2018
DOI: 10.1007/978-3-319-95582-7_4
|View full text |Cite
|
Sign up to set email alerts
|

An Algebraic Approach for Reasoning About Information Flow

Abstract: This paper concerns the analysis of information leaks in security systems. We address the problem of specifying and analyzing large systems in the (standard) channel model used in quantitative information flow (QIF). We propose several operators which match typical interactions between system components. We explore their algebraic properties with respect to the security-preserving refinement relation defined by Alvim et al. and McIver et al. [1,2]. We show how the algebra can be used to simplify large system s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 26 publications
0
1
0
Order By: Relevance
“…As a result, much effort in the field has been dedicated to defining ways of composing channels, and studying their properties [6,Chapter 8]. These compositionality results have been useful in studying the leakage of information in anonymity protocols [8,25,34], timing attacks against cryptosystems [38], two-player games [5], and in scenarios where the sensitive data that is correlated to the input [14]. We adopt this compositional approach in our work, using the parallel and cascading compositions [6,Chapter 8] to obtain, from simpler and more intuitive channels, a comprehensive model of the effect a trader Alice's actions have in the market.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, much effort in the field has been dedicated to defining ways of composing channels, and studying their properties [6,Chapter 8]. These compositionality results have been useful in studying the leakage of information in anonymity protocols [8,25,34], timing attacks against cryptosystems [38], two-player games [5], and in scenarios where the sensitive data that is correlated to the input [14]. We adopt this compositional approach in our work, using the parallel and cascading compositions [6,Chapter 8] to obtain, from simpler and more intuitive channels, a comprehensive model of the effect a trader Alice's actions have in the market.…”
Section: Related Workmentioning
confidence: 99%
“…, 1). Notice that all operations above, and the cascading and parallel operations in (8), are linear operations w.r.t. the entries of 𝐴𝑙𝑖𝑐𝑒 Similarly, letting 𝐴 be the r.v.…”
Section: A Solution Via Linear Programmingmentioning
confidence: 99%
“…Fairness Fairness is a very important factor because it has nothing to do with network size or complexity. The goal of fairness is to guarantee that benefits are distributed fairly among the participants in an activity (Zhao et al, 2016;Américo et al, 2018;Said and Cristescu, 2020). Informally, fairness means that at each step of the protocol, either both parties receive their expected items, or neither of them receives any valuable information about their expected items.…”
Section: Related Conceptsmentioning
confidence: 99%