2005
DOI: 10.1093/logcom/exi009
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative Information Flow, Relations and Polymorphic Types

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

2
133
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 108 publications
(135 citation statements)
references
References 36 publications
2
133
0
Order By: Relevance
“…Clark, Hunt and Malacaria [21,22] have done some interesting work using information theoretic ideas as a basis for studying information flow. This general theme of incorporating quantitative and probabilistic techniques into program analysis and reasoning is certain to expand.…”
Section: A Probabilistic Version Of Agat's Transformationmentioning
confidence: 99%
“…Clark, Hunt and Malacaria [21,22] have done some interesting work using information theoretic ideas as a basis for studying information flow. This general theme of incorporating quantitative and probabilistic techniques into program analysis and reasoning is certain to expand.…”
Section: A Probabilistic Version Of Agat's Transformationmentioning
confidence: 99%
“…Consequently, there have been various attempts to define the degree of protection by using concepts based on Shannon entropy, notably mutual information [13,14,15,16] and the related notion of capacity, which is the supremum of the mutual information over all possible input distributions, and which therefore represents the worst case from the point of view of security [17,18,19].…”
Section: Introductionmentioning
confidence: 99%
“…
In recent years, there has been a growing interest in considering the quantitative aspects of Information Flow, partly because often the a priori knowledge of the secret information can be represented by a probability distribution, and partly because the mechanisms to protect the information may use randomization to obfuscate the relation between the secrets and the observables.Several works in literature use an Information Theoretic approach to model the problem and define the leakage in a quantitative way, see for example [17,4,9,10,13,12,2]. The idea is that the system is seen as a channel.
…”
mentioning
confidence: 99%
“…Several works in literature use an Information Theoretic approach to model the problem and define the leakage in a quantitative way, see for example [17,4,9,10,13,12,2]. The idea is that the system is seen as a channel.…”
mentioning
confidence: 99%