This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
research [2018/05/21 10:39] pullonen |
research [2021/09/29 14:32] pullonen |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== Research ====== | ====== Research ====== | ||
- | Published papers related to PLEAK: | + | Published papers and blog posts related to PLEAK: |
- Marlon Dumas, Luciano García-Bañuelos, Peeter Laud: Differential Privacy Analysis of Data Processing Workflows. GraMSec@CSF 2016: 62-79 | - Marlon Dumas, Luciano García-Bañuelos, Peeter Laud: Differential Privacy Analysis of Data Processing Workflows. GraMSec@CSF 2016: 62-79 | ||
- Martin Pettai, Peeter Laud: Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. POST 2017: 298-319 | - Martin Pettai, Peeter Laud: Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. POST 2017: 298-319 | ||
- | - Pille Pullonen, Raimundas Matulevicius, Dan Bogdanov: PE-BPMN: Privacy-Enhanced Business Process Model and Notation. BPM 2017: 40-56 | + | - Pille Pullonen, Raimundas Matulevičius, Dan Bogdanov: PE-BPMN: Privacy-Enhanced Business Process Model and Notation. BPM 2017: 40-56 https://link.springer.com/chapter/10.1007/978-3-319-65000-5_3 |
- Marlon Dumas, Luciano García-Bañuelos, Peeter Laud: Disclosure Analysis of SQL Workflows. GraMSec@CSF 2018: ?-? | - Marlon Dumas, Luciano García-Bañuelos, Peeter Laud: Disclosure Analysis of SQL Workflows. GraMSec@CSF 2018: ?-? | ||
+ | -Pille Pullonen, Jake Tom, Raimundas Matulevičius, Aivo Toots: Privacy-enhanced BPMN: enabling data privacy analysis in business processes models. Software & Systems Modeling, 2019 https://link.springer.com/article/10.1007/s10270-019-00718-z | ||
+ | -Aivo Toots, Reedik Tuuling, Maksym Yerokhin, Marlon Dumas, Luciano Garcia-Banuelos, Peeter Laud, Raimundas Matulevicius, Alisa Pankova, Martin Pettai, Pille Pullonen, Jake Tom: Business Process Privacy Analysis in Pleak. FASE, 2019. Full version available in https://arxiv.org/abs/1902.05052 | ||
+ | -Pille Pullonen: How privacy enhancing technologies affect business processes. Sharemind blog 2019 https://sharemind.cyber.ee/studying-processes-with-privacy-technologies/ | ||
+ | - Peeter Laud, Alisa Pankova, Martin Pettai: Achieving Differential Privacy using Methods from Calculus, https://arxiv.org/abs/1811.06343 | ||
+ | - Peeter Laud, Alisa Pankova: Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes, https://arxiv.org/abs/1911.12777 | ||
+ | - Sara Belluccini, Rocco De Nicola, Marlon Dumas, Pille Pullonen, Barbara Re, and Francesco Tiezzi: Verification of privacy-enhanced collaborations. FormaliSE 2020 | ||
+ | - Pille Pullonen: Analysing Privacy of Business Processes in Pleak. Cybernetica's blog 2020 https://cyber.ee/resources/case-studies/analysing-privacy-of-business-processes-in-pleak | ||
+ | - Marlon Dumas, Luciano García-Bañuelos, Joosep Jääger, Peeter Laud, Raimundas Matulevičius, Alisa Pankova, Martin Pettai, Pille Pullonen-Raudvere, Aivo Toots, Reedik Tuuling and Maksym Yerokhin: Multi-level privacy analysis of business processes: the PLEAK toolset. International Journal on Software Tools for Technology Transfer (2021) https://link.springer.com/epdf/10.1007/s10009-021-00636-w?sharing_token=wZ-2QiyNUtnV5FrvlYeE-fe4RwlQNchNByi7wbcMAY6jbblO6ASvtf3-2W17K3s-cuNM-WlEEVN_b82n3Qu-cq6QKeYMb5gnH6vVkNXd0TZ528nSVkayD27mnAO423uz-Y2ut47HBSGl3jjT_HGAM7AtaHFhC3io8UF6Q2iYeUQ%3D | ||