메뉴 건너뛰기




Volumn 25, Issue 2, 2015, Pages 361-403

Quantifying opacity

Author keywords

[No Author keywords available]

Indexed keywords

RANDOM VARIABLES;

EID: 84921048470     PISSN: 09601295     EISSN: None     Source Type: Journal    
DOI: 10.1017/S0960129513000637     Document Type: Article
Times cited : (55)

References (33)
  • 1
    • 70349333862 scopus 로고    scopus 로고
    • A general framework for nondeterministic, probabilistic, and stochastic noninterference
    • Degano, P. and Viganò , L. (eds.)
    • Aldini, A. and Bernardo, M. (2009) A general framework for nondeterministic, probabilistic, and stochastic noninterference. In: Degano, P. and Viganò , L. (eds.) Proceedings of Foundations and Applications of Security Analysis;
    • (2009) Proceedings of Foundations and Applications of Security Analysis;
    • Aldini, A.1    Bernardo, M.2
  • 3
    • 3042529082 scopus 로고    scopus 로고
    • A process-algebraic approach for the analysis of probabilistic noninterference
    • Aldini, A., Bravetti, M. and Gorrieri, R. (2004) A process-algebraic approach for the analysis of probabilistic noninterference. Journal of Computer Security 12(2) 191-245.
    • (2004) Journal of Computer Security , vol.12 , Issue.2 , pp. 191-245
    • Aldini, A.1    Bravetti, M.2    Gorrieri, R.3
  • 4
    • 33746373966 scopus 로고    scopus 로고
    • Preserving secrecy under refinement
    • Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06)
    • Alur, R., C erny , P. and Zdancewic, S. (2006) Preserving secrecy under refinement. In: Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06). Springer Lecture Notes in Computer Science 4052 107-118.
    • (2006) Springer Lecture Notes in Computer Science , vol.4052 , pp. 107-118
    • Alur, R.1    Cerny, P.2    Zdancewic, S.3
  • 5
    • 78249253926 scopus 로고    scopus 로고
    • Information flow in interactive systems
    • Gastin, P. and Laroussinie, F. (eds Proceedings of the 21th International Conference on Concurrency Theory (CONCUR'10)
    • Alvim, M. S., Andres, M. E. and Palamidessi, C. (2010) Information flow in interactive systems. In: Gastin, P. and Laroussinie, F. (eds.) Proceedings of the 21th International Conference on Concurrency Theory (CONCUR'10). Springer Lecture Notes in Computer Science 6269 102-116.
    • (2010) Springer Lecture Notes in Computer Science , vol.6269 , pp. 102-116
    • Alvim, M.S.1    Andres, M.E.2    Palamidessi, C.3
  • 6
    • 77951595720 scopus 로고    scopus 로고
    • Computing the leakage of information-hiding systems
    • Proceedings 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'10)
    • Andres, M. E., Palamidessi, C., van Rossum, P. and Smith, G. (2010) Computing the leakage of information-hiding systems. In: Proceedings 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'10) Springer Lecture Notes in Computer Science. 6015 373-389.
    • (2010) Springer Lecture Notes in Computer Science , vol.6015 , pp. 373-389
    • Andres, M.E.1    Palamidessi, C.2    Van Rossum, P.3    Smith, G.4
  • 8
    • 21844505024 scopus 로고
    • Model checking of probabilistic and nondeterministic systems
    • Proceedings 15th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'95)
    • Bianco, A. and de Alfaro, L. (1995)Model checking of probabilistic and nondeterministic systems. In: Proceedings 15th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'95). Springer Lecture Notes in Computer Science 1026 499-513.
    • (1995) Springer Lecture Notes in Computer Science , vol.1026 , pp. 499-513
    • Bianco, A.1    De Alfaro, L.2
  • 9
    • 67349145950 scopus 로고    scopus 로고
    • Quantifying information leakage in process calculi
    • Boreale, M. (2009) Quantifying information leakage in process calculi. Information and Computation 207 (6) 699-725.
    • (2009) Information and Computation , vol.207 , Issue.6 , pp. 699-725
    • Boreale, M.1
  • 10
    • 84880715202 scopus 로고    scopus 로고
    • A semiring-based trace semantics for processes with applications to information leakage analysis
    • Calude, C. S. and Sassone, V. (eds. Proceedings of 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010 (IFIP TCS)
    • Boreale, M., Clark, D. and Gorla, D. (2010) A semiring-based trace semantics for processes with applications to information leakage analysis. In: Calude, C. S. and Sassone, V. (eds.) Proceedings of 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010 (IFIP TCS). Springer International Federation for Information Processing 323 340-354.
    • (2010) Springer International Federation for Information Processing , vol.323 , pp. 340-354
    • Boreale, M.1    Clark, D.2    Gorla, D.3
  • 11
    • 79953166100 scopus 로고    scopus 로고
    • Asymptotic information leakage under one-try attacks
