@incollection(Alvim11, author = "M.S. Alvim and M.E. Andr{\'e}s and K. Chatzikokolakis and C. Palamidessi", year = "2011", title = "Quantitative information flow and applications to differential privacy", editor = "A. Aldini and R. Gorrieri", booktitle = "Foundations of security analysis and design {VI}", publisher = "Springer-Verlag", pages = "211--230", doi = "10.1007/978-3-642-23082-0-8", ) @inproceedings(Alvim12, author = "M.S. Alvim and K. Chatzikokolakis and C. Palamidessi and G. Smith", year = "2012", title = "Measuring Information Leakage Using Generalized Gain Functions", booktitle = "CSF '12: Proceedings of the 2012 IEEE 25th Computer Security Foundations Symposium", publisher = "IEEE Computer Society", pages = "265--279", doi = "10.1109/CSF.2012.26", ) @inproceedings(Andres10, author = "M.E. Andres and C. Palamidessi and P. Rossum and A. Sokolova", year = "2010", title = "Information Hiding in Probabilistic Concurrent Systems", booktitle = "Proceedings of the 2010 Seventh International Conference on the Quantitative Evaluation of Systems", series = "QEST '10", publisher = "IEEE Computer Society", pages = "17--26", doi = "10.1109/QEST.2010.11", ) @phdthesis(Cachin, author = "C. Cachin", year = "1997", title = "{Entropy Measures and Unconditional Security in Cryptography}", ) @inproceedings(Chatzikokolakis06, author = "K. Chatzikokolakis and C. Palamidessi and P. Panangaden", year = "2007", title = "Anonymity protocols as noisy channels", booktitle = "Proceedings of the 2nd international conference on Trustworthy global computing", series = "TGC'06", publisher = "Springer-Verlag", pages = "281--300", doi = "10.1007/978-3-540-75336-0-18", ) @inproceedings(Chen07, author = "H. Chen and P. Malacaria", year = "2007", title = "Quantitative analysis of leakage for multi-threaded programs", booktitle = "Proceedings of the 2007 workshop on Programming languages and analysis for security", series = "PLAS '07", publisher = "ACM", pages = "31--40", doi = "10.1145/1255329.1255335", ) @inproceedings(Chen09, author = "H. Chen and P. Malacaria", year = "2010", title = "The optimum leakage principle for analyzing multi-threaded programs", booktitle = "Proceedings of the 4th international conference on Information theoretic security", series = "ICITS'09", publisher = "Springer-Verlag", pages = "177--193", doi = "10.1007/978-3-642-14496-7-15", ) @article(Clark05, author = "D. Clark and S. Hunt and P. Malacaria", year = "2005", title = "Quantitative Information Flow, Relations and Polymorphic Types", journal = "J. Log. and Comput.", volume = "15", pages = "181--199", doi = "10.1093/logcom/exi009", ) @inproceedings(GoguenM82, author = "J.A. Goguen and J. Meseguer", year = "1982", title = "Security Policies and Security Models", booktitle = "IEEE Symposium on Security and Privacy", pages = "11--20", ) @inproceedings(Gurfinkel06, author = "A. Gurfinkel and M. Chechik", year = "2006", title = "Why Waste a Perfectly Good Abstraction", booktitle = "In TACAS'06", publisher = "Springer", pages = "3920", ) @inproceedings(Huisman11, author = "M. Huisman and T.M. Ngo", year = "2012", title = "Scheduler-specific confidentiality for multi-threaded programs and its logic-based verification", booktitle = "FoVeOOS'11", publisher = "Springer-Verlag", pages = "178--195", doi = "10.1007/978-3-642-31762-0-12", ) @inproceedings(Kozen79, author = "D. Kozen", title = "Semantics of probabilistic programs", booktitle = "Proceedings of the 20th Annual Symposium on Foundations of Computer Science", series = "SFCS '79", publisher = "IEEE Computer Society", pages = "101--114", doi = "10.1109/SFCS.1979.38", ) @article(Kripke1963, author = "S.A. Kripke", year = "1963", title = "Semantical Considerations on Modal Logic", journal = "Acta Philosophica Fennica", volume = "16", pages = "83--94", ) @article(Malacaria10, author = "P. Malacaria", year = "2010", title = "Risk assessment of security threats for looping constructs", journal = "J. Comput. Secur.", volume = "18", pages = "191--228", ) @inproceedings(Malacaria08, author = "P. Malacaria and H. Chen", year = "2008", title = "Lagrange multipliers and maximum information leakage in different observational models", booktitle = "Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security", series = "PLAS '08", publisher = "ACM", pages = "135--146", doi = "10.1145/1375696.1375713", ) @inproceedings(Massey94, author = "J.L. Massey", year = "1994", title = "Guessing and Entropy", booktitle = "Proceedings of the 1994 IEEE International Symposium on Information Theory", pages = "204", doi = "10.1109/ISIT.1994.394764", ) @inproceedings(Moskowitz03, author = "I.S. Moskowitz and R.E. Newman and D.P. Crepeau and A.R. Miller", year = "2003", title = "Covert Channels and Anonymizing Networks", booktitle = "In Workshop on Privacy in the Electronic Society (WPES 2003)", publisher = "ACM", pages = "79--88", doi = "10.1145/1005140.1005153", ) @inproceedings(MuC09, author = "C. Mu and D. Clark", year = "2009", title = "Quantitative Analysis of Secure Information Flow via Probabilistic Semantics", booktitle = "Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, 2009, Japan", publisher = "IEEE Computer Society", pages = "49--57", doi = "10.1109/ARES.2009.88", ) @inproceedings(Ngo13, author = "T.M. Ngo and M. Stoelinga and M. Huisman", year = "2013", title = "Confidentiality for probabilistic multi-threaded programs and its verification", booktitle = "Proceedings of the 5th international conference on Engineering Secure Software and Systems", series = "ESSoS'13", publisher = "Springer-Verlag", address = "Berlin, Heidelberg", pages = "107--122", ) @inproceedings(Sabelfeld99, author = "A. Sabelfeld and D. Sands", year = "1999", title = "Probabilistic Noninterference for Multi-threaded Programs", booktitle = "In Proc. IEEE Computer Security Foundations Workshop", publisher = "IEEE Computer Society Press", pages = "200--214", ) @inproceedings(Smith09, author = "G. Smith", year = "2009", title = "On the Foundations of Quantitative Information Flow", booktitle = "FOSSACS '09", publisher = "Springer-Verlag", pages = "288--302", doi = "10.1007/978-3-642-00596-1-21", ) @inproceedings(Smith11, author = "G. Smith", year = "2011", title = "Quantifying Information Flow Using Min-Entropy", booktitle = "QEST", pages = "159--167", url = "http://doi.ieeecomputersociety.org/10.1109/QEST.2011.31", ) @phdthesis(Sto02, author = "M.I.A. Stoelinga", year = "2002", title = "Alea jacta est: verification of probabilistic, real-time and parametric systems", school = "University of Nijmegen, the Netherlands", ) @inproceedings(ZM, author = "S. Zdancewic and A.C. Myers", year = "2003", title = "Observational Determinism for Concurrent Program Security", booktitle = "In Proc. 16th IEEE Computer Security Foundations Workshop", pages = "29--43", ) @inproceedings(Zhu11, author = "J. Zhu and M. Srivatsa", year = "2011", title = "Poster: on quantitative information flow metrics", booktitle = "Proceedings of the 18th ACM conference on Computer and communications security", series = "CCS '11", publisher = "ACM", pages = "877--880", doi = "10.1145/2046707.2093516", ) @inproceedings(Zhu10, author = "J. Zhu and M. Srivatsa", year = "2011", title = "Quantifying Information Leakage in Finite Order Deterministic Programs", booktitle = "ICC", pages = "1--6", doi = "10.1109/icc.2011.5963509", ) @inproceedings(Zhu05, author = "Y. Zhu and R. Bettati", year = "2005", title = "Anonymity vs. Information Leakage in Anonymity Systems", booktitle = "In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005)", pages = "514--524", doi = "10.1109/ICDCS.2005.13", )