{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T03:15:13Z","timestamp":1767928513328,"version":"3.49.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,2,17]],"date-time":"2016-02-17T00:00:00Z","timestamp":1455667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM SIGLOG News"],"published-print":{"date-parts":[[2016,2,17]]},"abstract":"<jats:p>Differential privacy is rigorous framework for stating and enforcing privacy guarantees on computations over sensitive data. Informally, differential privacy ensures that the presence or absence of a single individual in a database has only a negligible statistical effect on the computation's result. Many specific algorithms have been proved differentially private, but manually checking that a given program is differentially private can be subtle, tedious, or both. This approach becomes unfeasible when larger programs are considered.<\/jats:p>","DOI":"10.1145\/2893582.2893591","type":"journal-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T14:26:47Z","timestamp":1585924007000},"page":"34-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Programming language techniques for differential privacy"],"prefix":"10.1145","volume":"3","author":[{"given":"Gilles","family":"Barthe","sequence":"first","affiliation":[{"name":"IMDEA Software"}]},{"given":"Marco","family":"Gaboardi","sequence":"additional","affiliation":[{"name":"Univ. of Dundee"}]},{"given":"Justin","family":"Hsu","sequence":"additional","affiliation":[{"name":"Univ. of Pennsylvania"}]},{"given":"Benjamin","family":"Pierce","sequence":"additional","affiliation":[{"name":"Univ. of Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2016,2,17]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Emilio Jes\u00fas Gallego Arias, and Justin Hsu","author":"de Amorim Arthur Azevedo","year":"2014","unstructured":"Arthur Azevedo de Amorim , Marco Gaboardi , Emilio Jes\u00fas Gallego Arias, and Justin Hsu . 2014 . Really Natural Linear Indexed Type Checking. In IFL 2014. DOI:http:\/\/dx.doi.org\/10.1145\/2746325.2746335 10.1145\/2746325.2746335 Arthur Azevedo de Amorim, Marco Gaboardi, Emilio Jes\u00fas Gallego Arias, and Justin Hsu. 2014. Really Natural Linear Indexed Type Checking. In IFL 2014. DOI:http:\/\/dx.doi.org\/10.1145\/2746325.2746335"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.26"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48899-7_27"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.36"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677000"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103670"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964003"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"e_1_2_1_9_1","volume-title":"Generalized Bisimulation Metrics. In CONCUR","author":"Chatzikokolakis Konstantinos","year":"2014","unstructured":"Konstantinos Chatzikokolakis , Daniel Gebler , Catuscia Palamidessi , and Lili Xu . 2014 a. Generalized Bisimulation Metrics. In CONCUR 2014. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-662-44584-6_4 10.1007\/978-3-662-44584-6_4 Konstantinos Chatzikokolakis, Daniel Gebler, Catuscia Palamidessi, and Lili Xu. 2014a. Generalized Bisimulation Metrics. In CONCUR 2014. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-662-44584-6_4"},{"key":"e_1_2_1_10_1","volume-title":"PETS","author":"Chatzikokolakis Konstantinos","year":"2014","unstructured":"Konstantinos Chatzikokolakis , Catuscia Palamidessi , and Marco Stronati . 2014 b. A Predictive Differentially-Private Mechanism for Mobility Traces . In PETS 2014. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-319-08506-7_2 10.1007\/978-3-319-08506-7_2 Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Marco Stronati. 2014b. A Predictive Differentially-Private Mechanism for Mobility Traces. In PETS 2014. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-319-08506-7_2"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505351.2505353"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677005"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.25"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664263"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_2_1_19_1","volume-title":"Dual Query: Practical Private Query Release for High Dimensional Data. In ICML'14","author":"Gaboardi Marco","year":"2014","unstructured":"Marco Gaboardi , Emilio Jes\u00fas Gallego Arias , Justin Hsu , Aaron Roth , and Zhiwei Steven Wu . 2014 . Dual Query: Practical Private Query Release for High Dimensional Data. In ICML'14 . http:\/\/jmlr.org\/proceedings\/papers\/v32\/gaboardi14.html Marco Gaboardi, Emilio Jes\u00fas Gallego Arias, Justin Hsu, Aaron Roth, and Zhiwei Steven Wu. 2014. Dual Query: Practical Private Query Release for High Dimensional Data. In ICML'14. http:\/\/jmlr.org\/proceedings\/papers\/v32\/gaboardi14.html"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429113"},{"key":"e_1_2_1_21_1","volume-title":"USENIX Security","author":"Haeberlen Andreas","year":"2011","unstructured":"Andreas Haeberlen , Benjamin C. Pierce , and Arjun Narayan . 2011. Differential Privacy Under Fire . In USENIX Security 2011 . http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Haeberlen.pdf Andreas Haeberlen, Benjamin C. Pierce, and Arjun Narayan. 2011. Differential Privacy Under Fire. In USENIX Security 2011. http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Haeberlen.pdf"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851199"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.41"},{"key":"e_1_2_1_25_1","volume-title":"Big Data '13","author":"Mir Darakhshan J.","year":"2013","unstructured":"Darakhshan J. Mir , Sibren Isaacman , Ram\u00f3n C\u00e1ceres , Margaret Martonosi , and Rebecca N. Wright . 2013. DP-WHERE: Differentially private modeling of human mobility . In Big Data '13 . 580--588. DOI:http:\/\/dx.doi.org\/10.1109\/BigData. 2013 .6691626 10.1109\/BigData.2013.6691626 Darakhshan J. Mir, Sibren Isaacman, Ram\u00f3n C\u00e1ceres, Margaret Martonosi, and Rebecca N. Wright. 2013. DP-WHERE: Differentially private modeling of human mobility. In Big Data '13. 580--588. DOI:http:\/\/dx.doi.org\/10.1109\/BigData.2013.6691626"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_8"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213876"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741978"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732296.2732300"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863568"},{"key":"e_1_2_1_33_1","volume-title":"Airavat: Security and Privacy for MapReduce. In NSDI","author":"Roy Indrajit","year":"2010","unstructured":"Indrajit Roy , Srinath T. V. Setty , Ann Kilzer , Vitaly Shmatikov , and Emmett Witchel . 2010 . Airavat: Security and Privacy for MapReduce. In NSDI 2010. http:\/\/www.usenix.org\/events\/nsdi10\/tech\/full_papers\/roy.pdf Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel. 2010. Airavat: Security and Privacy for MapReduce. In NSDI 2010. http:\/\/www.usenix.org\/events\/nsdi10\/tech\/full_papers\/roy.pdf"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2011.09.015"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_2_1_36_1","volume-title":"TGC","author":"Xu L.","year":"2012","unstructured":"L. Xu . 2012 . Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus . In TGC 2013. http:\/\/dx.doi.org\/10.1007\/978-3-642-41157-1_13 10.1007\/978-3-642-41157-1_13 L. Xu. 2012. Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus. In TGC 2013. http:\/\/dx.doi.org\/10.1007\/978-3-642-41157-1_13"}],"container-title":["ACM SIGLOG News"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2893582.2893591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2893582.2893591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:14Z","timestamp":1750222574000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2893582.2893591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,17]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2,17]]}},"alternative-id":["10.1145\/2893582.2893591"],"URL":"https:\/\/doi.org\/10.1145\/2893582.2893591","relation":{},"ISSN":["2372-3491"],"issn-type":[{"value":"2372-3491","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,17]]},"assertion":[{"value":"2016-02-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}