Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

On the foundations of quantitative information flow

G Smith - International Conference on Foundations of Software …, 2009 - Springer
There is growing interest in quantitative theories of information flow in a variety of contexts,
such as secure information flow, anonymity protocols, and side-channel analysis. Such …

A survey on data leakage prevention systems

S Alneyadi, E Sithirasenan… - Journal of Network and …, 2016 - Elsevier
Protection of confidential data from being leaked to the public is a growing concern among
organisations and individuals. Traditionally, confidentiality of data has been preserved using …

Measures and models of nicotine dependence: positive reinforcement

S Glautier - Addiction, 2004 - Wiley Online Library
This paper addresses the problem of assessing nicotine dependence. The main objective is
to develop theory‐led suggestions for measures that will be relevant in the early phases of …

Shining light in dark places: Understanding the Tor network

D McCoy, K Bauer, D Grunwald, T Kohno… - … Symposium, PETS 2008 …, 2008 - Springer
To date, there has yet to be a study that characterizes the usage of a real deployed
anonymity service. We present observations and analysis obtained by participating in the …

Measuring information leakage using generalized gain functions

SA M'rio, K Chatzikokolakis… - 2012 IEEE 25th …, 2012 - ieeexplore.ieee.org
This paper introduces g-leakage, a rich generalization of the min-entropy model of
quantitative information flow. In g-leakage, the benefit that an adversary derives from a …

Declassification: Dimensions and principles

A Sabelfeld, D Sands - Journal of Computer Security, 2009 - content.iospress.com
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …

Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks

FC Freiling, T Holz, G Wicherski - … Security, Milan, Italy, September 12-14 …, 2005 - Springer
Abstract Denial-of-Service (DoS) attacks pose a significant threat to the Internet today
especially if they are distributed, ie, launched simultaneously at a large number of systems …

Dimensions and principles of declassification

A Sabelfeld, D Sands - 18th IEEE Computer Security …, 2005 - ieeexplore.ieee.org
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …

A model for delimited information release

A Sabelfeld, AC Myers - Software Security-Theories and Systems: Second …, 2004 - Springer
Much work on security-typed languages lacks a satisfactory account of intentional
information release. In the context of confidentiality, a typical security guarantee provided by …