메뉴 건너뛰기




Volumn 7, Issue 3, 2008, Pages 219-242

Estimating the maximum information leakage

Author keywords

Approximate noninterference; Bisimulation semantics; Covert channels; Probabilistic models; Process algebra

Indexed keywords

ALGEBRA; COMPUTER SIMULATION; MATHEMATICAL MODELS; PROBABILITY; SEMANTICS;

EID: 44249128398     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-007-0050-x     Document Type: Article
Times cited : (19)

References (39)
  • 1
    • 33748744443 scopus 로고    scopus 로고
    • Classification of security properties in a linda-like process algebra
    • Aldini A. (2006). Classification of security properties in a linda-like process algebra. Sci. Comput. Program. 63: 16-38
    • (2006) Sci. Comput. Program. , vol.63 , pp. 16-38
    • Aldini, A.1
  • 4
    • 3042529082 scopus 로고    scopus 로고
    • A process algebraic approach for the analysis of probabilistic non-inetrference
    • Aldini A., Bravetti M. and Gorrieri R. (2004). A process algebraic approach for the analysis of probabilistic non-inetrference. J. Comput. Security 12(1): 191-245
    • (2004) J. Comput. Security , vol.12 , Issue.1 , pp. 191-245
    • Aldini, A.1    Bravetti, M.2    Gorrieri, R.3
  • 12
    • 0037209771 scopus 로고    scopus 로고
    • Disete time generative-reactive probabilistic processes with different advancing speeds
    • Bravetti M. and Aldini A. (2003). Disete time generative-reactive probabilistic processes with different advancing speeds. Theor. Comput. Sci. 290: 355-406
    • (2003) Theor. Comput. Sci. , vol.290 , pp. 355-406
    • Bravetti, M.1    Aldini, A.2
  • 13
    • 44249107424 scopus 로고    scopus 로고
    • Using probabilistic I/O automata to improve the analysis of cryptographic protocols
    • Canetti R., Cheung L., Kaynar D., Liskov M., Lynch N., Pereira O. and Segala R. (2005). Using probabilistic I/O automata to improve the analysis of cryptographic protocols. ERCIM News 63: 40-41
    • (2005) ERCIM News , vol.63 , pp. 40-41
    • Canetti, R.1    Cheung, L.2    Kaynar, D.3    Liskov, M.4    Lynch, N.5    Pereira, O.6    Segala, R.7
  • 17
    • 84974776068 scopus 로고
    • A classification of security properties
    • Focardi R. and Gorrieri R. (1995). A classification of security properties. J. Comput. Security 3: 5-33
    • (1995) J. Comput. Security , vol.3 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 18
    • 84864840163 scopus 로고    scopus 로고
    • Focardi, R., Gorrieri, R. (eds.): Springer
    • Focardi, R., Gorrieri, R. (eds.): Lecture Notes in Computer Science, vol. 2946. Springer (2004)
    • (2004) Lecture Notes in Computer Science , vol.2946
  • 19
    • 35048815468 scopus 로고    scopus 로고
    • Classification of security properties (part ii: Network security)
    • In: [18]
    • Focardi, R., Gorrieri, R., Martinelli, F.: Classification of security properties (part ii: Network security). In: Focardi and Gorrieri [18], pp. 139-185
    • Focardi and Gorrieri , pp. 139-185
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 30
    • 0035067847 scopus 로고    scopus 로고
    • Process algebra and non-interference
    • Special Issue on CSFW-12
    • Ryan, P., Schneider, S.: Process algebra and non-interference. J. Comput. Security 9 (1/2), 75-103 (2001). Special Issue on CSFW-12
    • (2001) J. Comput. Security , vol.9 , Issue.1-2 , pp. 75-103
    • Ryan, P.1    Schneider, S.2
  • 33
    • 0004181981 scopus 로고
    • Modeling and verification of randomized distributed real-time systems
    • Ph.D. thesis, MIT, Boston (MA)
    • Segala, R.: Modeling and verification of randomized distributed real-time systems. Ph.D. thesis, MIT, Boston (MA) (1995)
    • (1995)
    • Segala, R.1
  • 34
    • 0001609136 scopus 로고
    • Probabilistic simulations for probabilistic processes
    • Segala R. and Lynch N. (1995). Probabilistic simulations for probabilistic processes. Nordic J. Comput. 2: 250-273
    • (1995) Nordic J. Comput. , vol.2 , pp. 250-273
    • Segala, R.1    Lynch, N.2
  • 35
  • 36
    • 0006419926 scopus 로고
    • Reactive, generative and stratified models of probabilistic processes
    • van Glabbeek R., Smolka S. and Steffen B. (1995). Reactive, generative and stratified models of probabilistic processes. Inf. Comput. 121: 59-80
    • (1995) Inf. Comput. , vol.121 , pp. 59-80
    • van Glabbeek, R.1    Smolka, S.2    Steffen, B.3
  • 38
    • 0031125422 scopus 로고    scopus 로고
    • Composition and behaviors of probabilistic i/o automata
    • Wu S., Smolka S. and Stark E. (1997). Composition and behaviors of probabilistic i/o automata. Theor. Comput. Sci. 176: 1-38
    • (1997) Theor. Comput. Sci. , vol.176 , pp. 1-38
    • Wu, S.1    Smolka, S.2    Stark, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.