AnoA: A framework for analyzing anonymous communication protocols
Protecting individuals' privacy in online communications has become a challenge of
paramount importance. To this end, anonymous communication (AC) protocols such as the …
paramount importance. To this end, anonymous communication (AC) protocols such as the …
Probabilistic ω-automata
Probabilistic ω-automata are variants of nondeterministic automata over infinite words where
all choices are resolved by probabilistic distributions. Acceptance of a run for an infinite input …
all choices are resolved by probabilistic distributions. Acceptance of a run for an infinite input …
The 10,000 facets of MDP model checking
This paper presents a retrospective view on probabilistic model checking. We focus on
Markov decision processes (MDPs, for short). We survey the basic ingredients of MDP …
Markov decision processes (MDPs, for short). We survey the basic ingredients of MDP …
Maximizing the conditional expected reward for reaching the goal
The paper addresses the problem of computing maximal conditional expected accumulated
rewards until reaching a target state (briefly called maximal conditional expectations) in finite …
rewards until reaching a target state (briefly called maximal conditional expectations) in finite …
Quantitative analysis of opacity in cloud computing systems
Federated cloud systems increase the reliability and reduce the cost of the computational
support. The resulting combination of secure private clouds and less secure public clouds …
support. The resulting combination of secure private clouds and less secure public clouds …
A survey on measuring anonymity in anonymous communication systems
T Lu, Z Du, ZJ Wang - IEEE Access, 2019 - ieeexplore.ieee.org
The popularity of Internet applications has made communication privacy an increasingly
important security requirement. As an important aspect of privacy, anonymity ensures that a …
important security requirement. As an important aspect of privacy, anonymity ensures that a …
Metrics for differential privacy in concurrent systems
Originally proposed for privacy protection in the context of statistical databases, differential
privacy is now widely adopted in various models of computation. In this paper we investigate …
privacy is now widely adopted in various models of computation. In this paper we investigate …
Confidentiality for probabilistic multi-threaded programs and its verification
Confidentiality is an important concern in today's information society: electronic payment and
personal data should be protected appropriately. This holds in particular for multi-threaded …
personal data should be protected appropriately. This holds in particular for multi-threaded …
Probabilistic information flow
In recent years, there has been a growing interest in considering the probabilistic aspects of
Information Flow. In this abstract we review some of the main approaches that have been …
Information Flow. In this abstract we review some of the main approaches that have been …
Opacity in internet of things with cloud computing (short paper)
Internet of Things (IoT) with Cloud Computing (CC) is a new paradigm incorporating a
pervasive presence of a wide range of things/objects which can interact with each other and …
pervasive presence of a wide range of things/objects which can interact with each other and …