{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:04:30Z","timestamp":1762459470430},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319574172"},{"type":"electronic","value":"9783319574189"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57418-9_1","type":"book-chapter","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T07:11:16Z","timestamp":1493017876000},"page":"3-23","source":"Crossref","is-referenced-by-count":1,"title":["Algebra for Quantitative Information Flow"],"prefix":"10.1007","author":[{"given":"A. K.","family":"McIver","sequence":"first","affiliation":[]},{"given":"C. C.","family":"Morgan","sequence":"additional","affiliation":[]},{"given":"T.","family":"Rabehaja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,25]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","unstructured":"Alvim, M.S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., Smith, G.: Additive and multiplicative notions of leakage, and their capacities. In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19\u201322 July 2014, pp. 308\u2013322. IEEE (2014)","DOI":"10.1109\/CSF.2014.29"},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Smith, G.: Measuring information leakage using generalized gain functions. In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), pp. 265\u2013279, June 2012","DOI":"10.1109\/CSF.2012.26"},{"key":"1_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1674-2","volume-title":"Refinement Calculus: A Systematic Introduction","author":"R-JR Back","year":"1998","unstructured":"Back, R.-J.R., von Wright, J.: Refinement Calculus: A Systematic Introduction. Springer, Heidelberg (1998)"},{"issue":"3","key":"1_CR4","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/S1571-0661(04)00290-7","volume":"59","author":"D Clark","year":"2001","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electr. Notes Theor. Comput. Sci. 59(3), 238\u2013251 (2001)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Clarkson, M.R., Myers, A.C., Schneider, F.B.: Belief in information flow. In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20\u201322 June 2005, Aix-en-Provence, France, pp. 31\u201345 (2005)","DOI":"10.1109\/CSFW.2005.10"},{"key":"1_CR6","first-page":"429","volume":"15","author":"T Dalenius","year":"1977","unstructured":"Dalenius, T.: Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 429\u2013444 (1977)","journal-title":"Statistik Tidskrift"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). doi: 10.1007\/11787006_1"},{"key":"1_CR8","series-title":"Lecture Notes in Mathematics","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/BFb0092872","volume-title":"Categorical Aspects of Topology and Analysis","author":"M Giry","year":"1981","unstructured":"Giry, M.: A categorical approach to probability theory. In: Banaschewski, B. (ed.) Categorical Aspects of Topology and Analysis. LNM, vol. 915, pp. 68\u201385. Springer, Heidelberg (1981). doi: 10.1007\/BFb0092872"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 75\u201386. IEEE Computer Society (1984)","DOI":"10.1109\/SP.1984.10019"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Jones, C., Plotkin, G.: A probabilistic powerdomain of evaluations. In: Proceedings of the IEEE 4th Annual Symposium on Logic in Computer Science, Los Alamitos, California, pp. 186\u2013195. Computer Society Press (1989)","DOI":"10.1109\/LICS.1989.39173"},{"key":"1_CR11","doi-asserted-by":"publisher","unstructured":"Mardziel, P., Alvim, M.S., Hicks, M.W., Clarkson, M.R.: Quantifying information flow for dynamic secrets. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, 18\u201321 May 2014, pp. 540\u2013555 (2014)","DOI":"10.1109\/SP.2014.41"},{"key":"1_CR12","series-title":"Monographs in Computer Science","volume-title":"Abstraction, Refinement and Proof for Probabilistic Systems","author":"AK McIver","year":"2005","unstructured":"McIver, A.K., Morgan, C.C.: Abstraction, Refinement and Proof for Probabilistic Systems. Monographs in Computer Science. Springer, New York (2005)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-14162-1_19","volume-title":"Automata, Languages and Programming","author":"A McIver","year":"2010","unstructured":"McIver, A., Meinicke, L., Morgan, C.: Compositional closure for bayes risk in probabilistic noninterference. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6199, pp. 223\u2013235. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14162-1_19"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"McIver, A., Meinicke, L., Morgan, C.: A Kantorovich-monadic powerdomain for information hiding, with probability and nondeterminism. In: Proceedings of LiCS 2012 (2012)","DOI":"10.1109\/LICS.2012.56"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"McIver, A., Meinicke, L., Morgan, C.: Hidden-Markov program algebra with iteration. Mathematical Structures in Computer Science (2014)","DOI":"10.1017\/S0960129513000625"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"McIver, A., Morgan, C., Rabehaja, T.: Abstract hidden Markov models: a monadic account of quantitative information flow. In: Proceedings of LiCS 2015 (2015)","DOI":"10.1109\/LICS.2015.61"},{"key":"1_CR17","unstructured":"McIver, A., Morgan, C., Rabehaja, T., Bordenabe, N.: Reasoning about distributed secrets. Submitted to FORTE 2017"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-54792-8_5","volume-title":"Principles of Security and Trust","author":"A McIver","year":"2014","unstructured":"McIver, A., Morgan, C., Smith, G., Espinoza, B., Meinicke, L.: Abstract channels and their robust information-leakage ordering. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 83\u2013102. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-54792-8_5"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Moggi, E.: Computational lambda-calculus and monads. In: Proceedings of 4th Symposium on LiCS, pp. 14\u201323 (1989)","DOI":"10.1109\/LICS.1989.39155"},{"key":"1_CR20","volume-title":"Programming from Specifications","author":"CC Morgan","year":"1994","unstructured":"Morgan, C.C.: Programming from Specifications, 2nd edn. Prentice-Hall, Upper Saddle River (1994). web.comlab.ox.ac.uk\/oucl\/publications\/books\/PfS\/","edition":"2"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/11783596_21","volume-title":"Mathematics of Program Construction","author":"CC Morgan","year":"2006","unstructured":"Morgan, C.C.: The Shadow Knows: refinement of ignorance in sequential programs. In: Uustalu, T. (ed.) MPC 2006. LNCS, vol. 4014, pp. 359\u2013378. Springer, Heidelberg (2006). doi: 10.1007\/11783596_21"},{"issue":"3","key":"1_CR22","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1145\/229542.229547","volume":"18","author":"CC Morgan","year":"1996","unstructured":"Morgan, C.C., McIver, A.K., Seidel, K.: Probabilistic predicate transformers. ACM Trans. Program. Lang. Syst. 18(3), 325\u2013353 (1996). doi.acm.org\/10.1145\/229542.229547","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"1_CR23","unstructured":"Schrijvers, T., Morgan, C.: Hypers.hs Haskell code implementing quantitative non-interference monadic security semantics (2015). http:\/\/www.cse.unsw.edu.au\/~carrollm\/Hypers.pdf"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-00596-1_21","volume-title":"Foundations of Software Science and Computational Structures","author":"G Smith","year":"2009","unstructured":"Smith, G.: On the foundations of quantitative information flow. In: Alfaro, L. (ed.) FoSSaCS 2009. LNCS, vol. 5504, pp. 288\u2013302. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-00596-1_21"}],"container-title":["Lecture Notes in Computer Science","Relational and Algebraic Methods in Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57418-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T17:55:44Z","timestamp":1569088544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57418-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319574172","9783319574189"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57418-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}