M.S. Alvim, M.E. Andrés, K. Chatzikokolakis & C. Palamidessi (2011):
Quantitative information flow and applications to differential privacy.
In: A. Aldini & R. Gorrieri: Foundations of security analysis and design VI.
Springer-Verlag,
pp. 211–230,
doi:10.1007/978-3-642-23082-0-8.
M.S. Alvim, K. Chatzikokolakis, C. Palamidessi & G. Smith (2012):
Measuring Information Leakage Using Generalized Gain Functions.
In: CSF '12: Proceedings of the 2012 IEEE 25th Computer Security Foundations Symposium.
IEEE Computer Society,
pp. 265–279,
doi:10.1109/CSF.2012.26.
M.E. Andres, C. Palamidessi, P. Rossum & A. Sokolova (2010):
Information Hiding in Probabilistic Concurrent Systems.
In: Proceedings of the 2010 Seventh International Conference on the Quantitative Evaluation of Systems,
QEST '10.
IEEE Computer Society,
pp. 17–26,
doi:10.1109/QEST.2010.11.
C. Cachin (1997):
Entropy Measures and Unconditional Security in Cryptography.
K. Chatzikokolakis, C. Palamidessi & P. Panangaden (2007):
Anonymity protocols as noisy channels.
In: Proceedings of the 2nd international conference on Trustworthy global computing,
TGC'06.
Springer-Verlag,
pp. 281–300,
doi:10.1007/978-3-540-75336-0-18.
H. Chen & P. Malacaria (2007):
Quantitative analysis of leakage for multi-threaded programs.
In: Proceedings of the 2007 workshop on Programming languages and analysis for security,
PLAS '07.
ACM,
pp. 31–40,
doi:10.1145/1255329.1255335.
H. Chen & P. Malacaria (2010):
The optimum leakage principle for analyzing multi-threaded programs.
In: Proceedings of the 4th international conference on Information theoretic security,
ICITS'09.
Springer-Verlag,
pp. 177–193,
doi:10.1007/978-3-642-14496-7-15.
D. Clark, S. Hunt & P. Malacaria (2005):
Quantitative Information Flow, Relations and Polymorphic Types.
J. Log. and Comput. 15,
pp. 181–199,
doi:10.1093/logcom/exi009.
J.A. Goguen & J. Meseguer (1982):
Security Policies and Security Models.
In: IEEE Symposium on Security and Privacy,
pp. 11–20.
A. Gurfinkel & M. Chechik (2006):
Why Waste a Perfectly Good Abstraction.
In: In TACAS'06.
Springer,
pp. 3920.
M. Huisman & T.M. Ngo (2012):
Scheduler-specific confidentiality for multi-threaded programs and its logic-based verification.
In: FoVeOOS'11.
Springer-Verlag,
pp. 178–195,
doi:10.1007/978-3-642-31762-0-12.
D. Kozen:
Semantics of probabilistic programs.
In: Proceedings of the 20th Annual Symposium on Foundations of Computer Science,
SFCS '79.
IEEE Computer Society,
pp. 101–114,
doi:10.1109/SFCS.1979.38.
S.A. Kripke (1963):
Semantical Considerations on Modal Logic.
Acta Philosophica Fennica 16,
pp. 83–94.
P. Malacaria (2010):
Risk assessment of security threats for looping constructs.
J. Comput. Secur. 18,
pp. 191–228.
P. Malacaria & H. Chen (2008):
Lagrange multipliers and maximum information leakage in different observational models.
In: Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security,
PLAS '08.
ACM,
pp. 135–146,
doi:10.1145/1375696.1375713.
J.L. Massey (1994):
Guessing and Entropy.
In: Proceedings of the 1994 IEEE International Symposium on Information Theory,
pp. 204,
doi:10.1109/ISIT.1994.394764.
I.S. Moskowitz, R.E. Newman, D.P. Crepeau & A.R. Miller (2003):
Covert Channels and Anonymizing Networks.
In: In Workshop on Privacy in the Electronic Society (WPES 2003).
ACM,
pp. 79–88,
doi:10.1145/1005140.1005153.
C. Mu & D. Clark (2009):
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics.
In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, 2009, Japan.
IEEE Computer Society,
pp. 49–57,
doi:10.1109/ARES.2009.88.
T.M. Ngo, M. Stoelinga & M. Huisman (2013):
Confidentiality for probabilistic multi-threaded programs and its verification.
In: Proceedings of the 5th international conference on Engineering Secure Software and Systems,
ESSoS'13.
Springer-Verlag,
Berlin, Heidelberg,
pp. 107–122.
A. Sabelfeld & D. Sands (1999):
Probabilistic Noninterference for Multi-threaded Programs.
In: In Proc. IEEE Computer Security Foundations Workshop.
IEEE Computer Society Press,
pp. 200–214.
G. Smith (2009):
On the Foundations of Quantitative Information Flow.
In: FOSSACS '09.
Springer-Verlag,
pp. 288–302,
doi:10.1007/978-3-642-00596-1-21.
M.I.A. Stoelinga (2002):
Alea jacta est: verification of probabilistic, real-time and parametric systems.
University of Nijmegen, the Netherlands.
S. Zdancewic & A.C. Myers (2003):
Observational Determinism for Concurrent Program Security.
In: In Proc. 16th IEEE Computer Security Foundations Workshop,
pp. 29–43.
J. Zhu & M. Srivatsa (2011):
Poster: on quantitative information flow metrics.
In: Proceedings of the 18th ACM conference on Computer and communications security,
CCS '11.
ACM,
pp. 877–880,
doi:10.1145/2046707.2093516.
J. Zhu & M. Srivatsa (2011):
Quantifying Information Leakage in Finite Order Deterministic Programs.
In: ICC,
pp. 1–6,
doi:10.1109/icc.2011.5963509.
Y. Zhu & R. Bettati (2005):
Anonymity vs. Information Leakage in Anonymity Systems.
In: In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005),
pp. 514–524,
doi:10.1109/ICDCS.2005.13.