[go: up one dir, main page]

Narayan et al., 2015 - Google Patents

Verifiable differential privacy

Narayan et al., 2015

View PDF
Document ID
6921639343916162977
Author
Narayan A
Feldman A
Papadimitriou A
Haeberlen A
Publication year
Publication venue
Proceedings of the Tenth European Conference on Computer Systems

External Links

Snippet

Working with sensitive data is often a balancing act between privacy and integrity concerns. Consider, for instance, a medical researcher who has analyzed a patient database to judge the effectiveness of a new treatment and would now like to publish her findings. On the one …
Continue reading at arifeldman.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/10Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Narayan et al. Verifiable differential privacy
Mironov On significance of the least significant bits for differential privacy
Jain et al. Differential privacy: its technological prescriptive using big data
Braun et al. Verifying computations with state
Ben-Sasson et al. Computational integrity with a public random string from quasi-linear PCPs
Lam et al. Context-sensitive program analysis as database queries
McSherry Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Kifer et al. Guidelines for implementing and auditing differentially private systems
Malacaria et al. Lagrange multipliers and maximum information leakage in different observational models
Tassa et al. Secure distributed computation of anonymized views of shared databases
Fang et al. Zero knowledge static program analysis
Rotem et al. Generically speeding-up repeated squaring is equivalent to factoring: Sharp thresholds for all generic-ring delay functions
Luo et al. Proving UNSAT in zero knowledge
James Stephen et al. Program analysis for secure big data processing
Liagouris et al. Secrecy: Secure collaborative analytics on secret-shared data
Sasy et al. Oblivious sampling algorithms for private data analysis
Baelde et al. A higher-order indistinguishability logic for cryptographic reasoning
Sahai et al. Verification of quantitative hyperproperties using trace enumeration relations
Lobo-Vesga et al. A programming language for data privacy with accuracy estimations
Büscher et al. Compilation for secure multi-party computation
Gampe et al. Safe, multiphase bounds check elimination in Java
Rogers et al. Privacy changes everything
Singh Safe and secure outsourced computing with fully homomorphic encryption and trusted execution environments
Biondi et al. Comparative analysis of leakage tools on scalable case studies
Cheval et al. Automatic verification of transparency protocols