• SuLQ

  • Referenced in 124 articles [sw11355]
  • Practical privacy: the SuLQ framework. We consider a statistical database in which a trusted administrator ... query responses with the goal of maintaining privacy of individual database entries. In such ... Nissim show that a strong form of privacy can be maintained using a surprisingly small ... ways. First, we modify the privacy analysis to real-valued functions f and arbitrary...
  • PrivateLR

  • Referenced in 79 articles [sw11354]
  • epsilon-differentially private (C. Dwork, Differential Privacy, ICALP...
  • JFlow

  • Referenced in 26 articles [sw20595]
  • flow control. A promising technique for protecting privacy and integrity of sensitive data...
  • ELmD

  • Referenced in 13 articles [sw20823]
  • nonce at some desired level of privacy are two-pass or Mac-then-Encrypt constructions ... inherently inefficient but provide full privacy) and online constructions like McOE, sponge-type authenticated encryptions ... fully pipeline implementable. It also provides full privacy when associated data is not repeated. Like...
  • Sharemind

  • Referenced in 13 articles [sw22617]
  • Sharemind: A framework for fast privacy-preserving computations. Gathering and processing sensitive data ... solution—Sharemind—is a virtual machine for privacy-preserving data processing that relies on share ... malicious participants, it still provides significantly increased privacy preservation when compared to standard centralised databases...
  • TASTY

  • Referenced in 18 articles [sw09865]
  • automatically generate efficient secure protocols for many privacy-preserving applications where we consider...
  • McOE

  • Referenced in 14 articles [sw20876]
  • Schemes. On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line...
  • ADSNARK

  • Referenced in 8 articles [sw22496]
  • ADSNARK: nearly practical and privacy-preserving proofs on authenticated data. We study the problem ... privacy-preserving proofs on authenticated data, where a party receives data from a trusted source ... arbitrary computations over authenticated data in a privacy-preserving manner. ADSNARK improves significantly over state...
  • ConfiChair

  • Referenced in 7 articles [sw13266]
  • Privacy supporting cloud computing: confichair, a case study. Cloud computing means entrusting data to information ... remote servers, in the “cloud”, raising new privacy and confidentiality concerns. We propose a general ... management. We identify the specific security and privacy risks that existing systems like EasyChair ... management system that offers strong security and privacy guarantees.par In ConfiChair, authors, reviewers...
  • BLINC

  • Referenced in 10 articles [sw30333]
  • current flow collectors provide. These restrictions respect privacy, technological and practical constraints. Second...
  • Pufferfish

  • Referenced in 4 articles [sw12982]
  • Pufferfish, A framework for mathematical privacy definitions. In this article, we introduce ... general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy ... frequently do not have expertise in privacy, to develop rigorous privacy definitions for their data ... also be used to study existing privacy definitions.par We illustrate the benefits with several applications...
  • ELmE

  • Referenced in 5 articles [sw22881]
  • nonce) at some desired level of privacy are two-pass or Mac-then-Encrypt constructions ... inherently inefficient but provide full privacy) and online constructions, e.g., McOE, sponge-type authenticated encryptions ... pipeline implementable. It also provides full privacy when associated data (which includes initial value...
  • RAST

  • Referenced in 8 articles [sw17158]
  • User access is controlled to ensure data privacy, but the collaborative environment underpinning the service...
  • TaintDroid

  • Referenced in 8 articles [sw26740]
  • information-flow tracking system for realtime privacy monitoring on smartphones. Today’s smartphone operating systems...
  • FRAPP

  • Referenced in 3 articles [sw08861]
  • FRAPP: a framework for high-accuracy privacy-preserving mining. To preserve client privacy ... design of perturbation mechanisms for privacy-preserving mining. Specifically, FRAPP is used to demonstrate that ... substantially enhancing the accuracy even under strict privacy requirements. We also propose a novel perturbation ... that this feature provides significant improvements in privacy at only a marginal reduction in accuracy...
  • V-MDAV

  • Referenced in 6 articles [sw11787]
  • should be maximized. In the context of privacy in statistical databases, microaggregation is a well...
  • Apte

  • Referenced in 6 articles [sw20604]
  • model cryptographic security properties such that privacy, anonymity, unlinkability, receipt-freeness… APTE can handle several...
  • SCiFI

  • Referenced in 4 articles [sw33595]
  • secure way which protects both the privacy of the subjects and the confidentiality ... specific application of SCiFI is reducing the privacy impact of camera based surveillance. In that...
  • LoPSiL

  • Referenced in 5 articles [sw02068]
  • language for specifying location-dependent security and privacy policies. Policy- specification languages like LoPSiL...
  • SWATT

  • Referenced in 5 articles [sw09061]
  • smart appliances. An adversary can compromise our privacy and safety by maliciously modifying the memory...