메뉴 건너뛰기




Volumn , Issue , 2016, Pages 249-260

The value of privacy: Strategic data subjects, incentive mechanisms and fundamental limits

Author keywords

[No Author keywords available]

Indexed keywords

GAME THEORY;

EID: 84978696568     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2896377.2901461     Document Type: Conference Paper
Times cited : (53)

References (33)
  • 2
    • 84958771236 scopus 로고    scopus 로고
    • Local, private, efficient protocols for succinct histograms
    • Portland, OR
    • Bassily, R., and Smith, A. Local, private, efficient protocols for succinct histograms. In Proc. Ann. ACM Symp. Theory of Computing (STOC) (Portland, OR, 2015), pp. 127-135.
    • (2015) Proc. Ann. ACM Symp. Theory of Computing (STOC) , pp. 127-135
    • Bassily, R.1    Smith, A.2
  • 9
    • 84905991151 scopus 로고    scopus 로고
    • The algorithmic foundations of differential privacy
    • Aug. 2014
    • Dwork, C., and Roth, A. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9, 3-4 (Aug. 2014), 211-407.
    • Found. Trends Theor. Comput. Sci , vol.9 , Issue.3-4 , pp. 211-407
    • Dwork, C.1    Roth, A.2
  • 12
    • 84863535268 scopus 로고    scopus 로고
    • Approximately optimal auctions for selling privacy when costs are correlated with data
    • Valencia, Spain
    • Fleischer, L. K., and Lyu, Y. Approximately optimal auctions for selling privacy when costs are correlated with data. In Proc. ACM Conf. Electronic Commerce (EC) (Valencia, Spain, 2012), pp. 568-585.
    • (2012) Proc. ACM Conf. Electronic Commerce (EC) , pp. 568-585
    • Fleischer, L.K.1    Lyu, Y.2
  • 13
    • 84879778250 scopus 로고    scopus 로고
    • Privacy and coordination: Computing on databases with endogenous participation
    • Philadelphia, PA
    • Ghosh, A., and Ligett, K. Privacy and coordination: Computing on databases with endogenous participation. In Proc. ACM Conf. Electronic Commerce (EC) (Philadelphia, PA, 2013), pp. 543-560.
    • (2013) Proc. ACM Conf. Electronic Commerce (EC) , pp. 543-560
    • Ghosh, A.1    Ligett, K.2
  • 17
    • 65249157560 scopus 로고
    • The divergence and Bhattacharyya distance measures in signal selection
    • Feb
    • Kailath, T. The divergence and Bhattacharyya distance measures in signal selection. IEEE Trans. Commun. Technol. 15, 1 (Feb. 1967), 52-60.
    • (1967) IEEE Trans. Commun. Technol , vol.15 , Issue.1 , pp. 52-60
    • Kailath, T.1
  • 20
    • 84911185040 scopus 로고    scopus 로고
    • The data brokers: Selling your personal information
    • Mar
    • Kroft, S. The data brokers: selling your personal information. CBS News (Mar. 2014).
    • (2014) CBS News
    • Kroft, S.1
  • 22
    • 84871390246 scopus 로고    scopus 로고
    • Take it or leave it: Running a survey when privacy comes at a cost
    • Liverpool, UK
    • Ligett, K., and Roth, A. Take it or leave it: Running a survey when privacy comes at a cost. In Proc. Int. Workshop Internet and Network Economics (WINE) (Liverpool, UK, 2012), pp. 378-391.
    • (2012) Proc. Int. Workshop Internet and Network Economics (WINE) , pp. 378-391
    • Ligett, K.1    Roth, A.2
  • 25
    • 84893263337 scopus 로고    scopus 로고
    • Privacy and mechanism design
    • June
    • Pai, M. M., and Roth, A. Privacy and mechanism design. SIGecom Exch. 12, 1 (June 2013), 8-29.
    • (2013) SIGecom Exch , vol.12 , Issue.1 , pp. 8-29
    • Pai, M.M.1    Roth, A.2
  • 27
    • 84978732885 scopus 로고    scopus 로고
    • Privacy games: Optimal user-centric data obfuscation
    • Philadelphia, PA
    • Shokri, R. Privacy games: Optimal user-centric data obfuscation. In Proc. Privacy Enhancing Technologies (PETS) (Philadelphia, PA, 2015), pp. 299-315.
    • (2015) Proc. Privacy Enhancing Technologies (PETS) , pp. 299-315
    • Shokri, R.1
  • 29
    • 84946690964 scopus 로고    scopus 로고
    • On the relation between identify ability, differential privacy, and mutual-information privacy
    • Monticello, IL, Sept
    • Wang, W., Ying, L., and Zhang, J. On the relation between identify ability, differential privacy, and mutual-information privacy. In Proc. Ann. Allerton Conf. Communication, Control and Computing (Monticello, IL, Sept. 2014), pp. 1086-1092.
    • (2014) Proc. Ann. Allerton Conf. Communication, Control and Computing , pp. 1086-1092
    • Wang, W.1    Ying, L.2    Zhang, J.3
  • 32
    • 0013776710 scopus 로고
    • Randomized response: A survey technique for eliminating evasive answer bias
    • Mar
    • Warner, S. L. Randomized response: A survey technique for eliminating evasive answer bias. J. Amer. Stat. Assoc. 60, 309 (Mar. 1965), 63-69.
    • (1965) J. Amer. Stat. Assoc , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.