{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:07:22Z","timestamp":1725894442208},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368295"},{"type":"electronic","value":"9783642368301"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36830-1_3","type":"book-chapter","created":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T14:35:47Z","timestamp":1361198147000},"page":"41-62","source":"Crossref","is-referenced-by-count":2,"title":["A Differentially Private Mechanism of Optimal Utility for a Region of Priors"],"prefix":"10.1007","author":[{"given":"Ehab","family":"ElSalamouny","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Chatzikokolakis","sequence":"additional","affiliation":[]},{"given":"Catuscia","family":"Palamidessi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Brenner, H., Nissim, K.: Impossibility of differentially private universally optimal mechanisms. In: Proc. of FOCS, pp. 71\u201380. IEEE (2010)","DOI":"10.1109\/FOCS.2010.13"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Dwork, C., Lei, J.: Differential privacy and robust statistics. In: Proc. of STOC, pp. 371\u2013380. ACM (2009)","DOI":"10.1145\/1536414.1536466"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy in new settings. In: Proc. of SODA, pp. 174\u2013183. SIAM (2010)","DOI":"10.1137\/1.9781611973075.16"},{"issue":"1","key":"3_CR5","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C. Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Communications of the ACM\u00a054(1), 86\u201396 (2011)","journal-title":"Communications of the ACM"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Proc. of STOC, pp. 351\u2013360. ACM (2009)","DOI":"10.1145\/1536414.1536464"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Gupte, M., Sundararajan, M.: Universally optimal privacy mechanisms for minimax agents. In: Proc. of PODS, pp. 135\u2013146. ACM (2010)","DOI":"10.1145\/1807085.1807105"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-22012-8_4","volume-title":"Automata, Languages and Programming","author":"M.S. Alvim","year":"2011","unstructured":"Alvim, M.S., Andr\u00e9s, M.E., Chatzikokolakis, K., Palamidessi, C.: On the Relation between Differential Privacy and Quantitative Information Flow. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol.\u00a06756, pp. 60\u201376. Springer, Heidelberg (2011)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Basin, D.A.: An information-theoretic model for adaptive side-channel attacks. In: Proc. of CCS, pp. 286\u2013296. ACM (2007)","DOI":"10.1145\/1315245.1315282"},{"issue":"2","key":"3_CR10","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1093\/logcom\/exi009","volume":"18","author":"D. Clark","year":"2005","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. J. of Logic and Computation\u00a018(2), 181\u2013199 (2005)","journal-title":"J. of Logic and Computation"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/11787006_11","volume-title":"Automata, Languages and Programming","author":"M. Boreale","year":"2006","unstructured":"Boreale, M.: Quantifying Information Leakage in Process Calculi. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol.\u00a04052, pp. 119\u2013131. Springer, Heidelberg (2006)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Malacaria, P.: Assessing security threats of looping constructs. In: Proc. of POPL, pp. 225\u2013235. ACM (2007)","DOI":"10.1145\/1190215.1190251"},{"issue":"2-4","key":"3_CR13","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.ic.2007.07.003","volume":"206","author":"K. Chatzikokolakis","year":"2008","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Inf. and Comp.\u00a0206(2-4), 378\u2013401 (2008)","journal-title":"Inf. and Comp."},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-00596-1_21","volume-title":"Foundations of Software Science and Computational Structures","author":"G. Smith","year":"2009","unstructured":"Smith, G.: On the Foundations of Quantitative Information Flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol.\u00a05504, pp. 288\u2013302. Springer, Heidelberg (2009)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative notions of leakage for one-try attacks. In: Proc. of MFPS. ENTCS, vol.\u00a0249, pp. 75\u201391. Elsevier (2009)","DOI":"10.1016\/j.entcs.2009.07.085"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Smith, G.: Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In: Proc. of CSF, pp. 44\u201356. IEEE (2010)","DOI":"10.1109\/CSF.2010.11"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-642-12002-2_32","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M.E. Andr\u00e9s","year":"2010","unstructured":"Andr\u00e9s, M.E., Palamidessi, C., van Rossum, P., Smith, G.: Computing the Leakage of Information-Hiding Systems. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol.\u00a06015, pp. 373\u2013389. Springer, Heidelberg (2010)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Barthe, G., K\u00f6pf, B.: Information-theoretic bounds for differentially private mechanisms. In: Proc. of CSF, pp. 191\u2013204. IEEE (2011)","DOI":"10.1109\/CSF.2011.20"},{"key":"3_CR19","unstructured":"Clarkson, M.R., Schneider, F.B.: Quantification of integrity. Tech. Rep. (2011), \n \n http:\/\/hdl.handle.net\/1813\/22012"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-29420-4_3","volume-title":"Formal Aspects of Security and Trust","author":"M.S. Alvim","year":"2012","unstructured":"Alvim, M.S., Andr\u00e9s, M.E., Chatzikokolakis, K., Degano, P., Palamidessi, C.: Differential Privacy: On the Trade-Off between Utility and Information Leakage. In: Barthe, G., Datta, A., Etalle, S. (eds.) FAST 2011. LNCS, vol.\u00a07140, pp. 39\u201354. Springer, Heidelberg (2012)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"ElSalamouny, E., Chatzikokolakis, K., Palamidessi, C.: A differentially private mechanism of optimal utility for a region of priors. Technical report, INRIA (2013), \n \n http:\/\/hal.inria.fr\/hal-00760735\/","DOI":"10.1007\/978-3-642-36830-1_3"},{"key":"3_CR22","unstructured":"R\u00e9nyi, A.: On Measures of Entropy and Information. In: Proc. of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability, pp. 547\u2013561 (1961)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Kifer, D., Lin, B.R.: Towards an axiomatization of statistical privacy and utility. In: Proc. of PODS, pp. 147\u2013158. ACM (2010)","DOI":"10.1145\/1807085.1807106"},{"issue":"1","key":"3_CR24","doi-asserted-by":"crossref","first-page":"5","DOI":"10.29012\/jpc.v4i1.610","volume":"4","author":"D. Kifer","year":"2012","unstructured":"Kifer, D., Lin, B.R.: An axiomatic view of statistical privacy and utility. Journal of Privacy and Confidentiality\u00a04(1), 5\u201349 (2012)","journal-title":"Journal of Privacy and Confidentiality"}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36830-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T04:14:56Z","timestamp":1557548096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36830-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368295","9783642368301"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36830-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}