Assessing security threats of looping constructs
From MaRDI portal
Publication:3189801
DOI10.1145/1190216.1190251zbMath1295.68089MaRDI QIDQ3189801
Publication date: 12 September 2014
Published in: Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1190216.1190251
68Q55: Semantics in the theory of computing
68P30: Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science)
68N30: Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.)
Related Items
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption, Min-entropy as a resource, Information hiding in probabilistic concurrent systems, Probabilistic and nondeterministic aspects of anonymity, Quantifying information leakage in process calculi, Quantitative information flow as safety and liveness hyperproperties, Formalization of Entropy Measures in HOL, Quantitative Information Flow and Applications to Differential Privacy, Information Theory and Security: Quantitative Information Flow, On the Foundations of Quantitative Information Flow