International audienceIn the min-entropy approach to quantitative information flow, the leakage is defined in terms of a minimization problem, which, in case of large systems, can be computationally rather heavy. The same happens for the recently proposed generalization called g-vulnerability. In this paper we study the case in which the channel associated to the system can be decomposed into simpler channels, which typically happens when the observables consist of several components. Our main contribution is the derivation of bounds on the g-leakage of the whole system in terms of the g-leakage of its components
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
International audienceRecent research in quantitative theories for information-hiding topics, such a...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
International audienceInformation flow is the branch of security that studies the leakage of informa...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
International audienceProtecting sensitive information from improper disclosure is a fundamental sec...
The observable output of a probabilistic system that processes a secret input might reveal some info...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
International audienceRecent research in quantitative theories for information-hiding topics, such a...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
International audienceInformation flow is the branch of security that studies the leakage of informa...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
International audienceProtecting sensitive information from improper disclosure is a fundamental sec...
The observable output of a probabilistic system that processes a secret input might reveal some info...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
International audienceRecent research in quantitative theories for information-hiding topics, such a...