Differential Privacy
暂无分享,去创建一个
[1] Dilsun Kirli Kaynar,et al. Formal Verification of Differential Privacy for Interactive Systems , 2011, ArXiv.
[2] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[3] Chun Yuan,et al. Differentially Private Data Release through Multidimensional Partitioning , 2010, Secure Data Management.
[4] Aleksandar Nikolov,et al. Pan-private algorithms via statistics on sketches , 2011, PODS.
[5] Andreas Haeberlen,et al. Differential Privacy Under Fire , 2011, USENIX Security Symposium.
[6] Sanjeev Khanna,et al. On provenance and privacy , 2010, ICDT '11.
[7] Vitaly Shmatikov,et al. Airavat: Security and Privacy for MapReduce , 2010, NSDI.
[8] J. Todd Wittbold,et al. Information flow in nondeterministic systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] H. Ebadi. PINQuin, a framework for differentially private analysis , 2013 .
[10] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[11] Jennifer Widom,et al. Lineage tracing for general data warehouse transformations , 2003, The VLDB Journal.
[12] Andreas Haeberlen,et al. Linear dependent types for differential privacy , 2013, POPL.
[13] Paul W. P. J. Grefen,et al. A multi-set extended relational algebra: a formal approach to a practical issue , 1994, Proceedings of 1994 IEEE 10th International Conference on Data Engineering.
[14] James Cheney,et al. Provenance in Databases: Why, How, and Where , 2009, Found. Trends Databases.
[15] Sharon Goldberg,et al. Calibrating Data to Sensitivity in Private Data Analysis , 2012, Proc. VLDB Endow..
[16] Andrew McGregor,et al. Optimizing linear counting queries under differential privacy , 2009, PODS.
[17] Benjamin C. Pierce,et al. Distance makes the types grow stronger: a calculus for differential privacy , 2010, ICFP '10.
[18] Martín Abadi,et al. Differential privacy with information flow control , 2011, PLAS '11.
[19] Ilya Mironov,et al. On significance of the least significant bits for differential privacy , 2012, CCS.
[20] Stavros Papadopoulos,et al. Practical Differential Privacy via Grouping and Smoothing , 2013, Proc. VLDB Endow..
[21] Ian J. Hayes. Multi-relations in Z , 2005, Acta Informatica.
[22] Vldb Endowment,et al. The VLDB journal : the international journal on very large data bases. , 1992 .
[23] Michael R. Clarkson,et al. Information-flow security for interactive programs , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[24] Catuscia Palamidessi,et al. Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems , 2012, QAPL.
[25] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[26] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[27] Ratul Mahajan,et al. Differentially-private network trace analysis , 2010, SIGCOMM '10.
[28] Lucas Waye,et al. Privacy integrated data stream queries , 2014, PSP '14.