메뉴 건너뛰기




Volumn 6345 LNCS, Issue , 2010, Pages 357-372

On bounding problems of quantitative information flow

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY;

EID: 78049387502     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15497-3_22     Document Type: Conference Paper
Times cited : (18)

References (29)
  • 2
    • 0036039066 scopus 로고    scopus 로고
    • The SLAM project: Debugging system software via static analysis
    • Ball, T., Rajamani, S. K.: The SLAM project: debugging system software via static analysis. In: POPL, pp. 1-3 (2002)
    • (2002) POPL , pp. 1-3
    • Ball, T.1    Rajamani, S.K.2
  • 3
    • 4944265699 scopus 로고    scopus 로고
    • Secure information flow by self-composition
    • Barthe, G., D'Argenio, P. R., Rezk, T.: Secure information flow by self-composition. In: CSFW, pp. 100-114 (2004)
    • (2004) CSFW , pp. 100-114
    • Barthe, G.1    D'Argenio, P.R.2    Rezk, T.3
  • 4
    • 35348951470 scopus 로고    scopus 로고
    • The software model checker Blast
    • Beyer, D., Henzinger, T. A., Jhala, R., Majumdar, R.: The software model checker Blast. STTT 9 (5-6), 505-525 (2007)
    • (2007) STTT , vol.9 , Issue.5-6 , pp. 505-525
    • Beyer, D.1    Henzinger, T.A.2    Jhala, R.3    Majumdar, R.4
  • 6
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security 15(3), 321-371 (2007)
    • (2007) Journal of Computer Security , vol.15 , Issue.3 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 9
    • 84976675687 scopus 로고
    • Information transmission in computational systems
    • Cohen, E. S.: Information transmission in computational systems. In: SOSP, pp. 133-139 (1977)
    • (1977) SOSP , pp. 133-139
    • Cohen, E.S.1
  • 10
    • 24644445710 scopus 로고    scopus 로고
    • A theorem proving approach to analysis of secure information flow
    • Hutter, D., Ullmann, M. eds., Springer, Heidelberg
    • Darvas, Á., Hähnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 193-209. Springer, Heidelberg (2005)
    • (2005) SPC 2005. LNCS , vol.3450 , pp. 193-209
    • Darvas, Á.1    Hähnle, R.2    Sands, D.3
  • 11
    • 0004238984 scopus 로고
    • Addison-Wesley Longman Publishing Co., Inc., Amsterdam
    • Denning, D. E. R.: Cryptography and data security. Addison-Wesley Longman Publishing Co., Inc., Amsterdam (1982)
    • (1982) Cryptography and Data Security
    • Denning, D.E.R.1
  • 14
    • 67650696756 scopus 로고    scopus 로고
    • An information-theoretic model for adaptive side-channel attacks
    • Köpf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: CCS, pp. 286-296 (2007)
    • (2007) CCS , pp. 286-296
    • Köpf, B.1    Basin, D.2
  • 15
    • 34548282543 scopus 로고    scopus 로고
    • Assessing security threats of looping constructs
    • Malacaria, P.: Assessing security threats of looping constructs. In: POPL, pp. 225-235 (2007)
    • (2007) POPL , pp. 225-235
    • Malacaria, P.1
  • 16
    • 57349116220 scopus 로고    scopus 로고
    • Lagrange multipliers and maximum information leakage in different observational models
    • Malacaria, P., Chen, H.: Lagrange multipliers and maximum information leakage in different observational models. In: PLAS, pp. 135-146 (2008)
    • (2008) PLAS , pp. 135-146
    • Malacaria, P.1    Chen, H.2
  • 17
    • 84894313462 scopus 로고
    • Guessing and entropy
    • Massey, J. L.: Guessing and entropy. In: ISIT, p. 204 (1994)
    • (1994) ISIT , pp. 204
    • Massey, J.L.1
  • 18
    • 57349180506 scopus 로고    scopus 로고
    • Quantitative information flow as network flow capacity
    • McCamant, S., Ernst, M. D.: Quantitative information flow as network flow capacity. In: PLDI, pp. 193-205 (2008)
    • (2008) PLDI , pp. 193-205
    • McCamant, S.1    Ernst, M.D.2
  • 19
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: IEEE Security and Privacy, pp. 79-93 (1994)
    • (1994) IEEE Security and Privacy , pp. 79-93
    • McLean, J.1
  • 20
    • 33749856863 scopus 로고    scopus 로고
    • Lazy abstraction with interpolants
    • Ball, T., Jones, R. B. eds., Springer, Heidelberg
    • McMillan, K. L.: Lazy abstraction with interpolants. In: Ball, T., Jones, R. B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 123-136. Springer, Heidelberg (2006)
    • (2006) CAV 2006. LNCS , vol.4144 , pp. 123-136
    • McMillan, K.L.1
  • 21
    • 33750232981 scopus 로고    scopus 로고
    • From coupling relations to mated invariants for checking information flow
    • Gollmann, D., Meier, J., Sabelfeld, A. eds., Springer, Heidelberg
    • Naumann, D. A.: From coupling relations to mated invariants for checking information flow. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 279-296. Springer, Heidelberg (2006)
    • (2006) ESORICS 2006. LNCS , vol.4189 , pp. 279-296
    • Naumann, D.A.1
  • 22
    • 70450252184 scopus 로고    scopus 로고
    • Measuring channel capacity to distinguish undue influence
    • Newsome, J., McCamant, S., Song, D.: Measuring channel capacity to distinguish undue influence. In: PLAS, pp. 73-85 (2009)
    • (2009) PLAS , pp. 73-85
    • Newsome, J.1    McCamant, S.2    Song, D.3
  • 23
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Shannon, C.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423, 623-656 (1948)
    • (1948) Bell System Technical Journal , vol.27 , Issue.379-423 , pp. 623-656
    • Shannon, C.1
  • 24
    • 68549087948 scopus 로고    scopus 로고
    • On the foundations of quantitative information flow
    • de Alfaro, L. ed., Springer, Heidelberg
    • Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288-302. Springer, Heidelberg (2009)
    • (2009) FOSSACS 2009. LNCS , vol.5504 , pp. 288-302
    • Smith, G.1
  • 25
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • Hankin, C., Siveroni, I. eds., Springer, Heidelberg
    • Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol. 3672, pp. 352-367. Springer, Heidelberg (2005)
    • (2005) SAS 2005. LNCS , vol.3672 , pp. 352-367
    • Terauchi, T.1    Aiken, A.2
  • 26
    • 0026239342 scopus 로고
    • PP is as hard as the polynomial-time hierarchy
    • Toda, S.: PP is as hard as the polynomial-time hierarchy. SIAM J. Comput. 20(5), 865-877 (1991)
    • (1991) SIAM J. Comput. , vol.20 , Issue.5 , pp. 865-877
    • Toda, S.1
  • 27
    • 33745935759 scopus 로고    scopus 로고
    • Combining type-based analysis and model checking for finding counterexamples against non-interference
    • Unno, H., Kobayashi, N., Yonezawa, A.: Combining type-based analysis and model checking for finding counterexamples against non-interference. In: PLAS, pp. 17-26 (2006)
    • (2006) PLAS , pp. 17-26
    • Unno, H.1    Kobayashi, N.2    Yonezawa, A.3
  • 29
    • 78049397439 scopus 로고    scopus 로고
    • Quantitative information flow - Verification hardness and possibilities
    • Yasuoka, H., Terauchi, T.: Quantitative information flow - verification hardness and possibilities. In: CSF (2010)
    • (2010) CSF
    • Yasuoka, H.1    Terauchi, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.