Differential identifiability

@inproceedings{Lee2012DifferentialI,
  title={Differential identifiability},
  author={Jaewoo Lee and Chris Clifton},
  booktitle={KDD},
  year={2012}
}
A key challenge in privacy-preserving data mining is ensuring that a data mining result does not inherently violate privacy. ε-Differential Privacy appears to provide a solution to this problem. However, there are no clear guidelines on how to set ε to satisfy a privacy policy. We give an alternate formulation, Differential Identifiability, parameterized by the probability of individual identification. This provides the strong privacy guarantees of differential privacy, while letting policy… CONTINUE READING
Highly Cited
This paper has 111 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 48 extracted citations

Membership privacy: a unifying framework for privacy definitions

ACM Conference on Computer and Communications Security • 2013
View 14 Excerpts
Highly Influenced

Location Privacy via Differential Private Perturbation of Cloaking Area

2015 IEEE 28th Computer Security Foundations Symposium • 2015
View 4 Excerpts
Highly Influenced

Network Structure Release under Differential Privacy

Transactions on Data Privacy • 2016
View 3 Excerpts
Highly Influenced

112 Citations

02040'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 112 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-2 of 2 references

Differential Privacy

Encyclopedia of Cryptography and Security • 2011
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…