Narayan et al., 2015 - Google Patents
Verifiable differential privacyNarayan et al., 2015
View PDF- Document ID
- 6921639343916162977
- Author
- Narayan A
- Feldman A
- Papadimitriou A
- Haeberlen A
- Publication year
- Publication venue
- Proceedings of the Tenth European Conference on Computer Systems
External Links
Snippet
Working with sensitive data is often a balancing act between privacy and integrity concerns. Consider, for instance, a medical researcher who has analyzed a patient database to judge the effectiveness of a new treatment and would now like to publish her findings. On the one …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Narayan et al. | Verifiable differential privacy | |
Mironov | On significance of the least significant bits for differential privacy | |
Jain et al. | Differential privacy: its technological prescriptive using big data | |
Braun et al. | Verifying computations with state | |
Ben-Sasson et al. | Computational integrity with a public random string from quasi-linear PCPs | |
Lam et al. | Context-sensitive program analysis as database queries | |
McSherry | Privacy integrated queries: an extensible platform for privacy-preserving data analysis | |
Kifer et al. | Guidelines for implementing and auditing differentially private systems | |
Malacaria et al. | Lagrange multipliers and maximum information leakage in different observational models | |
Tassa et al. | Secure distributed computation of anonymized views of shared databases | |
Fang et al. | Zero knowledge static program analysis | |
Rotem et al. | Generically speeding-up repeated squaring is equivalent to factoring: Sharp thresholds for all generic-ring delay functions | |
Luo et al. | Proving UNSAT in zero knowledge | |
James Stephen et al. | Program analysis for secure big data processing | |
Liagouris et al. | Secrecy: Secure collaborative analytics on secret-shared data | |
Sasy et al. | Oblivious sampling algorithms for private data analysis | |
Baelde et al. | A higher-order indistinguishability logic for cryptographic reasoning | |
Sahai et al. | Verification of quantitative hyperproperties using trace enumeration relations | |
Lobo-Vesga et al. | A programming language for data privacy with accuracy estimations | |
Büscher et al. | Compilation for secure multi-party computation | |
Gampe et al. | Safe, multiphase bounds check elimination in Java | |
Rogers et al. | Privacy changes everything | |
Singh | Safe and secure outsourced computing with fully homomorphic encryption and trusted execution environments | |
Biondi et al. | Comparative analysis of leakage tools on scalable case studies | |
Cheval et al. | Automatic verification of transparency protocols |