • 39549117389 scopus 로고    scopus 로고
    • Observing branching structure through probabilistic contexts
    • N. Lynch, R. Segala, and F. Vaandrager Observing branching structure through probabilistic contexts SIAM Journal on Computing 37 2007 977 1013
    • (2007) SIAM Journal on Computing , vol.37 , pp. 977-1013
    • Lynch, N.1    Segala, R.2    Vaandrager, F.3
  • 26
    • 0005336501 scopus 로고
    • Forward and backward simulations Part I: Untimed systems
    • N. Lynch, and F. Vaandrager Forward and backward simulations Part I: Untimed systems Inf. Comput. 121 1995 214 233
    • (1995) Inf. Comput. , vol.121 , pp. 214-233
    • Lynch, N.1    Vaandrager, F.2
  • 33
    • 57349154464 scopus 로고    scopus 로고
    • Influence: A quantitative approach for data integrity
    • CyLab, Carnegie Mellon University
    • Newsome, J. and D. Song, Influence: A quantitative approach for data integrity, Technical Report CMU-CyLab-08-005, CyLab, Carnegie Mellon University (2008).
    • (2008) Technical Report CMU-CyLab-08-005
    • Newsome, J.1    Song, D.2
  • 34
    • 35448955271 scopus 로고    scopus 로고
    • Smooth sensitivity and sampling in private data analysis
    • DOI 10.1145/1250790.1250803, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
    • Nissim, K., S. Raskhodnikova and A. Smith, Smooth sensitivity and sampling in private data analysis, in: STOC 07: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing (2007), pp. 75-84. (Pubitemid 47630723)
    • (2007) Proceedings of the Annual ACM Symposium on Theory of Computing , pp. 75-84
    • Nissim, K.1    Raskhodnikova, S.2    Smith, A.3
  • 41
    • 0001609136 scopus 로고
    • Probabilistic simulations for probabilistic processes
    • R. Segala, and N. Lynch Probabilistic simulations for probabilistic processes Nordic Journal of Computing 2 1995
    • (1995) Nordic Journal of Computing , vol.2
    • Segala, R.1    Lynch, N.2
  • 43
    • 18544362925 scopus 로고    scopus 로고
    • Probabilistic noninterference through weak probabilistic bisimulation
    • Pacific Grove, California
    • Smith, G., Probabilistic noninterference through weak probabilistic bisimulation, in: Proceedings of the 16th IEEE Computer Security Foundations Workshop, Pacific Grove, California, 2003, pp. 3-13.
    • (2003) Proceedings of the 16th IEEE Computer Security Foundations Workshop , pp. 3-13
    • Smith, G.1
  • 44


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.