• Aucun résultat trouvé

[PDF] Top 20 The Cardinal Abstraction for Quantitative Information Flow

Has 10000 "The Cardinal Abstraction for Quantitative Information Flow" found on our website. Below are the top 20 most common "The Cardinal Abstraction for Quantitative Information Flow".

The Cardinal Abstraction for Quantitative Information Flow

The Cardinal Abstraction for Quantitative Information Flow

... the union of both abstract states at the merge point of the conditional, since this would be unsound: with max as a union operator over the lattice ([0, 2 κ ], ≤, 0, 2 κ , max, min) of ... Voir le document complet

24

Quantitative Approaches to Information Hiding

Quantitative Approaches to Information Hiding

... in the connection between informa- tion flow models and Shannon information theory, by establishing a formal analogy between noninterference and mutual ...modelled the multi-user com- puter ... Voir le document complet

114

Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach

Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach

... Moreover, the purpose of t-privacy is to protect all users (especially those whose configurations are ...definition for two major reasons: 1) the values of sensitive attributes in the ... Voir le document complet

17

Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow

Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow

... of the estimate. The results are also used to adaptively find the optimal sample sizes for different components in the statistical ...including the abstraction-then- ... Voir le document complet

19

Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow

Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow

... of the estimate. The results are also used to adaptively find the optimal sample sizes for different components in the statistical ...including the abstraction-then- ... Voir le document complet

38

Information Flow Control for the Web Browser through a Mechanism of Split Addresses

Information Flow Control for the Web Browser through a Mechanism of Split Addresses

... follow the path of abstract interpretation in their approach towards static ...approximate information about the runtime behavior of a given pro- gram ...domains. The program is then ... Voir le document complet

152

Markovian Processes for Quantitative Information Leakage

Markovian Processes for Quantitative Information Leakage

... of information we have learned about X by observing Y . This is the basic idea behind Shannon leakage: when X is a secret and Y an observable then I(X; Y ) quantifies how many bits of X are learned by ... Voir le document complet

155

Quantitative Information Flow and Applications to Differential Privacy

Quantitative Information Flow and Applications to Differential Privacy

... that the databases differ for only one ...Obviously, the smaller is , the greater is the privacy ...0 the output of K is nearly independent from the input (all ... Voir le document complet

22

From qualitative to quantitative program analysis : permissive enforcement of secure information flow

From qualitative to quantitative program analysis : permissive enforcement of secure information flow

... On the other hand, non-interference as a security policy is also conserva- ...checker for instance, leaks information about the secret password by accept- ing or rejecting a user-supplied ... Voir le document complet

227

Full abstraction for the quantum lambda-calculus

Full abstraction for the quantum lambda-calculus

... beyond the sequential deterministic case, there was for a long time no adequate notion of innocence [ Harmer and McCusker 1999 ...behavioural information. This change of perspective recently allowed ... Voir le document complet

29

Type Abstraction for Relaxed Noninterference *

Type Abstraction for Relaxed Noninterference *

... of the open challenges in the area of information flow security is integrating informa- tion flow mechanisms with existing infrastructures ...type abstraction, more precisely ... Voir le document complet

28

On the relation between Differential Privacy and Quantitative Information Flow

On the relation between Differential Privacy and Quantitative Information Flow

... in the com- munity of statistical databases, as a response to the problem of protect- ing the privacy of the database’s participants when performing statistical ...queries. The idea is ... Voir le document complet

18

Quantitative Information Flow for Scheduler-Dependent Systems

Quantitative Information Flow for Scheduler-Dependent Systems

... France Quantitative information flow analyses measure how much information on secrets is leaked by pub- licly observable ...estimate the information leakage of composed ...about ... Voir le document complet

18

Output-sensitive Information flow analysis

Output-sensitive Information flow analysis

... In the above example, we would ob- tain Γ 0 (x l ) = α(h) = β 0 (o) v α(o) t β 0 (o), meaning that the unwanted maximal leakage Γ 0 (x l ) is less than the minimal leakage β 0 (o) due to the ... Voir le document complet

18

Compositionality Results for Quantitative Information Flow

Compositionality Results for Quantitative Information Flow

... improve the precision of the bounds, we have proposed a technique based on the idea of approximating priors by removing small probabilities up to a parameter ...that the dependency of ... Voir le document complet

26

Enforcing Browser Anonymity with Quantitative Information Flow

Enforcing Browser Anonymity with Quantitative Information Flow

... algorithms for exactly computing standard quantita- tive information flow measures of programs such as conditional (minimal) guessing ...entropy. The algorithms are either based on SAT-solving ... Voir le document complet

34

Optical flow with structure information for epithelial image mosaicing

Optical flow with structure information for epithelial image mosaicing

... when the textures are con- strasted (for instance the method in [5] used in fluorescence cystoscopy), they are unable to establish unambiguous corre- spondences in complicated scenes with weakly ... Voir le document complet

5

Modular Monitor Extensions for Information Flow Security in JavaScript

Modular Monitor Extensions for Information Flow Security in JavaScript

... available for either runtime or static ...an information flow monitor for a WHILE language with prim- itives for manipulating DOM-like trees and prove it ...an information ... Voir le document complet

17

Information Flow Policies vs Malware

Information Flow Policies vs Malware

... peat the same experiment as before for a benign version and malicious version of a finger scanner ...executing the be- nign version of the finger scanner while Blare verifies the ... Voir le document complet

11

Le gisant du cardinal d'Armagnac

Le gisant du cardinal d'Armagnac

... du cardinal, au décor abondant, qui est un mélange de celle de saint Louis d’Anjou, de celle de Jean Tissandier en donateur, de celle du même sous forme de gisant (Musée des Augustins de ... Voir le document complet

4

Show all 10000 documents...