{"id":"https://openalex.org/W3111641947","doi":"https://doi.org/10.3390/jcp1010004","title":"Refinement Orders for Quantitative Information Flow and Differential Privacy","display_name":"Refinement Orders for Quantitative Information Flow and Differential Privacy","publication_year":2020,"publication_date":"2020-12-12","ids":{"openalex":"https://openalex.org/W3111641947","doi":"https://doi.org/10.3390/jcp1010004","mag":"3111641947"},"language":"en","primary_location":{"id":"doi:10.3390/jcp1010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1010004","pdf_url":"https://www.mdpi.com/2624-800X/1/1/4/pdf?version=1607755993","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/1/1/4/pdf?version=1607755993","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066098595","display_name":"Konstantinos Chatzikokolakis","orcid":"https://orcid.org/0000-0002-3081-5775"},"institutions":[{"id":"https://openalex.org/I200777214","display_name":"National and Kapodistrian University of Athens","ror":"https://ror.org/04gnjpq42","country_code":"GR","type":"education","lineage":["https://openalex.org/I200777214"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Konstantinos Chatzikokolakis","raw_affiliation_strings":["Department of Informatics and Telecommunications, National and Kapodistrian University of Athens Campus, Ilisia, 15784 Athens, Greece"],"raw_orcid":"https://orcid.org/0000-0002-3081-5775","affiliations":[{"raw_affiliation_string":"Department of Informatics and Telecommunications, National and Kapodistrian University of Athens Campus, Ilisia, 15784 Athens, Greece","institution_ids":["https://openalex.org/I200777214"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081141490","display_name":"Natasha Fernandes","orcid":"https://orcid.org/0000-0002-9212-7839"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Natasha Fernandes","raw_affiliation_strings":["Department of Computing, Macquarie University, Ryde City 2109, Australia","Inria and Institut Polytechnique de Paris, 91120 Palaiseau, France","Macquarie University [Sydney] (Sydney, NSW, 2109, Australia - Australia)"],"raw_orcid":"https://orcid.org/0000-0002-9212-7839","affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Ryde City 2109, Australia","institution_ids":["https://openalex.org/I99043593"]},{"raw_affiliation_string":"Inria and Institut Polytechnique de Paris, 91120 Palaiseau, France","institution_ids":[]},{"raw_affiliation_string":"Macquarie University [Sydney] (Sydney, NSW, 2109, Australia - Australia)","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090842450","display_name":"Catuscia Palamidessi","orcid":"https://orcid.org/0000-0003-4597-7002"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Catuscia Palamidessi","raw_affiliation_strings":["Inria and Institut Polytechnique de Paris, 91120 Palaiseau, France"],"raw_orcid":"https://orcid.org/0000-0003-4597-7002","affiliations":[{"raw_affiliation_string":"Inria and Institut Polytechnique de Paris, 91120 Palaiseau, France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066098595"],"corresponding_institution_ids":["https://openalex.org/I200777214"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":0.5436,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74809077,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"1","issue":"1","first_page":"40","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.788805365562439},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7544553875923157},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.6124260425567627},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5281372666358948},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5171186923980713},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5005886554718018},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4803639352321625},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.47005096077919006},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2860136032104492},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.28497186303138733},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23378339409828186},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19739189743995667}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.788805365562439},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7544553875923157},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.6124260425567627},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5281372666358948},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5171186923980713},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5005886554718018},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4803639352321625},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.47005096077919006},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2860136032104492},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28497186303138733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23378339409828186},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19739189743995667},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp1010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1010004","pdf_url":"https://www.mdpi.com/2624-800X/1/1/4/pdf?version=1607755993","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-03091754v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-03091754","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, 