Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy 1990
DOI: 10.1109/risp.1990.63849
|View full text |Cite
|
Sign up to set email alerts
|

Security models and information flow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
123
0

Year Published

2001
2001
2014
2014

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 197 publications
(124 citation statements)
references
References 11 publications
1
123
0
Order By: Relevance
“…However his definition is not aimed to measure leakage but to define it. Other pioneers on the use of information theory in the context of security are Dennings, McLean and Millen [9,8,20,21]. In recent years, a theoretical framework has been established based on Shannon's information theory to allow static, quantitative program analysis that provides an expectation of leakage in programs [15,16,17,23].…”
Section: Related Workmentioning
confidence: 99%
“…However his definition is not aimed to measure leakage but to define it. Other pioneers on the use of information theory in the context of security are Dennings, McLean and Millen [9,8,20,21]. In recent years, a theoretical framework has been established based on Shannon's information theory to allow static, quantitative program analysis that provides an expectation of leakage in programs [15,16,17,23].…”
Section: Related Workmentioning
confidence: 99%
“…5. Moving to a quantitative framework including fine-grained information augments the distinguishing power of the observer [18]. In general, the more information is added to a system model, the higher the number of vulnerabilities revealed through fine-grained notions of noninterference.…”
Section: Noninterference Analysismentioning
confidence: 99%
“…We mention in particular [1] which explores the relation between probability and nondeterminism, and [3] which extends of the notion of probable innocence. A related line of work is directed at exploring the application of information-theoretic concepts [24,12,20,21,29,5,10,19,15,8,9,17,18,2]. The relation with hypothesis testing is given by the fact that the exponential of the conditional entropy is an upper bound of the Bayes risk (the probability of error using the MAP rule) [23,4], although [26] has pointed out that the bound can be in some case very loose.…”
Section: Related Workmentioning
confidence: 99%