What You Lose is What You Leak: Information Leakage in Declassification Policies
From MaRDI portal
Publication:5262929
DOI10.1016/j.entcs.2007.02.027zbMath1316.68040OpenAlexW2108074136WikidataQ62046234 ScholiaQ62046234MaRDI QIDQ5262929
Anindya Banerjee, Isabella Mastroeni, Roberto Giacobazzi
Publication date: 10 July 2015
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.entcs.2007.02.027
Semantics in the theory of computing (68Q55) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Related Items (2)
Transforming Abstract Interpretations by Abstract Interpretation ⋮ Deriving Bisimulations by Simplifying Partitions
Cites Work
- Unnamed Item
- ``A la Burstall intermittent assertions induction principles for proving inevitability properties of programs
- The octagon abstract domain
- A semantic approach to secure information flow
- Constructive design of a hierarchy of semantics of a transition system by abstract interpretation
- Abstract non-interference
- Preserving Secrecy Under Refinement
- Downgrading policies and relaxed noninterference
- Programming Languages and Systems
- Making abstract interpretations complete
- Comparing Completeness Properties of Static Analyses and Their Logics
- Programming Languages and Systems
- Tools and Algorithms for the Construction and Analysis of Systems
- Static Analysis
- A per model of secure information flow in sequential programs
This page was built for publication: What You Lose is What You Leak: Information Leakage in Declassification Policies