Quantitative information flow aims to assess and control the leakage of sensitive information by computer systems. A key insight in this area is that no single leakage measure is appropriate in all operational scenarios, as a result, many leakage measures have been proposed, with many different properties. To clarify this complex situation, this paper studies information leakage axiomatically, showing important dependencies among different axioms. It also establishes a completeness result about the g-leakage family, showing that any leakage measure satisfying certain intuitively-reasonable properties can be expressed as a g-leakage.16 page(s
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
This paper presents a new, axiomatic approach to information flow in sequential and parallel progra...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
The main problem addressed by this thesis is that of characterising information leakage channels in...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
This paper presents a new, axiomatic approach to information flow in sequential and parallel progra...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
The main problem addressed by this thesis is that of characterising information leakage channels in...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
This paper presents a new, axiomatic approach to information flow in sequential and parallel progra...