Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively “small” enough to ...
Given two random variables $X$ and $Y$, how much information does $Y$ ``leak'' about $X$? An operati...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Basic information theory is used to analyse the amount of confidential information which may be leak...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
A confidential program should not allow any information about its secret inputs to be inferred from ...
International audienceInformation flow is the branch of security that studies the leakage of informa...
International audienceSecure information flow is the problem of ensuring that the information made p...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Given two random variables $X$ and $Y$, how much information does $Y$ ``leak'' about $X$? An operati...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Basic information theory is used to analyse the amount of confidential information which may be leak...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
A confidential program should not allow any information about its secret inputs to be inferred from ...
International audienceInformation flow is the branch of security that studies the leakage of informa...
International audienceSecure information flow is the problem of ensuring that the information made p...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Given two random variables $X$ and $Y$, how much information does $Y$ ``leak'' about $X$? An operati...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...