Non-interference is a definition of security introduced for the analysis of confidential information flow in computer systems. In this paper, a probabilistic notion of non-interference is used to reveal information leakage which derives from the probabilistic behavior of systems. In particular, as a case study, we model and analyze a non-repudiation protocol which employs a probabilistic algorithm to achieve a fairness property. The analysis, conducted by resorting to a definition of probabilistic non-interference in the context of process algebras, confirms that a solely nondeterministic approach to the information flow theory is not enough to study the security guarantees of cryptographic protocols
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...
Non-interference is a definition of security introduced for the analysis of confidential information...
Non-interference is a definition of security introduced for the analysis of confidential information...
Non-interference is a definition of security introduced for the analysis of confidential information...
We define several security properties for the analysis of probabilistic noninterference as a conserv...
We define several security properties for the analysis of probabilistic noninterference as a conserv...
We define several security properties for the analysis of probabilistic noninterference as a conserv...
We define several security properties for the analysis of probabilistic noninterference as a conser...
We define several security properties for the analysis of probabilistic noninterference as a conser...
We define several security properties for the analysis of probabilistic noninterference as a conser...
We define several security properties for the analysis of probabilistic noninterference as a conser...
AbstractWe advocate the use of approximate noninterference for the security analysis of probabilisti...
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...
Non-interference is a definition of security introduced for the analysis of confidential information...
Non-interference is a definition of security introduced for the analysis of confidential information...
Non-interference is a definition of security introduced for the analysis of confidential information...
We define several security properties for the analysis of probabilistic noninterference as a conserv...
We define several security properties for the analysis of probabilistic noninterference as a conserv...
We define several security properties for the analysis of probabilistic noninterference as a conserv...
We define several security properties for the analysis of probabilistic noninterference as a conser...
We define several security properties for the analysis of probabilistic noninterference as a conser...
We define several security properties for the analysis of probabilistic noninterference as a conser...
We define several security properties for the analysis of probabilistic noninterference as a conser...
AbstractWe advocate the use of approximate noninterference for the security analysis of probabilisti...
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...
We advocate the use of approximate noninterference for the security analysis of probabilistic protoc...