Quantification of integrity
From MaRDI portal
Publication:5740622
DOI10.1017/S0960129513000595zbMath1361.68080MaRDI QIDQ5740622
Michael R. Clarkson, Fred B. Schneider
Publication date: 27 July 2016
Published in: Mathematical Structures in Computer Science (Search for Journal in Brave)
Database theory (68P15) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Related Items (5)
Quantifying leakage in the presence of unreliable sources of information ⋮ Squeeziness: an information theoretic measure for avoiding fault masking ⋮ Quantifying Vulnerability of Secret Generation Using Hyper-Distributions ⋮ On the Relation between Differential Privacy and Quantitative Information Flow ⋮ Quantitative Information Flow and Applications to Differential Privacy
Uses Software
Cites Work
- A Mathematical Theory of Communication
- Semantics of probabilistic programs
- A semantic approach to secure information flow
- Anonymity protocols as noisy channels
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
- ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION
- A per model of secure information flow in sequential programs
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Quantification of integrity