Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Language-based information-flow security
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …
behavior of a computing system satisfies important security policies such as confidentiality …
On the foundations of quantitative information flow
G Smith - International Conference on Foundations of Software …, 2009 - Springer
There is growing interest in quantitative theories of information flow in a variety of contexts,
such as secure information flow, anonymity protocols, and side-channel analysis. Such …
such as secure information flow, anonymity protocols, and side-channel analysis. Such …
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-
theoretic metrics to quantify the information revealed to an attacker. This allows us to …
theoretic metrics to quantify the information revealed to an attacker. This allows us to …
Declassification: Dimensions and principles
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …
principal security concern for systems permitting information release is whether this release …
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
Abstract Denial-of-Service (DoS) attacks pose a significant threat to the Internet today
especially if they are distributed, ie, launched simultaneously at a large number of systems …
especially if they are distributed, ie, launched simultaneously at a large number of systems …
A model for delimited information release
Much work on security-typed languages lacks a satisfactory account of intentional
information release. In the context of confidentiality, a typical security guarantee provided by …
information release. In the context of confidentiality, a typical security guarantee provided by …
Dimensions and principles of declassification
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …
principal security concern for systems permitting information release is whether this release …
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while
allowing useful computations on their private data. Deriving differential privacy guarantees …
allowing useful computations on their private data. Deriving differential privacy guarantees …
A perspective on information-flow control
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …
during execution to make sure that the program handles the information securely. Secure …
Anonymity protocols as noisy channels
We consider a framework in which anonymity protocols are interpreted as noisy channels in
the information-theoretic sense, and we explore the idea of using the notion of capacity as a …
the information-theoretic sense, and we explore the idea of using the notion of capacity as a …