Reminiscences

I first met Steve during a talk I was giving at Carnegie Mellon in 2003 describing very early thoughts on a cryptography-flavored approach to privacy in public databases.  Some of these ideas arose during Adam Smith's internship with me at Microsoft.  Steve was critical (``Your utility is going...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:The journal of privacy and confidentiality 2018-12, Vol.8 (1)
1. Verfasser: Dwork, Cynthia
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page
container_title The journal of privacy and confidentiality
container_volume 8
creator Dwork, Cynthia
description I first met Steve during a talk I was giving at Carnegie Mellon in 2003 describing very early thoughts on a cryptography-flavored approach to privacy in public databases.  Some of these ideas arose during Adam Smith's internship with me at Microsoft.  Steve was critical (``Your utility is going to be in the toilet''), but I think he was intrigued by the cryptographic approach, since after the talk he proposed that we have a workshop (``Your bring your guys and I'll bring mine'').  This occurred during the summer of 2005 in the hillside town of Bertinoro, Italy.  The workshop almost broke down on the second day: the statisticians thought the cryptographers, with their talk of ``the adversary'' and its arbitrary auxiliary information, were completely paranoid, while the cryptographers were frustrated by the absence of a formal notion of privacy and a measure of its loss in the statistical work.  Fortunately, there is little to do in Bertinoro at night, other than to drink grappa in the piazza, and this eased the tension considerably.  Later in the workshop Steve proposed to Alan Karr and me that we found a journal and, to paraphrase Gertrude Stein, we have and this is it.  
doi_str_mv 10.29012/jpc.702
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_29012_jpc_702</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_29012_jpc_702</sourcerecordid><originalsourceid>FETCH-crossref_primary_10_29012_jpc_7023</originalsourceid><addsrcrecordid>eNpjYBAwNNAzsjQwNNLPKkjWMzcwYmLgNDI1N9W1MDUyZ0FiczDwFhdnGRgYGFmYm5hYGnEy8Aal5mbmZRYnp-YlpxbzMLCmJeYUp_JCaW4GDTfXEGcP3eSi_OLiotS0-IKizNzEosp4Q4N4sI3xQBvjgTYak6AUAK26L4U</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Reminiscences</title><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Dwork, Cynthia</creator><creatorcontrib>Dwork, Cynthia</creatorcontrib><description>I first met Steve during a talk I was giving at Carnegie Mellon in 2003 describing very early thoughts on a cryptography-flavored approach to privacy in public databases.  Some of these ideas arose during Adam Smith's internship with me at Microsoft.  Steve was critical (``Your utility is going to be in the toilet''), but I think he was intrigued by the cryptographic approach, since after the talk he proposed that we have a workshop (``Your bring your guys and I'll bring mine'').  This occurred during the summer of 2005 in the hillside town of Bertinoro, Italy.  The workshop almost broke down on the second day: the statisticians thought the cryptographers, with their talk of ``the adversary'' and its arbitrary auxiliary information, were completely paranoid, while the cryptographers were frustrated by the absence of a formal notion of privacy and a measure of its loss in the statistical work.  Fortunately, there is little to do in Bertinoro at night, other than to drink grappa in the piazza, and this eased the tension considerably.  Later in the workshop Steve proposed to Alan Karr and me that we found a journal and, to paraphrase Gertrude Stein, we have and this is it.  </description><identifier>ISSN: 2575-8527</identifier><identifier>EISSN: 2575-8527</identifier><identifier>DOI: 10.29012/jpc.702</identifier><language>eng</language><ispartof>The journal of privacy and confidentiality, 2018-12, Vol.8 (1)</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,864,27924,27925</link.rule.ids></links><search><creatorcontrib>Dwork, Cynthia</creatorcontrib><title>Reminiscences</title><title>The journal of privacy and confidentiality</title><description>I first met Steve during a talk I was giving at Carnegie Mellon in 2003 describing very early thoughts on a cryptography-flavored approach to privacy in public databases.  