Computing the Leakage of Information-Hiding Systems
From MaRDI portal
Publication:3557088
DOI10.1007/978-3-642-12002-2_32zbMath1284.68161OpenAlexW2109957487MaRDI QIDQ3557088
No author found.
Publication date: 27 April 2010
Published in: Tools and Algorithms for the Construction and Analysis of Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-12002-2_32
Formal languages and automata (68Q45) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Related Items (11)
Min-entropy as a resource ⋮ Compositional methods for information-hiding ⋮ Quantitative information flow as safety and liveness hyperproperties ⋮ On the Relation between Differential Privacy and Quantitative Information Flow ⋮ Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract) ⋮ Preface to the special issue on quantitative information flow ⋮ A semiring-based trace semantics for processes with applications to information leakage analysis ⋮ Asymptotic information leakage under one-try attacks ⋮ Quantifying opacity ⋮ Abstractions of non-interference security: probabilistic versus possibilistic ⋮ An algebraic approach for reasoning about information flow
This page was built for publication: Computing the Leakage of Information-Hiding Systems