    • Hofmann, M. (ed. Foundations of Software Science and Computational Structures-14th International Conference, FOSSACS 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011
    • Boreale, M., Pampaloni, F. and Paolini, M. (2011a) Asymptotic information leakage under one-try attacks. In: Hofmann, M. (ed.) Foundations of Software Science and Computational Structures-14th International Conference, FOSSACS 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011. Springer Lecture Notes in Computer Science 6604 396-410.
    • (2011) Springer Lecture Notes in Computer Science , vol.6604 , pp. 396-410
    • Boreale, M.1    Pampaloni, F.2    Paolini, M.3
  • 12
    • 80053013946 scopus 로고    scopus 로고
    • Quantitative information flow, with a view
    • Atluri, V. and Daz, C. (eds Proceedings of 16th European Symposium on Research in Computer Security (ESORICS 2011
    • Boreale, M., Pampaloni, F. and Paolini, M. (2011b) Quantitative information flow, with a view. In: Atluri, V. and Daz, C. (eds.) Proceedings of 16th European Symposium on Research in Computer Security (ESORICS 2011). Springer Lecture Notes in Computer Science 6879 588-606.
    • (2011) Springer Lecture Notes in Computer Science , vol.6879 , pp. 588-606
    • Boreale, M.1    Pampaloni, F.2    Paolini, M.3
  • 15
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum, D. (1988) The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1 65-75.
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 19
    • 70349991457 scopus 로고    scopus 로고
    • On the expressive power of schedulers in distributed probabilistic systems
    • Giro, S. and D'Argenio, P. R. (2009) On the expressive power of schedulers in distributed probabilistic systems. Electronic Notes in Theoretical Computer Science 253 (3) 45-71.
    • (2009) Electronic Notes in Theoretical Computer Science , vol.253 , Issue.3 , pp. 45-71
    • Giro, S.1    D'Argenio, P.R.2
  • 21
    • 0003096318 scopus 로고
    • A logic for reasoning about time and reliability
    • Hansson, H. and Jonsson, B. (1994) A logic for reasoning about time and reliability. Formal Aspects of Computing 6 (5) 512-535.
    • (1994) Formal Aspects of Computing , vol.6 , Issue.5 , pp. 512-535
    • Hansson, H.1    Jonsson, B.2
  • 24
    • 79952485063 scopus 로고    scopus 로고
    • Opacity of discrete event systems and its applications
    • Lin, F. (2011) Opacity of discrete event systems and its applications. Automatica 47 (3) 496-503.
    • (2011) Automatica , vol.47 , Issue.3 , pp. 496-503
    • Lin, F.1
  • 25
    • 3042651614 scopus 로고    scopus 로고
    • Defining information flow quantity
    • Lowe, G. (2004) Defining information flow quantity. Journal of Computer Security 12 (3-4) 619-653.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 619-653
    • Lowe, G.1
  • 26
    • 84910603099 scopus 로고    scopus 로고
    • Information-theoretic modeling and analysis of interruptrelated covert channels
    • Degano, P., Guttman, J. and Martinelli, F. eds Proceedings of the Workshop on Formal Aspects in Security and Trust, FAST 2008
    • Mantel, H. and Sudbrock, H. (2009) Information-theoretic modeling and analysis of interruptrelated covert channels. In: Degano, P., Guttman, J. and Martinelli, F. (eds.) Proceedings of the Workshop on Formal Aspects in Security and Trust, FAST 2008. Springer Lecture Notes in Computer Science 549167-81.
    • (2009) Springer Lecture Notes in Computer Science , pp. 549167-549181
    • Mantel, H.1    Sudbrock, H.2
  • 27
    • 78649476961 scopus 로고    scopus 로고
    • Decidability of opacity with non-atomic keys
    • Proceedings 2nd Workshop on Formal Aspects in Security and Trust (FAST'04)
    • Mazar e, L. (2005) Decidability of opacity with non-atomic keys. In: Proceedings 2nd Workshop on Formal Aspects in Security and Trust (FAST'04). Springer International Federation for Information Processing 173 71-84.
    • (2005) Springer International Federation for Information Processing , vol.173 , pp. 71-84
    • Mazare, L.1
  • 28
    • 77955318658 scopus 로고    scopus 로고
    • Compositional closure for bayes risk in probabilistic noninterference
    • Abramsky, S., Gavoille, C., Kirchner, C., auf der Heide, F. M. and Spirakis, P. G. (eds Proceeding of 37th International Colloquium on Automata, Languages and Programming (ICALP'10), Part II
    • McIver, A., Meinicke, L. and Morgan, C. (2010) Compositional closure for bayes risk in probabilistic noninterference. In: Abramsky, S., Gavoille, C., Kirchner, C., auf der Heide, F. M. and Spirakis, P. G. (eds.) Proceeding of 37th International Colloquium on Automata, Languages and Programming (ICALP'10), Part II. Springer Lecture Notes in Computer Science 6199 223-235.
    • (2010) Springer Lecture Notes in Computer Science , vol.6199 , pp. 223-235
    • McIver, A.1    Meinicke, L.2    Morgan, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.