What you lose is what you leak: information leakage in declassification policies
DOI10.1016/J.ENTCS.2007.02.027zbMATH Open1316.68040OpenAlexW2108074136WikidataQ62046234 ScholiaQ62046234MaRDI QIDQ5262929FDOQ5262929
Authors: Anindya Banerjee, Roberto Giacobazzi, Isabella Mastroeni
Publication date: 10 July 2015
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.entcs.2007.02.027
Recommendations
Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30) Semantics in the theory of computing (68Q55)
Cites Work
- The octagon abstract domain
- ``A la Burstall intermittent assertions induction principles for proving inevitability properties of programs
- Preserving Secrecy Under Refinement
- Title not available (Why is that?)
- Making abstract interpretations complete
- Comparing Completeness Properties of Static Analyses and Their Logics
- A semantic approach to secure information flow
- A per model of secure information flow in sequential programs
- Downgrading policies and relaxed noninterference
- Abstract non-interference
- Constructive design of a hierarchy of semantics of a transition system by abstract interpretation
- Programming Languages and Systems
- Tools and Algorithms for the Construction and Analysis of Systems
- Static Analysis
- Programming Languages and Systems
Cited In (5)
This page was built for publication: What you lose is what you leak: information leakage in declassification policies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5262929)