Privacy: an axiomatic approach
… is, of privacy itself. In this work, we formulate an axiomatic definition of privacy based on
quantifiable … privacy (DP). Our work highlights the fact that the inevitable difficulties of protecting …
quantifiable … privacy (DP). Our work highlights the fact that the inevitable difficulties of protecting …
An axiomatic view of statistical privacy and utility
… of privacy and utility. We present two privacy axioms which describe how privacy is affected
… To illustrate the axiomatic approach to privacy, we first present a generic form of differential …
… To illustrate the axiomatic approach to privacy, we first present a generic form of differential …
Towards an axiomatization of statistical privacy and utility
… axiomatic approach we can reduce the possibility of privacy breaches and useless datasets
caused by faulty intuition. In this paper we present some of our work on such a theory. In fact…
caused by faulty intuition. In this paper we present some of our work on such a theory. In fact…
[PDF][PDF] The Politics of Formal Privacy's Axioms
J Seeman - Available at SSRN 4074087, 2022 - papers.ssrn.com
… First, I argue that FP frames certain privacy risks as legitimate … privacy research that better
align sociological and technical conceptions of privacy, and I argue that there are some privacy …
align sociological and technical conceptions of privacy, and I argue that there are some privacy …
An axiomatic approach to axiological uncertainty
S Riedener - Philosophical Studies, 2020 - Springer
… However, the general axiomatic approach that this theorem … axiomatic approach beyond
the particular theorem I’ve presented. But it’s not a reason to reject the entire approach…
the particular theorem I’ve presented. But it’s not a reason to reject the entire approach…
Reasoning about privacy using axioms
… Using privacy axioms, we identify two mathematical objects that are associated with privacy
… object which neatly encapsulates Bayesian guarantees provided by a privacy definition. …
… object which neatly encapsulates Bayesian guarantees provided by a privacy definition. …
Cats vs. spectre: An axiomatic approach to modeling speculative execution attacks
H Ponce-de-León, J Kinder - … on Security and Privacy (SP), 2022 - ieeexplore.ieee.org
… to the operational approach, define which executions are valid. The axiomatic approach has
… We argue that the axiomatic approach and CAT in particular lend themselves equally well to …
… We argue that the axiomatic approach and CAT in particular lend themselves equally well to …
Digitally Sustainable Information Systems in Axiomatic Design
F Pecoraro, E Pourabbas, F Rolli, C Parretti - Sustainability, 2022 - mdpi.com
… privacy by design and privacy by default in the design phase of system development. To this
end, we propose an approach based on axiomatic … the information axiom, in terms of privacy …
end, we propose an approach based on axiomatic … the information axiom, in terms of privacy …
A Generalization of Axiomatic Approach to Information Leakage
MA Zarrabian, P Sadeghi - arXiv preprint arXiv:2409.04108, 2024 - arxiv.org
… -Nagumo f-mean approach. Section IV is devoted to presenting the axiomatic relations of
these … encompass Rényi local differential privacy and local differential privacy, our proposed …
these … encompass Rényi local differential privacy and local differential privacy, our proposed …
Axiomatic characterizations of information measures
I Csiszár - Entropy, 2008 - mdpi.com
… Axiomatic characterization of MaxEnt and related inference rules. The paper concludes with
a brief discussion of the relevance of the axiomatic approach … an axiomatic approach led to a …
a brief discussion of the relevance of the axiomatic approach … an axiomatic approach led to a …