Across our digital lives, two powerful forces of data utility and data privacy push and pull against each other. In response, technologies have been designed to help navigate this tension, by revealing, or leaking, information that could be useful to an adversary in exchange for some added utility. For many of these technologies, there is uncertainty about how harmful these leaks are. How much security and privacy are we sacrificing? Under what circumstances are these technologies safe to use? To bring clarity to these compromises between security and utility, this dissertation applies the information-theoretic framework of quantitative information flow (QIF), which models systems as channels correlating secret inputs with observable output...
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for m...
The Internet is shaping our daily lives. On the one hand, social networks like Facebook and Twitter ...
In this thesis we consider the problem of information hiding in the scenarios of interactive systems...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
International audienceSecure information flow is the problem of ensuring that the information made p...
A fundamental concern in computer security is to control information flow, whether to protect confid...
International audienceQuantitative Information Flow (QIF) and Differential Privacy (DP) are both con...
The concept of differential privacy emerged as an approach to protect the privacy of the individuals...
Privacy-preserving data release is about disclosing information about useful data while retaining th...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Secure Multi-Party Computation is a domain of Cryptography that enables several participants to comp...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
International audienceIn this talk, we revise the main recent approaches which have been proposed to...
Recent growth in the size and scope of databases has resulted in more research into making productiv...
We investigate the integration of two approaches to information security: information flow analysis,...
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for m...
The Internet is shaping our daily lives. On the one hand, social networks like Facebook and Twitter ...
In this thesis we consider the problem of information hiding in the scenarios of interactive systems...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
International audienceSecure information flow is the problem of ensuring that the information made p...
A fundamental concern in computer security is to control information flow, whether to protect confid...
International audienceQuantitative Information Flow (QIF) and Differential Privacy (DP) are both con...
The concept of differential privacy emerged as an approach to protect the privacy of the individuals...
Privacy-preserving data release is about disclosing information about useful data while retaining th...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Secure Multi-Party Computation is a domain of Cryptography that enables several participants to comp...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
International audienceIn this talk, we revise the main recent approaches which have been proposed to...
Recent growth in the size and scope of databases has resulted in more research into making productiv...
We investigate the integration of two approaches to information security: information flow analysis,...
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for m...
The Internet is shaping our daily lives. On the one hand, social networks like Facebook and Twitter ...
In this thesis we consider the problem of information hiding in the scenarios of interactive systems...