International audienceQuantitative information flow aims to assess and control the leakage of sensitive information by computer systems. A key insight in this area is that no single leakage measure is appropriate in all operational scenarios; as a result, many leakage measures have been proposed, with many different properties. To clarify this complex situation, this paper studies information leakage axiomatically, showing important dependencies among different axioms. It also establishes a completeness result about the g-leakage family, showing that any leakage measure satisfying certain intuitively-reasonable properties can be expressed as a g-leakage
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
Information leakage traditionally has been defined to occur when uncertainty about secret data is re...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
Quantitative information flow aims to assess and control the leakage of sensitive information by com...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
International audienceInformation flow is the branch of security that studies the leakage of informa...
The main problem addressed by this thesis is that of characterising information leakage channels in...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
International audienceWe consider the problem of defining a measure of information leakage in intera...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
Information leakage traditionally has been defined to occur when uncertainty about secret data is re...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
Quantitative information flow aims to assess and control the leakage of sensitive information by com...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
International audienceInformation flow is the branch of security that studies the leakage of informa...
The main problem addressed by this thesis is that of characterising information leakage channels in...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
International audienceWe consider the problem of defining a measure of information leakage in intera...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
Information leakage traditionally has been defined to occur when uncertainty about secret data is re...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...