Privacy: an axiomatic approach

A Ziller, TT Mueller, R Braren, D Rueckert, G Kaissis - Entropy, 2022 - mdpi.com
… is, of privacy itself. In this work, we formulate an axiomatic definition of privacy based on
quantifiable … privacy (DP). Our work highlights the fact that the inevitable difficulties of protecting …

An axiomatic view of statistical privacy and utility

D Kifer, BR Lin - Journal of Privacy and …, 2012 - journalprivacyconfidentiality.org
… of privacy and utility. We present two privacy axioms which describe how privacy is affected
… To illustrate the axiomatic approach to privacy, we first present a generic form of differential …

Towards an axiomatization of statistical privacy and utility

D Kifer, BR Lin - Proceedings of the twenty-ninth ACM SIGMOD-SIGACT …, 2010 - dl.acm.org
axiomatic approach we can reduce the possibility of privacy breaches and useless datasets
caused by faulty intuition. In this paper we present some of our work on such a theory. In fact…

[PDF][PDF] The Politics of Formal Privacy's Axioms

J Seeman - Available at SSRN 4074087, 2022 - papers.ssrn.com
… First, I argue that FP frames certain privacy risks as legitimate … privacy research that better
align sociological and technical conceptions of privacy, and I argue that there are some privacy

An axiomatic approach to axiological uncertainty

S Riedener - Philosophical Studies, 2020 - Springer
… However, the general axiomatic approach that this theorem … axiomatic approach beyond
the particular theorem I’ve presented. But it’s not a reason to reject the entire approach

Reasoning about privacy using axioms

BR Lin, D Kifer - 2012 Conference Record of the Forty Sixth …, 2012 - ieeexplore.ieee.org
… Using privacy axioms, we identify two mathematical objects that are associated with privacy
… object which neatly encapsulates Bayesian guarantees provided by a privacy definition. …

Cats vs. spectre: An axiomatic approach to modeling speculative execution attacks

H Ponce-de-León, J Kinder - … on Security and Privacy (SP), 2022 - ieeexplore.ieee.org
… to the operational approach, define which executions are valid. The axiomatic approach has
… We argue that the axiomatic approach and CAT in particular lend themselves equally well to …

Digitally Sustainable Information Systems in Axiomatic Design

F Pecoraro, E Pourabbas, F Rolli, C Parretti - Sustainability, 2022 - mdpi.com
privacy by design and privacy by default in the design phase of system development. To this
end, we propose an approach based on axiomatic … the information axiom, in terms of privacy

A Generalization of Axiomatic Approach to Information Leakage

MA Zarrabian, P Sadeghi - arXiv preprint arXiv:2409.04108, 2024 - arxiv.org
… -Nagumo f-mean approach. Section IV is devoted to presenting the axiomatic relations of
these … encompass Rényi local differential privacy and local differential privacy, our proposed …

Axiomatic characterizations of information measures

I Csiszár - Entropy, 2008 - mdpi.com
Axiomatic characterization of MaxEnt and related inference rules. The paper concludes with
a brief discussion of the relevance of the axiomatic approach … an axiomatic approach led to a …