International audienceSecure information flow is the problem of ensuring that the information made publicly available by a computational system does not leak information that should be kept secret. Since it is practically impossible to avoid leakage entirely, in recent years there has been a growing interest in considering the quantitative aspects of information flow, in order to measure and compare the amount of leakage. Information theory is widely regarded as a natural framework to provide firm foundations to quantitative information flow. In this notes we review the two main information-theoretic approaches that have been investigated: the one based on Shannon entropy, and the one based on Rényi min-entropy. Furthermore, we discuss some...
International audienceIn recent years, there has been a growing interest in considering the probabil...
AbstractDifferential privacy is a promising approach to privacy preserving data analysis with a well...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
International audienceSecure information flow is the problem of ensuring that the information made p...
Differential privacy is a notion of privacy that has become very popular in the database community. ...
International audienceDifferential privacy is a notion that has emerged in the community of statisti...
International audienceDifferential privacy aims at protecting the privacy of participants instatisti...
International audienceDifferential privacy is a notion of privacy that has become very popular in th...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
Differential privacy, introduced by Dwork et al. in 2006, has become the benchmark for data privacy ...
The concept of differential privacy emerged as an approach to protect the privacy of the individuals...
There are two active and independent lines of research that aim at quantifying the amount of informa...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for m...
International audienceIn this talk, we revise the main recent approaches which have been proposed to...
International audienceIn recent years, there has been a growing interest in considering the probabil...
AbstractDifferential privacy is a promising approach to privacy preserving data analysis with a well...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
International audienceSecure information flow is the problem of ensuring that the information made p...
Differential privacy is a notion of privacy that has become very popular in the database community. ...
International audienceDifferential privacy is a notion that has emerged in the community of statisti...
International audienceDifferential privacy aims at protecting the privacy of participants instatisti...
International audienceDifferential privacy is a notion of privacy that has become very popular in th...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
Differential privacy, introduced by Dwork et al. in 2006, has become the benchmark for data privacy ...
The concept of differential privacy emerged as an approach to protect the privacy of the individuals...
There are two active and independent lines of research that aim at quantifying the amount of informa...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for m...
International audienceIn this talk, we revise the main recent approaches which have been proposed to...
International audienceIn recent years, there has been a growing interest in considering the probabil...
AbstractDifferential privacy is a promising approach to privacy preserving data analysis with a well...
AbstractBasic information theory is used to analyse the amount of confidential information which may...