메뉴 건너뛰기




Volumn , Issue , 2010, Pages 79-92

Reconciling belief and vulnerability in information flow

Author keywords

Accuracy; Information flow; Information hiding; Quantitative and probabilistic models; Security; Uncertainty

Indexed keywords

INFORMATION FLOWS; MUTUAL INFORMATIONS; PROBABILISTIC MODELS; SHANNON ENTROPY;

EID: 77955207171     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2010.13     Document Type: Conference Paper
Times cited : (27)

References (38)
  • 2
    • 27244455746 scopus 로고    scopus 로고
    • Probabilistic anonymity
    • Martín Abadi and Luca de Alfaro, editors, Proceedings of CONCUR, Springer
    • Mohit Bhargava and Catuscia Palamidessi. Probabilistic anonymity. In Martín Abadi and Luca de Alfaro, editors, Proceedings of CONCUR, volume 3653 of Lecture Notes in Computer Science, pages 171-185. Springer, 2005. http://www. lix.polytechnique.fr/~catuscia/papers/Anonymity/concur.pdf.
    • (2005) Lecture Notes in Computer Science , vol.3653 , pp. 171-185
    • Bhargava, M.1    Palamidessi, C.2
  • 3
    • 68549126859 scopus 로고    scopus 로고
    • Proceedings of the 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009) Electronic Notes in Theoretical Computer Science Elsevier B.V.
    • Christelle Braun, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. Quantitative notions of leakage for one-try attacks. In Proceedings of the 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009), volume 249 of Electronic Notes in Theoretical Computer Science, pages 75-91. Elsevier B.V., 2009.
    • (2009) Quantitative notions of leakage for one-try attacks , vol.249 , pp. 75-91
    • Braun, C.1    Chatzikokolakis, K.2    Palamidessi, C.3
  • 4
    • 33750488738 scopus 로고    scopus 로고
    • Probable innocence revisited
    • Konstantinos Chatzikokolakis and Catuscia Palamidessi. Probable innocence revisited. Theoretical Computer Science, 367(1-2):123-138, 2006. http://www.lix.polytechnique. fr/~catuscia/papers/Anonymity/tcsPI.pdf.
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 123-138
    • Chatzikokolakis, K.1    Palamidessi, C.2
  • 5
    • 40149107259 scopus 로고    scopus 로고
    • Anonymity protocols as noisy channels
    • Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. Anonymity protocols as noisy channels. Information and Computation, 206(2-4):378-401, 2008. http://www.lix.polytechnique.fr/~catuscia/papers/ Anonymity/Channels/full.pdf.
    • (2008) Information and Computation , vol.206 , Issue.2-4 , pp. 378-401
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 6
    • 40149107259 scopus 로고    scopus 로고
    • Anonymity protocols as noisy channels
    • Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. Anonymity protocols as noisy channels. Inf. Comput., 206(2-4):378-401, 2008.
    • (2008) Inf. Comput. , vol.206 , Issue.2-4 , pp. 378-401
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 8
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • David Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1:65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 9
    • 0345275464 scopus 로고    scopus 로고
    • Quantitative analysis of the leakage of confidential data
    • David Clark, Sebastian Hunt, and Pasquale Malacaria. Quantitative analysis of the leakage of confidential data. Electr. Notes Theor. Comput. Sci., 59(3), 2001.
    • (2001) Electr. Notes Theor. Comput. Sci. , vol.59 , pp. 3
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 11
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • David Clark, Sebastian Hunt, and Pasquale Malacaria. Quantitative information flow, relations and polymorphic types. J. Log. Comput., 15(2): 181-199, 2005.
    • (2005) J. Log. Comput. , vol.15 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 12
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • David Clark, Sebastian Hunt, and Pasquale Malacaria. A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3):321-371, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.3 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 13
    • 0008144263 scopus 로고    scopus 로고
    • A distributed anonymous information storage and retrieval system
    • Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability Springer
    • Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, pages 44-66. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.2009 , pp. 44-66
    • Clarke, I.1    Sandberg, O.2    Wiley, B.3    Theodore, W.4    Freenet, H.5
  • 14
    • 28144442041 scopus 로고    scopus 로고
    • Schneider. Belief in information flow
    • IEEE Computer Society
    • Michael R. Clarkson, Andrew C. Myers, and Fred B. Schneider. Belief in information flow. In CSFW, pages 31-45. IEEE Computer Society, 2005.
