메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1-2

The promise of differential privacy: A tutorial on algorithmic techniques

Author keywords

differential privacy; privacy; private data analysis

Indexed keywords

ALGORITHMIC RESEARCH; ALGORITHMIC TECHNIQUES; CONFIDENTIAL DATA; DATA ANALYSTS; DATA CURATORS; DATA PROTECTION; DATA SETS; DATA SUBJECTS; DATA USAGE; DATA UTILITIES; DIFFERENTIAL PRIVACIES; PRIVATE DATA ANALYSIS; PRIVATE DATABASE;

EID: 84863306898     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2011.88     Document Type: Conference Paper
Times cited : (53)

References (12)
  • 4
    • 78650804208 scopus 로고    scopus 로고
    • A firm foundation for private data analysis
    • -, "A firm foundation for private data analysis," Communications of the ACM, vol. 54, 2011.
    • (2011) Communications of the ACM , vol.54
    • Dwork, C.1
  • 7
    • 79959952201 scopus 로고    scopus 로고
    • On the difficulties of disclosure prevention in statistical databases or the case for differential privacy
    • C. Dwork and M. Naor, "On the difficulties of disclosure prevention in statistical databases or the case for differential privacy," Journal of Privacy and Confidentiality, vol. 2, 2010.
    • (2010) Journal of Privacy and Confidentiality , vol.2
    • Dwork, C.1    Naor, M.2
  • 8
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • S. Goldwasser and S. Micali, "Probabilistic encryption," JCSS, vol. 28, pp. 270-299, 1984.
    • (1984) JCSS , vol.28 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 9
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM J. Comput, vol. 17, pp. 281-308, 1988.
    • (1988) SIAM J. Comput , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 12
    • 0031150446 scopus 로고    scopus 로고
    • Weaving Technology and Policy Together to Maintain Confidentiality
    • L. Sweeney, "Weaving technology and policy together to maintain confidentiality," J. Law Med. Ethics, vol. 25, pp. 98-110, 1997. (Pubitemid 127448006)
    • (1997) Journal of Law, Medicine and Ethics , vol.25 , Issue.2-3 , pp. 98-110
    • Sweeney, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.