2005
DOI: 10.1016/j.entcs.2004.01.018
|View full text |Cite
|
Sign up to set email alerts
|

Quantified Interference for a While Language

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
77
0

Year Published

2005
2005
2019
2019

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 69 publications
(78 citation statements)
references
References 2 publications
1
77
0
Order By: Relevance
“…There have been various works [18][19][20][21][22] in which the high information and the low information are seen as the input and output respectively of a channel. From an abstract point of view, the setting is very similar; technically it does not matter what kind of information we are trying to conceal, what is relevant for the analysis is only the probabilistic relation between the input and the output information.…”
Section: Related Workmentioning
confidence: 99%
“…There have been various works [18][19][20][21][22] in which the high information and the low information are seen as the input and output respectively of a channel. From an abstract point of view, the setting is very similar; technically it does not matter what kind of information we are trying to conceal, what is relevant for the analysis is only the probabilistic relation between the input and the output information.…”
Section: Related Workmentioning
confidence: 99%
“…Other pioneers on the use of information theory in the context of security are Dennings, McLean and Millen [9,8,20,21]. In recent years, a theoretical framework has been established based on Shannon's information theory to allow static, quantitative program analysis that provides an expectation of leakage in programs [15,16,17,23]. The theory is preliminarily extended to multi-threaded programs [13].…”
Section: Related Workmentioning
confidence: 99%
“…Information theory can be used to quantify the leakage in programs [15,16,17,13]. Generally speaking, the leakage of a system is the difference between the amount of original confidential information and the amount of remaining confidential information after observations.…”
Section: Information Leakage Of Multi-threaded Programsmentioning
confidence: 99%
“…We mention in particular [1] which explores the relation between probability and nondeterminism, and [3] which extends of the notion of probable innocence. A related line of work is directed at exploring the application of information-theoretic concepts [24,12,20,21,29,5,10,19,15,8,9,17,18,2]. The relation with hypothesis testing is given by the fact that the exponential of the conditional entropy is an upper bound of the Bayes risk (the probability of error using the MAP rule) [23,4], although [26] has pointed out that the bound can be in some case very loose.…”
Section: Related Workmentioning
confidence: 99%