We investigate the integration of two approaches to information security: information flow analysis, in which the dependence between secret inputs and public outputs is tracked through a program, and differential privacy, in which a weak dependence between input and output is permitted but provided only through a relatively small set of known differentially private primitives. <p/> We find that information flow for differentially private observations is no harder than dependency tracking. Differential privacy's strong guarantees allow for efficient and accurate dynamic tracking of information flow, allowing the use of existing technology to extend and improve the state of the art for the analysis of differentially private computations
International audienceIn this talk, we revise the main recent approaches which have been proposed to...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
With recent privacy failures in the release of personal data, differential privacy received consider...
We investigate the integration of two approaches to information security: information flow analysis,...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
This dissertation explores techniques for automating program analysis, with a focus on validating an...
The problem of learning from data while preserving the privacy of individual observations has a long...
We want assurances that sensitive information will not be disclosed when aggregate data derived from...
Differential privacy provides a way to get useful information about sensitive data without revealing...
Differential privacy is a popular privacy model within the research community because of the strong ...
Data privacy has been an important research topic in the security, theory and database communities i...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
Often service providers need to outsource computations on sensitive datasets and subsequently publis...
Facilitating use of sensitive data for research or commercial purposes, in a manner that preserves t...
International audienceSecure information flow is the problem of ensuring that the information made p...
International audienceIn this talk, we revise the main recent approaches which have been proposed to...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
With recent privacy failures in the release of personal data, differential privacy received consider...
We investigate the integration of two approaches to information security: information flow analysis,...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
This dissertation explores techniques for automating program analysis, with a focus on validating an...
The problem of learning from data while preserving the privacy of individual observations has a long...
We want assurances that sensitive information will not be disclosed when aggregate data derived from...
Differential privacy provides a way to get useful information about sensitive data without revealing...
Differential privacy is a popular privacy model within the research community because of the strong ...
Data privacy has been an important research topic in the security, theory and database communities i...
Across our digital lives, two powerful forces of data utility and data privacy push and pull against...
Often service providers need to outsource computations on sensitive datasets and subsequently publis...
Facilitating use of sensitive data for research or commercial purposes, in a manner that preserves t...
International audienceSecure information flow is the problem of ensuring that the information made p...
International audienceIn this talk, we revise the main recent approaches which have been proposed to...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
With recent privacy failures in the release of personal data, differential privacy received consider...