Differential privacy is a modern approach in privacy-preserving data analysis to control the amount of information that can be inferred about an individual by querying a database. The most common techniques are based on the introduction of probabilistic noise, often defined as a Laplacian para-metric on the sensitivity of the query. In order to maximize the utility of the query, it is crucial to estimate the sensitivity as precisely as possible. In this paper we consider relational algebra, the classical language for queries in relational databases, and we propose a method for computing a bound on the sensitivity of queries in an intuitive and compositional way. We use constraint-based techniques to accumulate the information on the possi-b...
International audienceDifferential privacy offers a way to answer queries about sensitive informatio...
We study the problem of counting the number of distinct elements in a dataset subject to the constra...
Access control mechanisms protect sensitive information from unauthorized users. However, when sensi...
International audienceDifferential privacy is a modern approach in privacy-preserving data analysis ...
In the context of statistical databases, the release of accurate statistical information about the c...
Differential privacy has gained attention from the community as the mechanism for privacy protection...
We want assurances that sensitive information will not be disclosed when aggregate data derived from...
A common goal of privacy research is to release synthetic data that satisfies a formal privacy guara...
Differential privacy (DP) provides formal guarantees that the output of a database query does not re...
Differential privacy (DP) has gained significant attention lately as the state of the art in privacy...
The meaning of differential privacy (DP) is tightly bound with the notion of distance on databases, ...
Existing studies on differential privacy mainly consider aggregation on data sets where each entry c...
With recent privacy failures in the release of personal data, differential privacy received consider...
We study Differential Privacy in the abstract setting of Probability on metric spaces. Numerical, c...
Differential privacy is a notion of confidentiality that allows useful computations on sensible data...
International audienceDifferential privacy offers a way to answer queries about sensitive informatio...
We study the problem of counting the number of distinct elements in a dataset subject to the constra...
Access control mechanisms protect sensitive information from unauthorized users. However, when sensi...
International audienceDifferential privacy is a modern approach in privacy-preserving data analysis ...
In the context of statistical databases, the release of accurate statistical information about the c...
Differential privacy has gained attention from the community as the mechanism for privacy protection...
We want assurances that sensitive information will not be disclosed when aggregate data derived from...
A common goal of privacy research is to release synthetic data that satisfies a formal privacy guara...
Differential privacy (DP) provides formal guarantees that the output of a database query does not re...
Differential privacy (DP) has gained significant attention lately as the state of the art in privacy...
The meaning of differential privacy (DP) is tightly bound with the notion of distance on databases, ...
Existing studies on differential privacy mainly consider aggregation on data sets where each entry c...
With recent privacy failures in the release of personal data, differential privacy received consider...
We study Differential Privacy in the abstract setting of Probability on metric spaces. Numerical, c...
Differential privacy is a notion of confidentiality that allows useful computations on sensible data...
International audienceDifferential privacy offers a way to answer queries about sensitive informatio...
We study the problem of counting the number of distinct elements in a dataset subject to the constra...
Access control mechanisms protect sensitive information from unauthorized users. However, when sensi...