Some of these ideas arose during Adam Smith's internship with me at Microsoft.  Steve was critical (``Your utility is going to be in the toilet''), but I think he was intrigued by the cryptographic approach, since after the talk he proposed that we have a workshop (``Your bring your guys and I'll bring mine'').  This occurred during the summer of 2005 in the hillside town of Bertinoro, Italy.  The workshop almost broke down on the second day: the statisticians thought the cryptographers, with their talk of ``the adversary'' and its arbitrary auxiliary information, were completely paranoid, while the cryptographers were frustrated by the absence of a formal notion of privacy and a measure of its loss in the statistical work.  Fortunately, there is little to do in Bertinoro at night, other than to drink grappa in the piazza, and this eased the tension considerably.  Later in the workshop Steve proposed to Alan Karr and me that we found a journal and, to paraphrase Gertrude Stein, we have and this is it.  </description><issn>2575-8527</issn><issn>2575-8527</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNpjYBAwNNAzsjQwNNLPKkjWMzcwYmLgNDI1N9W1MDUyZ0FiczDwFhdnGRgYGFmYm5hYGnEy8Aal5mbmZRYnp-YlpxbzMLCmJeYUp_JCaW4GDTfXEGcP3eSi_OLiotS0-IKizNzEosp4Q4N4sI3xQBvjgTYak6AUAK26L4U</recordid><startdate>20181202</startdate><enddate>20181202</enddate><creator>Dwork, Cynthia</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20181202</creationdate><title>Reminiscences</title><author>Dwork, Cynthia</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-crossref_primary_10_29012_jpc_7023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dwork, Cynthia</creatorcontrib><collection>CrossRef</collection><jtitle>The journal of privacy and confidentiality</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dwork, Cynthia</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Reminiscences</atitle><jtitle>The journal of privacy and confidentiality</jtitle><date>2018-12-02</date><risdate>2018</risdate><volume>8</volume><issue>1</issue><issn>2575-8527</issn><eissn>2575-8527</eissn><abstract>I first met Steve during a talk I was giving at Carnegie Mellon in 2003 describing very early thoughts on a cryptography-flavored approach to privacy in public databases.  Some of these ideas arose during Adam Smith's internship with me at Microsoft.  Steve was critical (``Your utility is going to be in the toilet''), but I think he was intrigued by the cryptographic approach, since after the talk he proposed that we have a workshop (``Your bring your guys and I'll bring mine'').  This occurred during the summer of 2005 in the hillside town of Bertinoro, Italy.  The workshop almost broke down on the second day: the statisticians thought the cryptographers, with their talk of ``the adversary'' and its arbitrary auxiliary information, were completely paranoid, while the cryptographers were frustrated by the absence of a formal notion of privacy and a measure of its loss in the statistical work.  Fortunately, there is little to do in Bertinoro at night, other than to drink grappa in the piazza, and this eased the tension considerably.  Later in the workshop Steve proposed to Alan Karr and me that we found a journal and, to paraphrase Gertrude Stein, we have and this is it.  </abstract><doi>10.29012/jpc.702</doi></addata></record>
fulltext fulltext
identifier ISSN: 2575-8527
ispartof The journal of privacy and confidentiality, 2018-12, Vol.8 (1)
issn 2575-8527
2575-8527
language eng
recordid cdi_crossref_primary_10_29012_jpc_702
source DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
title Reminiscences
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T05%3A48%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Reminiscences&rft.jtitle=The%20journal%20of%20privacy%20and%20confidentiality&rft.au=Dwork,%20Cynthia&rft.date=2018-12-02&rft.volume=8&rft.issue=1&rft.issn=2575-8527&rft.eissn=2575-8527&rft_id=info:doi/10.29012/jpc.702&rft_dat=%3Ccrossref%3E10_29012_jpc_702%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true