Abstractions of non-interference security: probabilistic versus possibilistic
DOI10.1007/S00165-012-0237-4zbMATH Open1323.68212OpenAlexW2005567332MaRDI QIDQ2018754FDOQ2018754
Annabelle McIver, A. Sloane, Thai Son Hoang, Carroll Morgan, E. Susatyo, Larissa A. Meinicke
Publication date: 25 March 2015
Published in: Formal Aspects of Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00165-012-0237-4
Probability in computer science (algorithm analysis, random structures, phase transitions, etc.) (68Q87) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Mathematical Theory of Communication
- Refinement Calculus
- The random oracle methodology, revisited
- The B-Book
- The dining cryptographers problem: Unconditional sender and recipient untraceability
- A theoretical basis for stepwise refinement and the programming calculus
- A Proof System for Information Flow Security
- The Shadow Knows: Refinement of Ignorance in Sequential Programs
- Computing the Leakage of Information-Hiding Systems
- Information Theory and Security: Quantitative Information Flow
- On the security of public key protocols
- A semantic approach to secure information flow
- The Thousand-and-One Cryptographers
- The Secret Art of Computer Programming
- Compositional refinement in agent-based security protocols
- The shadow knows: refinement and security in sequential programs
- Private information retrieval
- Preservation of probabilistic information flow under refinement
- Compositional Closure for Bayes Risk in Probabilistic Noninterference
- Computational Probabilistic Non-interference
- Hidden-Markov program algebra with iteration
Cited In (4)
Uses Software
This page was built for publication: Abstractions of non-interference security: probabilistic versus possibilistic
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2018754)