What You Lose is What You Leak: Information Leakage in Declassification Policies
DOI10.1016/J.ENTCS.2007.02.027zbMATH Open1316.68040OpenAlexW2108074136WikidataQ62046234 ScholiaQ62046234MaRDI QIDQ5262929FDOQ5262929
Anindya Banerjee, Isabella Mastroeni, Roberto Giacobazzi
Publication date: 10 July 2015
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.entcs.2007.02.027
Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30) Semantics in the theory of computing (68Q55)
Cites Work
- The octagon abstract domain
- ``A la Burstall intermittent assertions induction principles for proving inevitability properties of programs
- Preserving Secrecy Under Refinement
- Title not available (Why is that?)
- Making abstract interpretations complete
- Comparing Completeness Properties of Static Analyses and Their Logics
- A semantic approach to secure information flow
- A per model of secure information flow in sequential programs
- Downgrading policies and relaxed noninterference
- Abstract non-interference
- Constructive design of a hierarchy of semantics of a transition system by abstract interpretation
- Programming Languages and Systems
- Tools and Algorithms for the Construction and Analysis of Systems
- Static Analysis
- Programming Languages and Systems
Cited In (2)
This page was built for publication: What You Lose is What You Leak: Information Leakage in Declassification Policies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5262929)