03190nam 2200457 450 99647206670331620231110224200.03-030-96398-5(MiAaPQ)EBC6950786(Au-PeEL)EBL6950786(CKB)21500800700041(PPN)262168995(EXLCZ)992150080070004120221117d2022 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierGuide to differential privacy modifications a taxonomy of variants and extensions /Balázs Pejó and Damien DesfontainesCham, Switzerland :Springer International Publishing,[2022]©20221 online resource (91 pages)SpringerBriefs in Computer Science Print version: Pejó, Balázs Guide to Differential Privacy Modifications Cham : Springer International Publishing AG,c2022 9783030963972 Intro -- Preface -- Contents -- 1 Introduction -- References -- 2 Differential Privacy -- 2.1 The Original Version -- 2.2 Dimensions -- 2.3 Properties -- 2.4 Relations Between Definitions -- References -- 3 Quantification of Privacy Loss (Q) -- 3.1 Allowing a Small Probability of Error -- 3.2 Averaging the Privacy Loss -- 3.3 Controlling the Tail Distribution -- 3.4 Extension -- 3.5 Multidimensional Definitions -- References -- 4 Neighborhood Definition (N) -- 4.1 Changing the Sensitive Property -- 4.2 Limiting the Scope of the Definition -- 4.3 Considering Other Types of Input -- 4.4 Extensions -- 4.5 Multidimensional Definitions -- References -- 5 Variation of Privacy Loss (V) -- 5.1 Allocating Different Privacy Levels -- 5.2 Randomizing the Privacy Levels -- 5.3 Multidimensional Definitions -- References -- 6 Background Knowledge (B) -- 6.1 Conditioning on the Sensitive Property -- 6.2 Removing the Effect of Correlations -- 6.3 Multidimensional Definitions -- References -- 7 Change in Formalism (F) -- 7.1 Hypothesis Testing Interpretation -- 7.2 Prior-Posterior Bounds -- 7.3 Comparing Two Posteriors -- 7.4 Multidimensional Definitions -- References -- 8 Knowledge Gain Relativization (R) -- 8.1 Auxiliary Leakage Functions -- 8.2 Zero-knowledge Proofs -- 8.3 Multidimensional Definitions -- References -- 9 Computational Power (C) -- 9.1 Multidimensional Definitions -- References -- 10 Summarizing Table -- 10.1 Proofs of Properties -- References -- 11 Scope and Related Work -- 11.1 Methodology -- 11.2 Out of Scope Definitions -- 11.3 Local Model and Other Contexts -- 11.4 Related Work -- References -- 12 Conclusion.SpringerBriefs in Computer Science Computer securitySoftwareComputer securityData processingComputer securityComputer securityData processing.005.8Pejó Balázs1221599Desfontaines DamienMiAaPQMiAaPQMiAaPQBOOK996472066703316Guide to differential privacy modifications2968533UNISA01045nam0 22002651i 450 UON0049274520231205105339.47820190220r19571969 |0itac50 baengUS|||| 1||||Lie down in darknessa novelWilliam StyronNew YorkThe Viking Pressc195710a rist. 1969400 p.20 cm001UON003272722001 Viking Compass Book210 New YorkThe Viking PressC18USNew YorkUONL000050813.52Narrativa americana in lingua inglese. 1900-194521STYRONWilliamUONV185698193007Viking PressUONV258194650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00492745SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI NordA V A 0627 SI SNA797 7 0627 Lie down in darkness182368UNIOR