2020, 1, pp.40 - 77. &#x27E8;10.3390/jcp1010004&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":{"id":"doi:10.3390/jcp1010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1010004","pdf_url":"https://www.mdpi.com/2624-800X/1/1/4/pdf?version=1607755993","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3111641947.pdf","grobid_xml":"https://content.openalex.org/works/W3111641947.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W182286721","https://openalex.org/W1658920975","https://openalex.org/W1873763122","https://openalex.org/W1968724592","https://openalex.org/W1987983106","https://openalex.org/W2000147742","https://openalex.org/W2008235019","https://openalex.org/W2033092546","https://openalex.org/W2053801139","https://openalex.org/W2074503439","https://openalex.org/W2078114603","https://openalex.org/W2082894754","https://openalex.org/W2091815328","https://openalex.org/W2097151854","https://openalex.org/W2100908223","https://openalex.org/W2115270921","https://openalex.org/W2119253309","https://openalex.org/W2119966192","https://openalex.org/W2157497706","https://openalex.org/W2508641559","https://openalex.org/W2962727778","https://openalex.org/W2969765251","https://openalex.org/W6677387537","https://openalex.org/W6725408686"],"related_works":["https://openalex.org/W4296973715","https://openalex.org/W2106969392","https://openalex.org/W4387193529","https://openalex.org/W3093310219","https://openalex.org/W1595551935","https://openalex.org/W3101646702","https://openalex.org/W2360781613","https://openalex.org/W2138926267","https://openalex.org/W2157160400","https://openalex.org/W1646148796"],"abstract_inverted_index":{"Quantitative":[0],"Information":[1],"Flow":[2],"(QIF)":[3],"and":[4,40,167],"Differential":[5],"Privacy":[6],"(DP)":[7],"are":[8,19,117],"both":[9,37],"concerned":[10],"with":[11],"the":[12,27,48,55,93,121,140,158,177,184,188,204,209],"protection":[13],"of":[14,30,57,62,95,102,135,142,155,179,186,208],"sensitive":[15],"information,":[16],"but":[17],"they":[18],"rather":[20],"different":[21,220],"approaches.":[22],"In":[23,104,128],"particular,":[24],"QIF":[25],"considers":[26],"expected":[28],"probability":[29],"a":[31,44,58,68,80,84,88,106,133],"successful":[32],"attack,":[33,60],"while":[34,200],"DP":[35,181],"(in":[36],"its":[38,63],"standard":[39],"local":[41],"versions)":[42],"is":[43,52,67,87,92,97,202],"max-case":[45,148],"measure,":[46],"in":[47,71,114,125,176],"sense":[49],"that":[50,78,91,101],"it":[51,201,216],"compromised":[53],"by":[54,83,139],"existence":[56],"possible":[59],"regardless":[61],"probability.":[64],"Comparing":[65],"systems":[66],"fundamental":[69],"task":[70,178],"these":[72,174],"areas:":[73],"one":[74,141],"wishes":[75],"to":[76],"guarantee":[77],"replacing":[79],"system":[81,85],"A":[82],"B":[86,96],"safe":[89],"operation":[90],"privacy":[94,122,195],"no":[98],"worse":[99],"than":[100],"A.":[103],"QIF,":[105,143],"refinement":[107,136],"order":[108,189],"provides":[109,193],"strong":[110,194],"such":[111],"guarantees,":[112],"while,":[113],"DP,":[115],"mechanisms":[116,207],"typically":[118],"compared":[119],"w.r.t.":[120],"parameter":[123],"\u03b5":[124,192],"their":[126,168],"definition.":[127],"this":[129],"paper,":[130],"we":[131,172],"explore":[132],"variety":[134],"orders,":[137],"inspired":[138],"providing":[144],"precise":[145],"guarantees":[146],"for":[147,164,206],"leakage.":[149],"We":[150,197],"study":[151],"simple":[152],"structural":[153],"ways":[154],"characterising":[156],"them,":[157,161],"relation":[159],"between":[160],"efficient":[162],"methods":[163],"verifying":[165],"them":[166],"lattice":[169],"properties.":[170],"Moreover,":[171],"apply":[173],"orders":[175],"comparing":[180],"mechanisms,":[182],"raising":[183],"question":[185],"whether":[187],"based":[190],"on":[191],"guarantees.":[196],"show":[198],"that,":[199],"often":[203],"case":[205],"same":[210],"\u201cfamily\u201d":[211],"(geometric,":[212],"randomised":[213],"response,":[214],"etc.),":[215],"rarely":[217],"holds":[218],"across":[219],"families.":[221]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2020-12-21T00:00:00"}
