Universally utility-maximizing privacy mechanisms
From MaRDI portal
Publication:5172729
DOI10.1145/1536414.1536464zbMath1304.94060OpenAlexW2154086287MaRDI QIDQ5172729
No author found.
Publication date: 4 February 2015
Published in: Proceedings of the forty-first annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1536414.1536464
Database theory (68P15) Cryptography (94A60) Auctions, bargaining, bidding and selling, and other market models (91B26) Authentication, digital signatures and secret sharing (94A62)
Related Items (14)
Verifying Pufferfish privacy in hidden Markov models ⋮ Model checking differentially private properties ⋮ A semantic-preserving differentially private method for releasing query logs ⋮ On the Relation between Differential Privacy and Quantitative Information Flow ⋮ Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms ⋮ Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract) ⋮ Inference using noisy degrees: differentially private \(\beta\)-model and synthetic graphs ⋮ Worst- and average-case privacy breaches in randomization mechanisms ⋮ The Geometry of Differential Privacy: The Small Database and Approximate Cases ⋮ Quantitative Information Flow and Applications to Differential Privacy ⋮ Privacy Aware Learning ⋮ Pufferfish ⋮ Unnamed Item ⋮ Selling privacy at auction
This page was built for publication: Universally utility-maximizing privacy mechanisms