On the Foundations of Quantitative Information Flow
From MaRDI portal
Publication:3617736
DOI10.1007/978-3-642-00596-1_21zbMath1234.68101OpenAlexW2097151854MaRDI QIDQ3617736
No author found.
Publication date: 31 March 2009
Published in: Foundations of Software Science and Computational Structures (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00596-1_21
Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Information theory (general) (94A15)
Related Items (44)
Quantifying leakage in the presence of unreliable sources of information ⋮ Algebra for Quantitative Information Flow ⋮ Probabilistic and nondeterministic aspects of anonymity ⋮ Automation of Quantitative Information-Flow Analysis ⋮ Complexity and resource bound analysis of imperative programs using difference constraints ⋮ Min-entropy as a resource ⋮ Thermodynamic aspects of confidentiality ⋮ Hybrid statistical estimation of mutual information and its application to information flow ⋮ Security of Numerical Sensors in Automata ⋮ Upper bound computation of information leakages for unbounded recursion ⋮ An axiomatization of information flow measures ⋮ An automated quantitative information flow analysis for concurrent programs ⋮ On the Additive Capacity Problem for Quantitative Information Flow ⋮ Program algebra for quantitative information flow ⋮ Searching secrets rationally ⋮ Utility/privacy trade-off as regularized optimal transport ⋮ Compositional methods for information-hiding ⋮ Maximizing entropy over Markov processes ⋮ Precise quantitative information flow analysis -- a symbolic approach ⋮ Quantitative information flow as safety and liveness hyperproperties ⋮ Quantifying Vulnerability of Secret Generation Using Hyper-Distributions ⋮ Secure Multi-party Computation: Information Flow of Outputs and Game Theory ⋮ Security Analysis of Cache Replacement Policies ⋮ Compositional Synthesis of Leakage Resilient Programs ⋮ Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows ⋮ Analyzing anonymity attacks through noisy channels ⋮ On the Relation between Differential Privacy and Quantitative Information Flow ⋮ Conditional anonymity with non-probabilistic adversary ⋮ Unnamed Item ⋮ Information Theory and Security: Quantitative Information Flow ⋮ Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms ⋮ Preface to the special issue on quantitative information flow ⋮ Asymptotic information leakage under one-try attacks ⋮ An analysis of trust in anonymity networks in the presence of adaptive attackers ⋮ Information hiding in probabilistic concurrent systems ⋮ An algebraic approach for reasoning about information flow ⋮ Attainable unconditional security for shared-key cryptosystems ⋮ Evaluation of anonymity and confidentiality protocols using theorem proving ⋮ Quantitative Notions of Leakage for One-try Attacks ⋮ Worst- and average-case privacy breaches in randomization mechanisms ⋮ Quantifying information leakage of randomized protocols ⋮ Quantitative Information Flow and Applications to Differential Privacy ⋮ On Privacy and Accuracy in Data Releases (Invited Paper) ⋮ Sampling automata and programs
Cites Work
- A Mathematical Theory of Communication
- Anonymity protocols as noisy channels
- Quantitative Information Flow, Relations and Polymorphic Types
- Assessing security threats of looping constructs
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Elements of Information Theory
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: On the Foundations of Quantitative Information Flow