G. Cormode. Technical perspective: Toward building a differentially private DBMS. In Communications of the ACM (CACM), volume 68, page 92. 2025.

From the demographic statistics produced by national census bodies to the complex predictive models built by companies in “Big Tech” and finance, data is the fuel that powers these applications. Most such use cases rely on data derived from the properties and actions of individual people. This data is therefore considered sensitive and in need of protections to prevent inappropriate use or disclosure. Some protections come from enforcing policies, access control, and contractual agreements. But we also seek technical interventions—definitions and algorithms that can be applied by computer systems to protect private information while still enabling the intended use.

bib | Alternate Version ] Back


This file was generated by bibtex2html 1.92.