AbstractWe study the problem of privacy in the framework of Timed Automata. By distinguishing between secret and observable actions we formulate a property of no-privacy in terms of a property of the language accepted by a Timed Automaton, and we give an algorithm checking such property
This work is motivated by privacy concerns as a result of the growing rate of information exchange a...
We present a powerful and flexible method for automatically checking the secrecy of values inside co...
Abstract. Originally proposed for privacy protection in the context of statisti-cal databases, diffe...
AbstractWe study the problem of privacy in the framework of Timed Automata. By distinguishing betwee...
Timed automata are a common formalism for the verification of concurrent systems subject to timing c...
This is the author version of the manuscript of the same name published in ACM Computing SurveysInte...
AbstractDifferential privacy is a promising approach to privacy preserving data analysis with a well...
Differential privacy is a promising approach to privacy preserving data analysis with a well-develop...
This is the author version of the manuscript of the same name published in ACM Transactions on Softw...
This is the author (and extended) version of the manuscript of the same name published in the procee...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
International audienceFormal methods have been very successful in analyzing security protocols for r...
Abstract. We study two questions in the theory of timed automata concerning timed language inclusion...
AbstractWe propose timed (finite) automata to model the behavior of real-time systems over time. Our...
We consider the problem of privacy enforcement for dynamic systems using the technique of obfuscatio...
This work is motivated by privacy concerns as a result of the growing rate of information exchange a...
We present a powerful and flexible method for automatically checking the secrecy of values inside co...
Abstract. Originally proposed for privacy protection in the context of statisti-cal databases, diffe...
AbstractWe study the problem of privacy in the framework of Timed Automata. By distinguishing betwee...
Timed automata are a common formalism for the verification of concurrent systems subject to timing c...
This is the author version of the manuscript of the same name published in ACM Computing SurveysInte...
AbstractDifferential privacy is a promising approach to privacy preserving data analysis with a well...
Differential privacy is a promising approach to privacy preserving data analysis with a well-develop...
This is the author version of the manuscript of the same name published in ACM Transactions on Softw...
This is the author (and extended) version of the manuscript of the same name published in the procee...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
International audienceFormal methods have been very successful in analyzing security protocols for r...
Abstract. We study two questions in the theory of timed automata concerning timed language inclusion...
AbstractWe propose timed (finite) automata to model the behavior of real-time systems over time. Our...
We consider the problem of privacy enforcement for dynamic systems using the technique of obfuscatio...
This work is motivated by privacy concerns as a result of the growing rate of information exchange a...
We present a powerful and flexible method for automatically checking the secrecy of values inside co...
Abstract. Originally proposed for privacy protection in the context of statisti-cal databases, diffe...