메뉴 건너뛰기




Volumn , Issue , 2008, Pages 135-146

Lagrange multipliers and maximum information leakage in different observational models

Author keywords

Information theory; Lagrange multipliers; Security

Indexed keywords

INFORMATION LEAKAGES; LINEAR OPTIMIZATIONS; OBSERVATIONAL MODELS; QUANTITATIVE DEFINITIONS; SECURITY; UNIFORM DISTRIBUTIONS;

EID: 57349116220     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1375696.1375713     Document Type: Conference Paper
Times cited : (56)

References (22)
  • 1
    • 33746371722 scopus 로고    scopus 로고
    • Quantifying Information Leakage in Process Calculi
    • Michele Boreale: Quantifying Information Leakage in Process Calculi. ICALP (2) 2006: 119-131
    • (2006) ICALP , vol.2 , pp. 119-131
    • Michele Boreale1
  • 2
    • 35048848903 scopus 로고    scopus 로고
    • Anonymity Protocols as Noisy Channels
    • Postproceedings of the Symp. on Trustworthy Global Computing, Springer
    • K. Chatzikokolakis, C. Palamidessi, P. Panangaden. Anonymity Protocols as Noisy Channels, in: Postproceedings of the Symp. on Trustworthy Global Computing, Lecture Notes in Computer Science, Springer, 2006,
    • (2006) Lecture Notes in Computer Science
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 3
    • 84889281816 scopus 로고    scopus 로고
    • T.Cover, J. Thomas. Elements of Information Theory. Wiley
    • T.Cover, J. Thomas. Elements of Information Theory. Wiley
  • 4
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • David Clark, Sebastian Hunt, Pasquale Malacaria: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, Volume 15, Number 3 / 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.3
    • Clark, D.1    Sebastian Hunt, P.M.2
  • 8
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning: A lattice model of secure information flow. Communications of the ACM, 19(5), May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 10
    • 0026157130 scopus 로고    scopus 로고
    • James W Gray III: Toward a methematical foundataion for information flow security. Proc. 1991 IEEE Symposium on Security and Privacy. Oakland, California, May 1991.
    • James W Gray III: Toward a methematical foundataion for information flow security. Proc. 1991 IEEE Symposium on Security and Privacy. Oakland, California, May 1991.
  • 12
    • 24144492346 scopus 로고    scopus 로고
    • Kevin R. O'Neill: Anonymity and information hiding in multiagent systems
    • Joseph Y. Halpern, Kevin R. O'Neill: Anonymity and information hiding in multiagent systems. Journal of Computer Security 13(3): 483-512 (2005)
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 483-512
    • Halpern, J.Y.1
  • 13
    • 57349089633 scopus 로고    scopus 로고
    • Measuring Insecurity of Programs
    • Manuscript
    • J.Heusser and P. Malacaria: Measuring Insecurity of Programs. Manuscript 2007.
    • (2007)
    • Heusser, J.1    Malacaria, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.