Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data 2011
DOI: 10.1145/1989323.1989453
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-aware data management in information networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…We have identified five tutorials [6,7,18,31,43] on differential privacy in the past five years, which are mainly from SIGMOD, KDD, and WIFS. Compared to tutorials before 2013 [7,18,31,43], the tutorial proposed for this venue will highlight recent techniques, as well as focus on the application of differential privacy to real problems and complex data types. While the building blocks of differentially pri-vate algorithms was the focus of [7], our tutorial has a larger scope of understanding the promise and limitations of differential privacy in real applications.…”
Section: History and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We have identified five tutorials [6,7,18,31,43] on differential privacy in the past five years, which are mainly from SIGMOD, KDD, and WIFS. Compared to tutorials before 2013 [7,18,31,43], the tutorial proposed for this venue will highlight recent techniques, as well as focus on the application of differential privacy to real problems and complex data types. While the building blocks of differentially pri-vate algorithms was the focus of [7], our tutorial has a larger scope of understanding the promise and limitations of differential privacy in real applications.…”
Section: History and Related Workmentioning
confidence: 99%
“…While the building blocks of differentially pri-vate algorithms was the focus of [7], our tutorial has a larger scope of understanding the promise and limitations of differential privacy in real applications. While [6,18,31] only focused on one specific application such as network data, or machine learning, we will also cover relational databases and trajectories. Moreover, we will also show how to customize differential privacy to meet the privacy requirements of these applications with complex data.…”
Section: History and Related Workmentioning
confidence: 99%
“…The goal is to provide statistical information about the data while preserving the privacy of users. Interesting works can be found, among others, in [22], [21] and [15].…”
Section: Privacy-preserving On Networkmentioning
confidence: 99%
“…Many graph analyses satisfy privacy definitions other than differential privacy [4]. These definitions generally do not exhibit the robustness of differential privacy, and a comparison is beyond the scope of this note.…”
Section: Related Workmentioning
confidence: 99%