Reminiscences
I first met Steve during a talk I was giving at Carnegie Mellon in 2003 describing very early thoughts on a cryptography-flavored approach to privacy in public databases. Some of these ideas arose during Adam Smith's internship with me at Microsoft. Steve was critical (``Your utility is going...
Gespeichert in:
Veröffentlicht in: | The journal of privacy and confidentiality 2018-12, Vol.8 (1) |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | |
container_title | The journal of privacy and confidentiality |
container_volume | 8 |
creator | Dwork, Cynthia |
description | I first met Steve during a talk I was giving at Carnegie Mellon in 2003 describing very early thoughts on a cryptography-flavored approach to privacy in public databases. Some of these ideas arose during Adam Smith's internship with me at Microsoft. Steve was critical (``Your utility is going to be in the toilet''), but I think he was intrigued by the cryptographic approach, since after the talk he proposed that we have a workshop (``Your bring your guys and I'll bring mine''). This occurred during the summer of 2005 in the hillside town of Bertinoro, Italy. The workshop almost broke down on the second day: the statisticians thought the cryptographers, with their talk of ``the adversary'' and its arbitrary auxiliary information, were completely paranoid, while the cryptographers were frustrated by the absence of a formal notion of privacy and a measure of its loss in the statistical work. Fortunately, there is little to do in Bertinoro at night, other than to drink grappa in the piazza, and this eased the tension considerably. Later in the workshop Steve proposed to Alan Karr and me that we found a journal and, to paraphrase Gertrude Stein, we have and this is it.
|
doi_str_mv | 10.29012/jpc.702 |
format | Article |
fullrecord | <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_29012_jpc_702</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_29012_jpc_702</sourcerecordid><originalsourceid>FETCH-crossref_primary_10_29012_jpc_7023</originalsourceid><addsrcrecordid>eNpjYBAwNNAzsjQwNNLPKkjWMzcwYmLgNDI1N9W1MDUyZ0FiczDwFhdnGRgYGFmYm5hYGnEy8Aal5mbmZRYnp-YlpxbzMLCmJeYUp_JCaW4GDTfXEGcP3eSi_OLiotS0-IKizNzEosp4Q4N4sI3xQBvjgTYak6AUAK26L4U</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Reminiscences</title><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Dwork, Cynthia</creator><creatorcontrib>Dwork, Cynthia</creatorcontrib><description>I first met Steve during a talk I was giving at Carnegie Mellon in 2003 describing very early thoughts on a cryptography-flavored approach to privacy in public databases. Some of these ideas arose during Adam Smith's internship with me at Microsoft. Steve was critical (``Your utility is going to be in the toilet''), but I think he was intrigued by the cryptographic approach, since after the talk he proposed that we have a workshop (``Your bring your guys and I'll bring mine''). This occurred during the summer of 2005 in the hillside town of Bertinoro, Italy. The workshop almost broke down on the second day: the statisticians thought the cryptographers, with their talk of ``the adversary'' and its arbitrary auxiliary information, were completely paranoid, while the cryptographers were frustrated by the absence of a formal notion of privacy and a measure of its loss in the statistical work. Fortunately, there is little to do in Bertinoro at night, other than to drink grappa in the piazza, and this eased the tension considerably. Later in the workshop Steve proposed to Alan Karr and me that we found a journal and, to paraphrase Gertrude Stein, we have and this is it.
</description><identifier>ISSN: 2575-8527</identifier><identifier>EISSN: 2575-8527</identifier><identifier>DOI: 10.29012/jpc.702</identifier><language>eng</language><ispartof>The journal of privacy and confidentiality, 2018-12, Vol.8 (1)</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,864,27924,27925</link.rule.ids></links><search><creatorcontrib>Dwork, Cynthia</creatorcontrib><title>Reminiscences</title><title>The journal of privacy and confidentiality</title><description>I first met Steve during a talk I was giving at Carnegie Mellon in 2003 describing very early thoughts on a cryptography-flavored approach to privacy in public databases. Some of these ideas arose during Adam Smith's internship with me at Microsoft. Steve was critical (``Your utility is going to be in the toilet''), but I think he was intrigued by the cryptographic approach, since after the talk he proposed that we have a workshop (``Your bring your guys and I'll bring mine''). This occurred during the summer of 2005 in the hillside town of Bertinoro, Italy. The workshop almost broke down on the second day: the statisticians thought the cryptographers, with their talk of ``the adversary'' and its arbitrary auxiliary information, were completely paranoid, while the cryptographers were frustrated by the absence of a formal notion of privacy and a measure of its loss in the statistical work. Fortunately, there is little to do in Bertinoro at night, other than to drink grappa in the piazza, and this eased the tension considerably. Later in the workshop Steve proposed to Alan Karr and me that we found a journal and, to paraphrase Gertrude Stein, we have and this is it.
</description><issn>2575-8527</issn><issn>2575-8527</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNpjYBAwNNAzsjQwNNLPKkjWMzcwYmLgNDI1N9W1MDUyZ0FiczDwFhdnGRgYGFmYm5hYGnEy8Aal5mbmZRYnp-YlpxbzMLCmJeYUp_JCaW4GDTfXEGcP3eSi_OLiotS0-IKizNzEosp4Q4N4sI3xQBvjgTYak6AUAK26L4U</recordid><startdate>20181202</startdate><enddate>20181202</enddate><creator>Dwork, Cynthia</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20181202</creationdate><title>Reminiscences</title><author>Dwork, Cynthia</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-crossref_primary_10_29012_jpc_7023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dwork, Cynthia</creatorcontrib><collection>CrossRef</collection><jtitle>The journal of privacy and confidentiality</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dwork, Cynthia</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Reminiscences</atitle><jtitle>The journal of privacy and confidentiality</jtitle><date>2018-12-02</date><risdate>2018</risdate><volume>8</volume><issue>1</issue><issn>2575-8527</issn><eissn>2575-8527</eissn><abstract>I first met Steve during a talk I was giving at Carnegie Mellon in 2003 describing very early thoughts on a cryptography-flavored approach to privacy in public databases. Some of these ideas arose during Adam Smith's internship with me at Microsoft. Steve was critical (``Your utility is going to be in the toilet''), but I think he was intrigued by the cryptographic approach, since after the talk he proposed that we have a workshop (``Your bring your guys and I'll bring mine''). This occurred during the summer of 2005 in the hillside town of Bertinoro, Italy. The workshop almost broke down on the second day: the statisticians thought the cryptographers, with their talk of ``the adversary'' and its arbitrary auxiliary information, were completely paranoid, while the cryptographers were frustrated by the absence of a formal notion of privacy and a measure of its loss in the statistical work. Fortunately, there is little to do in Bertinoro at night, other than to drink grappa in the piazza, and this eased the tension considerably. Later in the workshop Steve proposed to Alan Karr and me that we found a journal and, to paraphrase Gertrude Stein, we have and this is it.
</abstract><doi>10.29012/jpc.702</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2575-8527 |
ispartof | The journal of privacy and confidentiality, 2018-12, Vol.8 (1) |
issn | 2575-8527 2575-8527 |
language | eng |
recordid | cdi_crossref_primary_10_29012_jpc_702 |
source | DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
title | Reminiscences |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T05%3A48%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Reminiscences&rft.jtitle=The%20journal%20of%20privacy%20and%20confidentiality&rft.au=Dwork,%20Cynthia&rft.date=2018-12-02&rft.volume=8&rft.issue=1&rft.issn=2575-8527&rft.eissn=2575-8527&rft_id=info:doi/10.29012/jpc.702&rft_dat=%3Ccrossref%3E10_29012_jpc_702%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |