{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:09:53Z","timestamp":1755997793730,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,23]],"date-time":"2017-04-23T00:00:00Z","timestamp":1492905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1513694"],"award-info":[{"award-number":["CNS-1513694"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,23]]},"DOI":"10.1145\/3064176.3064218","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T12:27:04Z","timestamp":1492432024000},"page":"560-574","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["DStress"],"prefix":"10.1145","author":[{"given":"Antonis","family":"Papadimitriou","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Arjun","family":"Narayan","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Andreas","family":"Haeberlen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2017,4,23]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1257\/aer.102.3.65"},{"unstructured":"Bank for International Settlements. International regulatory framework for banks (Basel III) website. http:\/\/www.bis.org\/bcbs\/basel3.htm. Bank for International Settlements. International regulatory framework for banks (Basel III) website. http:\/\/www.bis.org\/bcbs\/basel3.htm.","key":"e_1_3_2_1_2_1"},{"volume-title":"New York Times","year":"2006","author":"Barbaro M.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2492061"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-3-540-85174-5_25"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1345448.1345465"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1455770.1455804"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/62212.62213"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1146\/annurev-financial-110311-101754"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2422436.2422449"},{"unstructured":"Board of Governors of the Federal Reserve System. Dodd-Frank Act Stress Test 2015: Supervisory stress test methodology and results Mar. 2015. http:\/\/www.federalreserve.gov\/newsevents\/press\/bcreg\/bcreg20150305a1.pdf. Board of Governors of the Federal Reserve System. Dodd-Frank Act Stress Test 2015: Supervisory stress test methodology and results Mar. 2015. http:\/\/www.federalreserve.gov\/newsevents\/press\/bcreg\/bcreg20150305a1.pdf.","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/978-3-540-88313-5_13"},{"issue":"1","key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"16","DOI":"10.69554\/SVZG1421","article-title":"Stress tests to promote financial stability: Assessing progress and looking to the future","volume":"7","author":"Bookstaber R.","year":"2014","journal-title":"Journal of Risk Management in Financial Institutions"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1126\/science.1165821"},{"volume-title":"Proc. USENIX Security","year":"2010","author":"Burkhart M.","key":"e_1_3_2_1_15_1"},{"volume-title":"Proc. NSDI","year":"2012","author":"Chen R.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/978-3-642-27954-6_26"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1016\/j.jfi.2008.06.003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1002\/ett.4460080506"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1007\/978-3-642-00468-1_10"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1007\/978-3-540-79228-4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/11761679_29"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1007\/11681878_14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1287\/mnsc.47.2.236.9835"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/TIT.1985.1057074"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1257\/aer.104.10.3115"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1057\/9781137475114"},{"volume-title":"February 17, 2017; https:\/\/www.fdic.gov\/regulations\/reform\/dfast\/index.html.","author":"Federal Deposit Insurance Corporation (FDIC).","key":"e_1_3_2_1_29_1"},{"doi-asserted-by":"crossref","unstructured":"M. Flood J. Katz S. Ong and A. Smith. Cryptography and the economics of supervisory information: Balancing transparency and confidentiality. U.S. Department of Treasury Office of Financial Research Working Paper Series 1(11) 2013. M. Flood J. Katz S. Ong and A. Smith. Cryptography and the economics of supervisory information: Balancing transparency and confidentiality. U.S. Department of Treasury Office of Financial Research Working Paper Series 1(11) 2013.","key":"e_1_3_2_1_30_1","DOI":"10.26509\/frbc-wp-201312"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/2429069.2429113"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1007\/978-3-642-14623-7_9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1137\/09076828X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/28395.28420"},{"volume-title":"Proc. OSDI","year":"2012","author":"Gonzalez