We investigate the integration of two approaches to information security: information flow analysis, in which the dependence between secret inputs and public outputs is tracked through a program, and differential privacy, in which a weak dependence between input and output is permitted but provided only through a relatively small set of known differentially private primitives.We find that information flow for differentially private observations is no harder than dependency tracking. Differential privacy\u27s strong guarantees allow for efficient and accurate dynamic tracking of information flow, allowing the use of existing technology to extend and improve the state of the art for the analysis of differentially private computations
International audienceSecure information flow is the problem of ensuring that the information made p...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
International audienceIn this talk, we revise the main recent approaches which have been proposed to...
We investigate the integration of two approaches to information security: information flow analysis,...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
This dissertation explores techniques for automating program analysis, with a focus on validating an...
Differential privacy is a popular privacy model within the research community because of the strong ...
We want assurances that sensitive information will not be disclosed when aggregate data derived from...
The problem of learning from data while preserving the privacy of individual observations has a long...
Differential privacy provides a way to get useful information about sensitive data without revealing...
Data privacy has been an important research topic in the security, theory and database communities i...
Often service providers need to outsource computations on sensitive datasets and subsequently publis...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
Facilitating use of sensitive data for research or commercial purposes, in a manner that preserves t...
Recent growth in the size and scope of databases has resulted in more research into making productiv...
International audienceSecure information flow is the problem of ensuring that the information made p...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
International audienceIn this talk, we revise the main recent approaches which have been proposed to...
We investigate the integration of two approaches to information security: information flow analysis,...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
This dissertation explores techniques for automating program analysis, with a focus on validating an...
Differential privacy is a popular privacy model within the research community because of the strong ...
We want assurances that sensitive information will not be disclosed when aggregate data derived from...
The problem of learning from data while preserving the privacy of individual observations has a long...
Differential privacy provides a way to get useful information about sensitive data without revealing...
Data privacy has been an important research topic in the security, theory and database communities i...
Often service providers need to outsource computations on sensitive datasets and subsequently publis...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
Facilitating use of sensitive data for research or commercial purposes, in a manner that preserves t...
Recent growth in the size and scope of databases has resulted in more research into making productiv...
International audienceSecure information flow is the problem of ensuring that the information made p...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
International audienceIn this talk, we revise the main recent approaches which have been proposed to...