When Not All Bits Are Equal: Worth-Based Information Flow
Only recently have approaches to quantitative information flow started to challenge the presumption that all leaks involving a given number of bits are equally harmful. This paper proposes a framework to capture the semantics of information, making quanti
- PDF / 6,072,322 Bytes
- 322 Pages / 439.37 x 666.142 pts Page_size
- 71 Downloads / 226 Views
ARCoSS
Martín Abadi Steve Kremer (Eds.)
Principles of Security and Trust Third International Conference, POST 2014 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014 Grenoble, France, April 5–13, 2014, Proceedings
123
Lecture Notes in Computer Science
8414
Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board David Hutchison, UK Josef Kittler, UK Alfred Kobsa, USA John C. Mitchell, USA Oscar Nierstrasz, Switzerland Bernhard Steffen, Germany Demetri Terzopoulos, USA Gerhard Weikum, Germany
Takeo Kanade, USA Jon M. Kleinberg, USA Friedemann Mattern, Switzerland Moni Naor, Israel C. Pandu Rangan, India Doug Tygar, USA
Advanced Research in Computing and Software Science Subline of Lectures Notes in Computer Science Subline Series Editors Giorgio Ausiello, University of Rome ‘La Sapienza’, Italy Vladimiro Sassone, University of Southampton, UK
Subline Advisory Board Susanne Albers, University of Freiburg, Germany Benjamin C. Pierce, University of Pennsylvania, USA Bernhard Steffen, University of Dortmund, Germany Deng Xiaotie, City University of Hong Kong Jeannette M. Wing, Microsoft Research, Redmond, WA, USA
Martín Abadi Steve Kremer (Eds.)
Principles of Security and Trust Third International Conference, POST 2014 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014 Grenoble, France, April 5-13, 2014 Proceedings
13
Volume Editors Martín Abadi Microsoft Research Mountain View, CA, USA E-mail: [email protected] Steve Kremer Inria Nancy - Grand’Est Villers-lès-Nancy, France E-mail: [email protected]
ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-642-54791-1 e-ISBN 978-3-642-54792-8 DOI 10.1007/978-3-642-54792-8 Springer Heidelberg New York Dordrecht London Library of Congress Control Number: 2014933674 LNCS Sublibrary: SL 4 – Security and Cryptology © Springer-Verlag Berlin Heidelberg 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in ist current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution und
Data Loading...