J. E.","key":"e_1_3_2_1_35_1"},{"volume-title":"Proc. OSDI","year":"2014","author":"Gonzalez J. E.","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1007\/978-3-540-24638-1_9"},{"volume-title":"Proc. USENIX Security","year":"2011","author":"Haeberlen A.","key":"e_1_3_2_1_38_1"},{"unstructured":"B. Hemenway and S. Khanna. Sensitivity and computational complexity in financial networks. In submission; manuscript available from http:\/\/www.cis.upenn.edu\/~sanjeev\/papers\/financial_network.pdf 2015. B. Hemenway and S. Khanna. Sensitivity and computational complexity in financial networks. In submission; manuscript available from http:\/\/www.cis.upenn.edu\/~sanjeev\/papers\/financial_network.pdf 2015.","key":"e_1_3_2_1_39_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1109\/CSF.2014.35"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1007\/978-3-540-45146-4_9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.14778\/3402707.3402749"},{"issue":"3","key":"e_1_3_2_1_43_1","first-page":"43","article-title":"Mapping networks of terrorist cells","volume":"24","author":"Krebs V. E.","year":"2002","journal-title":"Connections"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1007\/3-540-45664-3_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1126\/science.1167742"},{"unstructured":"B. Li H. Li G. Xu and H. Xu. Efficient reduction of 1 out of n oblivious transfers in random oracle model. IACR Cryptology ePrint Archive 2005:279 2005. B. Li H. Li G. Xu and H. Xu. Efficient reduction of 1 out of n oblivious transfers in random oracle model. IACR Cryptology ePrint Archive 2005:279 2005.","key":"e_1_3_2_1_46_1"},{"volume-title":"Proc. UAI","year":"2010","author":"Low Y.","key":"e_1_3_2_1_47_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1145\/1807167.1807184"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1145\/1559845.1559850"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1007\/978-3-642-03356-8_8"},{"volume-title":"Proc. OSDI","year":"2012","author":"Narayan A.","key":"e_1_3_2_1_51_1"},{"volume-title":"Proc. HotDep","year":"2014","author":"Narayan A.","key":"e_1_3_2_1_52_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1109\/SP.2008.33"},{"unstructured":"National Information Center of the Federal Reserve System. Insured U.S. chartered commercial banks that have consolidated assets of $300 million or more. http:\/\/www.federalreserve.gov\/releases\/lbr\/current\/default.htm 2014. National Information Center of the Federal Reserve System. Insured U.S. chartered commercial banks that have consolidated assets of $300 million or more. http:\/\/www.federalreserve.gov\/releases\/lbr\/current\/default.htm 2014.","key":"e_1_3_2_1_54_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_55_1","DOI":"10.1109\/SP.2015.30"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.1145\/2508859.2516751"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.14778\/2732296.2732300"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1109\/SP.2014.48"},{"volume-title":"Reuters","author":"Raymond N.","key":"e_1_3_2_1_60_1"},{"volume-title":"Proc. NSDI","year":"2010","author":"Roy I.","key":"e_1_3_2_1_61_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1016\/0378-8733(91)90008-H"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_63_1","DOI":"10.1109\/SFCS.1982.38"},{"volume-title":"Proc. OSDI","year":"2014","author":"Zhai E.","key":"e_1_3_2_1_64_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_65_1","DOI":"10.1145\/2508859.2516752"}],"event":{"sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"acronym":"EuroSys '17","name":"EuroSys '17: Twelfth EuroSys Conference 2017","location":"Belgrade Serbia"},"container-title":["Proceedings of the Twelfth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3064176.3064218","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3064176.3064218","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3064176.3064218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:15Z","timestamp":1750217775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3064176.3064218"}},"subtitle":["Efficient Differentially Private Computations on Distributed Data"],"short-title":[],"issued":{"date-parts":[[2017,4,23]]},"references-count":63,"alternative-id":["10.1145\/3064176.3064218","10.1145\/3064176"],"URL":"https:\/\/doi.org\/10.1145\/3064176.3064218","relation":{},"subject":[],"published":{"date-parts":[[2017,4,23]]},"assertion":[{"value":"2017-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}