{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T03:12:18Z","timestamp":1775790738509,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,1,14]],"date-time":"2015-01-14T00:00:00Z","timestamp":1421193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["272487"],"award-info":[{"award-number":["272487"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1065060"],"award-info":[{"award-number":["CNS-1065060"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TIN2012-39391-C04-01"],"award-info":[{"award-number":["TIN2012-39391-C04-01"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003403","name":"Fundaci\u00f3n Caja Madrid","doi-asserted-by":"publisher","award":["S2009TIC-1465"],"award-info":[{"award-number":["S2009TIC-1465"]}],"id":[{"id":"10.13039\/501100003403","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,1,14]]},"DOI":"10.1145\/2676726.2677000","type":"proceedings-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T08:51:05Z","timestamp":1418979065000},"page":"55-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy"],"prefix":"10.1145","author":[{"given":"Gilles","family":"Barthe","sequence":"first","affiliation":[{"name":"IMDEA Software Institue, Madrid, Spain"}]},{"given":"Marco","family":"Gaboardi","sequence":"additional","affiliation":[{"name":"University of Dundee, Dundee, Scotland Uk"}]},{"given":"Emilio Jes\u00fas","family":"Gallego Arias","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Justin","family":"Hsu","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Aaron","family":"Roth","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Pierre-Yves","family":"Strub","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2015,1,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/289423.289451"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2007.08.002"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103670"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535847"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.27"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964003"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541958"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1017\/S095679681300018X"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535883"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214019"},{"key":"e_1_3_2_2_13_1","volume-title":"Privacy and truthful equilibrium selection for aggregative games. Technical report","author":"Cummings R.","year":"2014","unstructured":"R. Cummings , M. Kearns , A. Roth , and Z. S. Wu . Privacy and truthful equilibrium selection for aggregative games. Technical report , 2014 . URL http:\/\/arxiv.org\/abs\/1407.7740. R. Cummings, M. Kearns, A. Roth, and Z. S. Wu. Privacy and truthful equilibrium selection for aggregative games. Technical report, 2014. URL http:\/\/arxiv.org\/abs\/1407.7740."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/351240.351259"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2009.42"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1137\/110843654"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964025"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_21_1","volume-title":"Computer-aided mechanism design","author":"Fang Y.","year":"2014","unstructured":"Y. Fang , S. Chaudhuri , and M. Vardi . Computer-aided mechanism design , 2014 . Poster at POPL '14. Y. Fang, S. Chaudhuri, and M. Vardi. Computer-aided mechanism design, 2014. Poster at POPL'14."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/581478.581484"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/113445.113468"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429113"},{"key":"e_1_3_2_2_25_1","volume-title":"International Conference on Machine Learning (ICML)","author":"Gaboardi M.","year":"2014","unstructured":"M. Gaboardi , E. J. Gallego Arias , J. Hsu , A. Roth , and Z. S. Wu . Dual query: Practical private query release for high dimensional data . In International Conference on Machine Learning (ICML) , Beijing, China , 2014 . URL http:\/\/arxiv.org\/abs\/1402.1526. M. Gaboardi, E. J. Gallego Arias, J. Hsu, A. Roth, and Z. S. Wu. Dual query: Practical private query release for high dimensional data. In International Conference on Machine Learning (ICML), Beijing, China, 2014. URL http:\/\/arxiv.org\/abs\/1402.1526."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0092872"},{"key":"e_1_3_2_2_27_1","volume-title":"Competitive auctions. Games and Economic Behavior, 55 (2)","author":"Goldberg A. V.","year":"2006","unstructured":"A. V. Goldberg , J. D. Hartline , A. R. Karlin , M. Saks , and A. Wright . Competitive auctions. Games and Economic Behavior, 55 (2) , 2006 . URL http:\/\/www.ime.usp.br\/ yw\/papers\/games\/goldberg2008-competitive-auctions.pdf. A. V. Goldberg, J. D. Hartline, A. R. Karlin, M. Saks, and A. Wright. Competitive auctions. Games and Economic Behavior, 55 (2), 2006. URL http:\/\/www.ime.usp.br\/ yw\/papers\/games\/goldberg2008-competitive-auctions.pdf."