메뉴 건너뛰기




Volumn , Issue , 2009, Pages 49-57

Quantitative analysis of secure information flow via probabilistic semantics

Author keywords

Flow; Information theory; Language; Non interference; Security; Semantics

Indexed keywords

FLOW; GENERALIZED DISTRIBUTION; INFORMATION FLOWS; LANGUAGE; NON-INTERFERENCE; PROBABILISTIC SEMANTICS; QUANTITATIVE ANALYSIS; SECURE INFORMATION FLOW; SECURITY; SEMANTIC FUNCTIONS; SOFTWARE SYSTEMS;

EID: 70349662494     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2009.88     Document Type: Conference Paper
Times cited : (18)

References (22)
  • 1
    • 33746371722 scopus 로고    scopus 로고
    • Quantifying information leakage in process calculi.In
    • Michele Boreale. Quantifying information leakage in process calculi.In ICALP (2), pages 119-131, 2006.
    • (2006) ICALP , vol.2 , pp. 119-131
    • Boreale, M.1
  • 3
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • David Clark, Sebastian Hunt, and Pasquale Malacaria. Quantitative information flow, relations and polymorphic types. J. Log. and Comput., 15(2):181-199, 2005.
    • (2005) J. Log. and Comput , vol.15 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 4
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • David Clark, Sebastian Hunt, and Pasquale Malacaria. A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15:321-371, 2007.
    • (2007) Journal of Computer Security , vol.15 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure informatin flow
    • May
    • D. E. R. Denning. A lattice model of secure informatin flow. Communications of the ACM, 19(5):236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.R.1
  • 8
    • 0020299523 scopus 로고
    • Security policies and security models
    • IEEE Computer Society Press
    • J. Goguen and J. Meseguer. Security policies and security models. In IEEE Symposium on Security and privacy, pages 11-20. IEEE Computer Society Press, 1982.
    • (1982) IEEE Symposium on Security and privacy , pp. 11-20
    • Goguen, J.1    Meseguer, J.2
  • 9
    • 0026157130 scopus 로고
    • Toward a mathematical foundation for informatin flow security
    • Oakland, California
    • James W. III Gray. Toward a mathematical foundation for informatin flow security. In IEEE Security and Privacy, pages 21-35, Oakland, California, 1991.
    • (1991) IEEE Security and Privacy , pp. 21-35
    • Gray III, J.W.1
  • 10
  • 11
    • 3042651614 scopus 로고    scopus 로고
    • Defining information flow quantity
    • Gavin Lowe. Defining information flow quantity. Journal of Computer Security, 12(3-4):619-653, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 619-653
    • Lowe, G.1
  • 17
    • 84948746951 scopus 로고    scopus 로고
    • Approximate non-interference
    • Alessandra Di Pierro, Chris Hankin, and Herbert Wiklicky. Approximate non-interference. In CSFW, pages 3-17, 2002.
    • (2002) CSFW , pp. 3-17
    • Di Pierro, A.1    Hankin, C.2    Wiklicky, H.3
  • 19
    • 0003981318 scopus 로고
    • North-Holland Publishing Company
    • Alfred Renyi. Probability theory. North-Holland Publishing Company, 1970.
    • (1970) Probability theory
    • Renyi, A.1
  • 21
    • 0344412450 scopus 로고
    • Quantitative hook-up security for covert channel analysis
    • Douglas G. Weber. Quantitative hook-up security for covert channel analysis. In CSFW 1988, 1988.
    • (1988) CSFW 1988
    • Weber, D.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.