{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:47:34Z","timestamp":1725558454027},"publisher-location":"Berlin, Heidelberg","reference-count":47,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642136771"},{"type":"electronic","value":"9783642136788"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13678-8_3","type":"book-chapter","created":{"date-parts":[[2010,6,21]],"date-time":"2010-06-21T21:18:48Z","timestamp":1277155128000},"page":"87-134","source":"Crossref","is-referenced-by-count":7,"title":["Information Theory and Security: Quantitative Information Flow"],"prefix":"10.1007","author":[{"given":"Pasquale","family":"Malacaria","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Heusser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Babi\u0107, D., Hutter, F.: Spear Theorem Prover. In: Proc. of the SAT 2008 Race (2008)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., K\u00f6pf, B., Rybalchenko, A.: Automatic Discovery and Quantification of Information Leaks. In: Proc. 30th IEEE Symposium on Security and Privacy, S& P 2009 (2009) (to appear)","DOI":"10.1109\/SP.2009.18"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Barthe, G., D\u2019Argenio, P.R., Rezk, T.: Secure Information Flow by Self-Composition. In: CSFW 2004: Proceedings of the 17th IEEE workshop on Computer Security Foundations (2004)","DOI":"10.1109\/CSFW.2004.1310735"},{"key":"3_CR4","unstructured":"Bayardo, R., Schrag, R.: Using CSP look-back techniques to solve real-world SAT instances. In: Proc. of AAAI 1997, pp. 203\u2013208. AAAI Press\/The MIT Press (1997)"},{"key":"3_CR5","unstructured":"Birkhoff, G.: Lattice theory. Amer. Math. Soc. Colloq. Publ.\u00a025 (1948)"},{"key":"3_CR6","series-title":"ENTCS","first-page":"75","volume-title":"Proceedings of MFPS 2009","author":"C. Braun","year":"2009","unstructured":"Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative notions of leakage for one-try attacks. In: Proceedings of MFPS 2009. ENTCS, vol.\u00a0248, pp. 75\u201391. Elsevier, Amsterdam (2009)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/978-3-642-12002-2_33","volume-title":"TACAS 2010","author":"K. Chatzikokolakis","year":"2010","unstructured":"Chatzikokolakis, K., Chothia, T., Guha, A.: Statistical Measurement of Information Leakage. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol.\u00a06015, pp. 390\u2013404. Springer, Heidelberg (2010)"},{"issue":"2-4","key":"3_CR8","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.ic.2007.07.003","volume":"206","author":"K. Chatzikokolakis","year":"2008","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Information and Computation\u00a0206(2-4), 378\u2013401 (2008)","journal-title":"Information and Computation"},{"key":"3_CR9","unstructured":"Cachin, C.: Entropy Measures and Unconditional Security in Cryptography. PhD thesis, Swiss Federal Institute of Technology (1997)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Chen, H., Malacaria, P.: Quantitative analysis of leakage for multi-threaded programs. In: PLAS 2007: Proceedings of the 2007 workshop on Programming languages and analysis for security (2007)","DOI":"10.1145\/1255329.1255335"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Chen, H., Malacaria, P.: Quantifying Maximal Loss of Anonymity in Protocols. In: Proceedings ACM Symposium on Information, Computer and Communication Security 2009 (2009)","DOI":"10.1145\/1533057.1533087"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative Analysis of the Leakage of Confidential Data. In: QAPL 2001, Quantitative Aspects of Programming Laguages, November 2002. ENTCS, pp. 238\u2013251 (2002)","DOI":"10.1016\/S1571-0661(04)00290-7"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security\u00a015(3) (2007)","DOI":"10.3233\/JCS-2007-15302"},{"issue":"2","key":"3_CR14","first-page":"181","volume":"18","author":"D. Clark","year":"2005","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and natural language\u00a018(2), 181\u2013199 (2005)","journal-title":"Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and natural language"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-540-24730-2_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E. Clarke","year":"2004","unstructured":"Clarke, E., Kroening, D., Lerda, F.: A Tool for Checking ANSI-C Programs. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 168\u2013176. Springer, Heidelberg (2004)"},{"issue":"5","key":"3_CR16","doi-asserted-by":"publisher","first-page":"655","DOI":"10.3233\/JCS-2009-0353","volume":"17","author":"M.R. Clarkson","year":"2009","unstructured":"Clarkson, M.R., Myers, A.C., Schneider, F.B.: Quantifying information flow with beliefs. J. Comput. Secur.\u00a017(5), 655\u2013701 (2009)","journal-title":"J. Comput. Secur."},{"key":"3_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley, Chichester (1991)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 286\u2013296 (2007)","DOI":"10.1145\/1315245.1315282"},{"issue":"5","key":"3_CR19","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"3_CR20","volume-title":"Cryptography and data security","author":"D. Denning","year":"1982","unstructured":"Denning, D.: Cryptography and data security, 0-201-10150-5. Addison-Wesley Longman Publishing Co., Inc., Boston (1982)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Gray III, J.W.: Toward a mathematical foundation for information flow security. In: Proc. 1991 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 21\u201334 (1991)","DOI":"10.1109\/RISP.1991.130769"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Heusser, J., Malacaria, P.: Applied Quantitative Information Flow and Statistical Databases. In: Proceedings of Workshop on Formal Aspects in Security and Trust, FAST 2009 (2009)","DOI":"10.1007\/978-3-642-12459-4_8"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of the 1982 IEEE Computer Society Symposium on Security and Privacy (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"3_CR24","volume-title":"Proc. of the IEEE Computer Security Foundations Workshop","author":"J. Landauer","year":"1993","unstructured":"Landauer, J., Redmond, T.: A Lattice of Information. In: Proc. of the IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1993)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Malacaria, P.: Assessing security threats of looping constructs. In: Proc. ACM Symposium on Principles of Programming Language (2007)","DOI":"10.1145\/1190216.1190251"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Malacaria, P.: Risk Assessment of Security Threats for Looping Constructs. Journal of Computer Security\u00a018(2) (2010)","DOI":"10.3233\/JCS-2010-0360"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Malacaria, P., Chen, H.: Lagrange Multipliers and Maximum Information Leakage in Different Observational Models. In: ACM SIGPLAN Third Workshop on Programming Languages and Analysis for Security (June 2008)","DOI":"10.1145\/1375696.1375713"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Massey, J.L.: Guessing and entropy. In: Proceedings of the 1994 IEEE International Symposium on Information Theory, p. 204 (1994)","DOI":"10.1109\/ISIT.1994.394764"},{"key":"3_CR29","unstructured":"Maurer, U.M.: The Role of Information Theory in Cryptography. In: Fourth IMA Conference on Cryptography and Coding, pp. 49\u201371 (1993)"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity. In: PLDI 2008, Proceedings of the ACM SIGPLAN 2008, Conference on Programming Language Design and Implementation, Tucson, AZ, USA (2008)","DOI":"10.1145\/1375581.1375606"},{"key":"3_CR31","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-0-387-21798-7_20","volume-title":"Programming Methodology","author":"A. McIver","year":"2003","unstructured":"McIver, A., Morgan, C.: A probabilistic approach to information hiding. In: Programming Methodology, pp. 441\u2013460. Springer, New York (2003)"},{"key":"3_CR32","first-page":"180","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"J. Mclean","year":"1990","unstructured":"Mclean, J.: Security Models and Information Flow. In: Proc. IEEE Symposium on Security and Privacy, pp. 180\u2013187. IEEE Computer Society Press, Los Alamitos (1990)"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Millen, J.K.: Covert Channel Capacity. In: IEEE Symposium on Security and Privacy, pp. 1540\u20137993, p. 60. IEEE Computer Society, Los Alamitos (1987)","DOI":"10.1109\/SP.1987.10013"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Mu, C., Clark, D.: An Abstraction Quantifying Information Flow over Probabilistic Semantics. In: Workshop on Quantitative Aspects of Programming Languages (QAPL), ETAPS (2009)","DOI":"10.1109\/ARES.2009.88"},{"key":"3_CR35","doi-asserted-by":"publisher","first-page":"443","DOI":"10.2996\/kmj\/1138846220","volume":"22","author":"Y. Nakamura","year":"1970","unstructured":"Nakamura, Y.: Entropy and Semivaluations on Semilattices. Kodai Math. Sem. Rep.\u00a022, 443\u2013468 (1970)","journal-title":"Kodai Math. Sem. Rep."},{"key":"3_CR36","unstructured":"R\u00e9nyi, A.: On measures of information and entropy. In: Proceedings of the 4th Berkeley Symposium on Mathematics, Statistics and Probability, pp. 547\u2013561 (1960)"},{"issue":"1","key":"3_CR37","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"3_CR38","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Systems Technical Journal\u00a027(3), 379\u2013423 (1948)","journal-title":"Bell Systems Technical Journal"},{"key":"3_CR39","first-page":"105","volume":"1","author":"C.E. Shannon","year":"1953","unstructured":"Shannon, C.E.: The lattice theory of information. IEEE Transactions on Information Theory\u00a01, 105\u2013107 (1953)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"11","key":"3_CR40","first-page":"1767","volume":"13","author":"D. Simovici","year":"2007","unstructured":"Simovici, D.: Metric-Entropy Pairs on Lattices. Journal of Universal Computer Science\u00a013(11), 1767\u20131778 (2007)","journal-title":"Journal of Universal Computer Science"},{"key":"3_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-00596-1_21","volume-title":"Foundations of Software Science and Computational Structures","author":"G. Smith","year":"2009","unstructured":"Smith, G.: On the Foundations of Quantitative Information Flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol.\u00a05504, pp. 288\u2013302. Springer, Heidelberg (2009)"},{"key":"3_CR42","unstructured":"Sutherland, D.: A model of information. In: Proc. 9th National Security Conference, Gaithersburg, Md., pp. 175\u2013183 (1986)"},{"issue":"3","key":"3_CR43","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/18.79902","volume":"37","author":"R.W. Yeung","year":"1991","unstructured":"Yeung, R.W.: A new outlook on Shannon\u2019s information measures. IEEE Transactions on Information Theory\u00a037(3), 466\u2013474 (1991)","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11547662_24","volume-title":"Static Analysis","author":"T. Terauchi","year":"2005","unstructured":"Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol.\u00a03672, pp. 352\u2013367. Springer, Heidelberg (2005)"},{"key":"3_CR45","unstructured":"Tschantz, M.C., Nori, A.V.: Measuring the Loss of Privacy from Statistics. In: QA 2009: Workshop on Quantitative Analysis of Software (June 2009)"},{"key":"3_CR46","volume-title":"Encyclopaedia of Mathematics","author":"I.B. Vapnyarskii","year":"2001","unstructured":"Vapnyarskii, I.B.: Lagrange multipliers. In: Hazewinkel, M. (ed.) Encyclopaedia of Mathematics. Springer, Heidelberg (2001)"},{"key":"3_CR47","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3054.001.0001","volume-title":"The Formal Semantics of Programming Languages","author":"G. Winskel","year":"1993","unstructured":"Winskel, G.: The Formal Semantics of Programming Languages. MIT Press, Cambridge (1993)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Quantitative Aspects of Programming Languages"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13678-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T20:22:37Z","timestamp":1591388557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13678-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642136771","9783642136788"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13678-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}