Publications
Filters: Author is Catuscia Palamidessi [Clear All Filters]
Abstract interpretation of temporal concurrent constraint programs”, Theory and Practice of Logic Programming, vol. 15, p. 312–357, 2015.
, “ Constructing elastic distinguishability metrics for location privacy”, Privacy Enhancing Technologies (PoPETs), vol. 2015, p. 156–170, 2015.
, “ Geo-indistinguishability: A Principled Approach to Location Privacy”, in Distributed Computing and Internet Technology - 11th International Conference, (ICDCIT) 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings, 2015.
, “ On the information leakage of differentially-private mechanisms”, Journal of Computer Security, vol. 23, p. 427–469, 2015.
, “ Location Privacy via Geo-Indistinguishability”, in Theoretical Aspects of Computing - (ICTAC) 2015 - 12th International Colloquium Cali, Colombia, October 29-31, 2015, Proceedings, 2015.
, “ Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges”, in Principles of Security and Trust - 4th International Conference, (POST) 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, (ETAPS) 2015, London, UK, April 11-18, 2015, Proceedings, 2015.
, “ Special issue on quantitative information flow”, Mathematical Structures in Computer Science, vol. 25, p. 203–206, 2015.
, “ Additive and Multiplicative Notions of Leakage, and Their Capacities”, in Proceedings of the IEEE 27th Computer Security Foundations Symposium, (CSF) 2014, Vienna, Austria, 19-22 July, 2014, 2014.
, “ Compositional Methods for Information-Hiding”, Mathematical Structures in Computer Science, 2014.
, “ Compositionality Results for Quantitative Information Flow”, in Proceedings of the 11th International Conference on Quantitative Evaluation of SysTems (QEST 2014), Florence, Italy, 2014.
, “ Formal Techniques for Distributed Objects, Components, and Systems - 34th International Conference (FORTE), vol. 8461. 2014.
, Generalized bisimulation metrics”, in CONCUR - 25th Conference on Concurrency Theory, Rome, Italy, 2014.
, “ Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms”, in Horizons of the Mind. {A} Tribute to Prakash Panangaden - Essays Dedicated to Prakash Panangaden on the Occasion of His 60th Birthday, 2014.
, “ Horizons of the Mind. A Tribute to Prakash Panangaden - Essays Dedicated to Prakash Panangaden on the Occasion of His 60th Birthday, vol. 8464. 2014.
, Optimal Geo-Indistinguishable Mechanisms for Location Privacy”, in CCS - 21st ACM Conference on Computer and Communications Security, Scottsdale, Arizona, United States, 2014.
, “ A Predictive Differentially-Private Mechanism for Mobility Traces”, in PETS 2014 - 14th Privacy Enhancing Technologies Symposium, Amsterdam, Netherlands, 2014.
, “ Broadening the Scope of Differential Privacy Using Metrics”, in The 13th Privacy Enhancing Technologies Symposium, Bloomington, Indiana, United States, 2013.
, “ Broadening the Scope of Differential Privacy Using Metrics”, in Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings, 2013.dpmetrics.pdf (764.63 KB)
, “ A differentially private mechanism of optimal utility for a region of priors”, in Proceedings of the 2nd Conference on Principles of Security and Trust (POST), 2013.main.pdf (214.46 KB)
, “ Geo-Indistinguishability: Differential Privacy for Location-Based Systems”, in 20th ACM Conference on Computer and Communications Security, Berlin, Germany, 2013.
, “ Preserving differential privacy under finite-precision semantics”, in Proceedings of the Eleventh Workshop on Quantitative Aspects of Programming Languages (QAPL), 2013.diff_priv.pdf (213.64 KB)
, “ Quantitative Approaches to Information Protection”, in Logic, Language, Information, and Computation - 20th International Workshop, WoLLIC 2013, Darmstadt, Germany, August 20-23, 2013. Proceedings, 2013.
, “ Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability”, in Trustworthy Global Computing, vol. 8191, 2013, p. 182-197.
, “ Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems”, in Proceedings 10th Workshop on Quantitative Aspects of Programming Languages and Systems, 2012.
, “