    • (2005) CSFW , pp. 31-45
    • Clarkson, M.R.1    Myers, A.C.2    Fred, B.3
  • 15
    • 47249086747 scopus 로고    scopus 로고
    • Schneider. Quantifying information flow with beliefs
    • To appear. Available as Cornell Computer Science Department Technical Report TR
    • Michael R. Clarkson, Andrew C. Myers, and Fred B. Schneider. Quantifying information flow with beliefs. Journal of Computer Security, 2008. To appear. Available as Cornell Computer Science Department Technical Report TR 2007-207.
    • (2008) Journal of Computer Security , pp. 2007-2207
    • Clarkson, M.R.1    Myers, A.C.2    Fred, B.3
  • 19
    • 38149112556 scopus 로고    scopus 로고
    • Attacking unlinkability: The importance of context
    • Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, Springer
    • Matthias Franz, Bernd Meyer, and Andreas Pashalidis. Attacking unlinkability: The importance of context. In Nikita Borisov and Philippe Golle, editors, Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, volume 4776 of Lecture Notes in Computer Science, pages 1-16. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4776 , pp. 1-16
    • Franz, M.1    Meyer, B.2    Pashalidis, A.3
  • 22
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • Dominic Hughes and Vitaly Shmatikov. Information hiding, anonymity and privacy: a modular approach. Journal of Computer Security, 12(1):3-36, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 25
    • 57349116220 scopus 로고    scopus 로고
    • Lagrange multipliers and maximum information leakage in different observational models
    • Úlfar Erlingsson and Marco Pistoia, editor, Tucson, AZ, USA, June 8, 2008 ACM
    • Pasquale Malacaria and Han Chen. Lagrange multipliers and maximum information leakage in different observational models. In Úlfar Erlingsson and Marco Pistoia, editor, Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security (PIAS 2008), pages 135-146, Tucson, AZ, USA, June 8, 2008 2008. ACM.
    • (2008) Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security (PIAS 2008) , pp. 135-146
    • Malacaria, P.1    Chen, H.2
  • 28
    • 1642355346 scopus 로고    scopus 로고
    • Covert channels and anonymizing networks
    • Sushil Jajodia, Pierangela Samarati, and Paul F. Syverson, editors, ACM
    • Ira S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, and Allen R. Miller. Covert channels and anonymizing networks. In Sushil Jajodia, Pierangela Samarati, and Paul F. Syverson, editors, WPES, pages 79-88. ACM, 2003.
    • (2003) WPES , pp. 79-88
    • Moskowitz, I.S.1    Newman, R.E.2    Crepeau, D.P.3    Miller, A.R.4
  • 33
    • 84949756689 scopus 로고    scopus 로고
    • CSP and anonymity
    • Proc. of the European Symposium on Research in Computer Security (ESORICS), Springer
    • Steve Schneider and Abraham Sidiropoulos. CSP and anonymity. In Proc. of the European Symposium on Research in Computer Security (ESORICS), volume 1146 of Lecture Notes in Computer Science, pages 198-218. Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1146 , pp. 198-218
    • Schneider, S.1    Sidiropoulos, A.2
  • 34
    • 41549117992 scopus 로고    scopus 로고
    • Adversaries and information leaks (tutorial)
    • Gilles Barthe and Cédric Fournet, editors, Proceedings of the Third Symposium on Trustworthy Global Computing, Springer
    • Geoffrey Smith. Adversaries and information leaks (tutorial). In Gilles Barthe and Cédric Fournet, editors, Proceedings of the Third Symposium on Trustworthy Global Computing, volume 4912 of Lecture Notes in Computer Science, pages 383-400. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4912 , pp. 383-400
    • Smith, G.1
  • 35
    • 68549087948 scopus 로고    scopus 로고
    • On the foundations of quantitative information flow
    • Luca De Alfaro, editor, Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures (FOSSACS 2009), York, UK, March 2009 Springer
    • Geoffrey Smith. On the foundations of quantitative information flow. In Luca De Alfaro, editor, Proceedings of the Twelfth International Conference on Foundations of Software Science and Computation Structures (FOSSACS 2009), volume 5504 of Lecture Notes in Computer Science, pages 288-302, York, UK, March 2009 2009. Springer.
    • (2009) Lecture Notes in Computer Science , vol.5504 , pp. 288-302
    • Smith, G.1
  • 36
  • 38
    • 27944454436 scopus 로고    scopus 로고
    • Anonymity vs. information leakage in anonymity systems
    • IEEE Computer Society
    • Ye Zhu and Riccardo Bettati. Anonymity vs. information leakage in anonymity systems. In Proc. of ICDCS, pages 514-524. IEEE Computer Society, 2005.
    • (2005) Proc. of ICDCS , pp. 514-524
    • Zhu, Y.1    Bettati, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.