메뉴 건너뛰기




Volumn , Issue , 2012, Pages 97-109

Probabilistic relational reasoning for differential privacy

Author keywords

Coq proof assistant; Differential privacy; Relational Hoare logic

Indexed keywords

CENTRAL COMPONENT; COQ PROOF ASSISTANT; DIFFERENTIAL PRIVACIES; ERROR PRONES; FIRST-PRINCIPLES; FORMAL ANALYSIS; HOARE LOGIC; LAPLACIANS; LINEAR TYPES; MACHINE-CHECKED PROOFS; OPEN PROBLEMS; PRIVATE DATA; RELATIONAL REASONING; STREAMING ALGORITHM; TOOL SUPPORT;

EID: 84857867264     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2103656.2103670     Document Type: Conference Paper
Times cited : (61)

References (35)
  • 1
    • 67349233028 scopus 로고    scopus 로고
    • Proofs of randomized algorithms in Coq
    • P. Audebaud and C. Paulin-Mohring. Proofs of randomized algorithms in Coq. Sci. Comput. Program., 74(8):568-589, 2009.
    • (2009) Sci. Comput. Program. , vol.74 , Issue.8 , pp. 568-589
    • Audebaud, P.1    Paulin-Mohring, C.2
  • 2
    • 80052677847 scopus 로고    scopus 로고
    • Information-theoretic bounds for differentially private mechanisms
    • Los Alamitos. IEEE Computer Society
    • G. Barthe and B. Köpf. Information-theoretic bounds for differentially private mechanisms. In 24rd IEEE Computer Security Foundations Symposium, CSF 2011, pages 191-204, Los Alamitos, 2011. IEEE Computer Society.
    • (2011) 24rd IEEE Computer Security Foundations Symposium, CSF 2011 , pp. 191-204
    • Barthe, G.1    Köpf, B.2
  • 4
    • 80051978821 scopus 로고    scopus 로고
    • Computer-aided security proofs for the working cryptographer
    • Lecture Notes in Computer Science, Heidelberg. Springer
    • G. Barthe, B. Grégoire, S. Heraud, and S. Zanella Béguelin. Computer-aided security proofs for the working cryptographer. In Ad-vances in Cryptology - CRYPTO 2011, volume 6841 of Lecture Notes in Computer Science, pages 71-90, Heidelberg, 2011. Springer.
    • (2011) Ad-vances in Cryptology - CRYPTO 2011 , vol.6841 , pp. 71-90
    • Barthe, G.1    Grégoire, B.2    Heraud, S.3    Zanella Béguelin, S.4
  • 5
    • 51849137365 scopus 로고    scopus 로고
    • Distributed private data analysis: Simultaneously solving how and what
    • Lecture Notes in Computer Science, Heidelberg. Springer
    • A. Beimel, K. Nissim, and E. Omri. Distributed private data analysis: Simultaneously solving how and what. In Advances in Cryptology -CRYPTO 2008, volume 5157 of Lecture Notes in Computer Science, pages 451-468, Heidelberg, 2008. Springer.
    • (2008) Advances in Cryptology -CRYPTO 2008 , vol.5157 , pp. 451-468
    • Beimel, A.1    Nissim, K.2    Omri, E.3
  • 10
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • D. Clark, S. Hunt, and P. Malacaria. A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3):321-371, 2007. (Pubitemid 46868450)
    • (2007) Journal of Computer Security , vol.15 , Issue.3 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 14
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • Lecture Notes in Computer Science, Heidelberg. Springer
    • C. Dwork. Differential privacy: A survey of results. In Theory and Applications of Models of Computation, volume 4978 of Lecture Notes in Computer Science, pages 1-19, Heidelberg, 2008. Springer.
    • (2008) Theory and Applications of Models of Computation , vol.4978 , pp. 1-19
    • Dwork, C.1
  • 15
    • 78650804208 scopus 로고    scopus 로고
    • A firm foundation for private data analysis
    • January
    • C. Dwork. A firm foundation for private data analysis. Commun. ACM, 54(1):86-95, January 2011.
    • (2011) Commun. ACM , vol.54 , Issue.1 , pp. 86-95
    • Dwork, C.1
  • 19
    • 27744471200 scopus 로고    scopus 로고
    • Probabilistic guarded commands mechanized in HOL
    • DOI 10.1016/j.tcs.2005.08.005, PII S0304397505004767
    • J. Hurd, A. McIver, and C. Morgan. Probabilistic guarded commands mechanized in HOL. Theor. Comput. Sci., 346(1):96-112, 2005. (Pubitemid 41606836)
    • (2005) Theoretical Computer Science , vol.346 , Issue.1 , pp. 96-112
    • Hurd, J.1    McIver, A.2    Morgan, C.3
  • 20
    • 0005411712 scopus 로고    scopus 로고
    • Probabilistic extensions of process algebras
    • J. Bergstra, A. Ponse, and S. Smolka, editors. Elsevier, Amsterdam
    • B. Jonsson, W. Yi, and K. G. Larsen. Probabilistic extensions of process algebras. In J. Bergstra, A. Ponse, and S. Smolka, editors, Handbook of Process Algebra, pages 685-710. Elsevier, Amsterdam, 2001.
    • (2001) Handbook of Process Algebra , pp. 685-710
    • Jonsson, B.1    Yi, W.2    Larsen, K.G.3
  • 24
    • 70849116921 scopus 로고    scopus 로고
    • Privacy integrated queries: An extensible platform for privacy-preserving data analysis
    • New York. ACM
    • F. D. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In 35th SIGMOD international conference on Management of Data, SIGMOD 2009, pages 19-30, New York, 2009. ACM.
    • (2009) 35th SIGMOD International Conference on Management of Data, SIGMOD 2009 , pp. 19-30
    • McSherry, F.D.1
  • 25
    • 70350338483 scopus 로고    scopus 로고
    • Computational differential privacy
    • Lecture Notes in Computer Science, Heidelberg. Springer
    • I. Mironov, O. Pandey, O. Reingold, and S. Vadhan. Computational differential privacy. In Advances in Cryptology - CRYPTO 2009, volume 5677 of Lecture Notes in Computer Science, pages 126-142, Heidelberg, 2009. Springer.
    • (2009) Advances in Cryptology - CRYPTO 2009 , vol.5677 , pp. 126-142
    • Mironov, I.1    Pandey, O.2    Reingold, O.3    Vadhan, S.4
  • 27
    • 4444251918 scopus 로고
    • A simple probabilistic approximation algorithm for vertex cover
    • Yale University
    • L. Pitt. A simple probabilistic approximation algorithm for vertex cover. Technical Report TR-404, Yale University, 1985.
    • (1985) Technical Report TR-404
    • Pitt, L.1
  • 33
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • Lecture Notes in Computer Science, Heidelberg. Springer
    • T. Terauchi and A. Aiken. Secure information flow as a safety problem. In 12th International Symposium on Static Analysis, SAS 2005, volume 3672 of Lecture Notes in Computer Science, pages 352-367, Heidelberg, 2005. Springer.
    • (2005) 12th International Symposium on Static Analysis, SAS 2005 , vol.3672 , pp. 352-367
    • Terauchi, T.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.