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429117"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593900"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706341"},{"key":"e_1_3_2_2_31_1","first-page":"93","volume-title":"Scheme and Functional Programming Workshop","author":"Gronski J.","year":"2006","unstructured":"J. Gronski , K. Knowles , A. Tomb , S. N. Freund , and C. Flanagan . Sage: Hybrid checking for flexible specifications . In Scheme and Functional Programming Workshop , pages 93 -- 104 , 2006 . URL http:\/\/galois.com\/wp-content\/uploads\/2014\/07\/pub_AT_SAGEHybridChecking.pdf. J. Gronski, K. Knowles, A. Tomb, S. N. Freund, and C. Flanagan. Sage: Hybrid checking for flexible specifications. In Scheme and Functional Programming Workshop, pages 93--104, 2006. URL http:\/\/galois.com\/wp-content\/uploads\/2014\/07\/pub_AT_SAGEHybridChecking.pdf."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806732"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.153.7"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03034-5_17"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11546382_3"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.41"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600057.2602834"},{"key":"e_1_3_2_2_40_1","volume-title":"Truthful approximation mechanisms for restricted combinatorial auctions. Games and Economic Behavior, 64 (2): 612--631","author":"Mu'Alem A.","year":"2008","unstructured":"m and Nisan(2008)}mu2008truthful A. Mu'Alem and N. Nisan . Truthful approximation mechanisms for restricted combinatorial auctions. Games and Economic Behavior, 64 (2): 612--631 , 2008 . URL http:\/\/authors.library.caltech.edu\/13158\/1\/MUAgeb08preprint.pdf. m and Nisan(2008)}mu2008truthfulA. Mu'Alem and N. Nisan. Truthful approximation mechanisms for restricted combinatorial auctions. Games and Economic Behavior, 64 (2): 612--631, 2008. URL http:\/\/authors.library.caltech.edu\/13158\/1\/MUAgeb08preprint.pdf."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301287"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926453"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509013.2509016"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040320"},{"key":"e_1_3_2_2_46_1","unstructured":"B. C. Pierce. Differential privacy in the programming languages community 2012. Invited tutorial at DIMACS Workshop on Recent Work on Differential Privacy across Computer Science.  B. C. Pierce. Differential privacy in the programming languages community 2012. Invited tutorial at DIMACS Workshop on Recent Work on Differential Privacy across Computer Science."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503288"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863568"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375602"},{"key":"e_1_3_2_2_50_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NDSI)","author":"Roy I.","year":"2010","unstructured":"I. Roy , S. Setty , A. Kilzer , V. Shmatikov , and E. Witchel . Airavat: Security and privacy for MapReduce . In USENIX Symposium on Networked Systems Design and Implementation (NDSI) , San Jose, California , 2010 . URL http:\/\/dl.acm.org\/citation.cfm?id=1855731. I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. In USENIX Symposium on Networked Systems Design and Implementation (NDSI), San Jose, California, 2010. URL http:\/\/dl.acm.org\/citation.cfm?id=1855731."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034811"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628136.2628161"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429121"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00590-9_1"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292560"}],"event":{"name":"POPL '15: The 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","location":"Mumbai India","acronym":"POPL '15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676726.2677000","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2676726.2677000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:03Z","timestamp":1750212783000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676726.2677000"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,14]]},"references-count":54,"alternative-id":["10.1145\/2676726.2677000","10.1145\/2676726"],"URL":"https:\/\/doi.org\/10.1145\/2676726.2677000","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2775051.2677000","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,1,14]]},"assertion":[{"value":"2015-01-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}