منابع مشابه
Handling Declared Information Leakage
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define formal tools in order to distinguish between authorized, or declared, information flows such as password testing (e.g., ATM, login processes, etc.) and non-authorized ones. We propose to define security policies as rewriting systems. Such policies define how the privac...
متن کاملInformation Leakage Games
We formalize the interplay between defender and adversary in a game-theoretic framework adapted to the specific issues of quantitative information flow. Assuming that both defender and adversary may be active and influence the system during the attack, we define a general framework of information leakage games in which the payoff function of the game is information leakage. We provide methods f...
متن کاملManaging Information Leakage
We explore the problem of managing information leakage by connecting two hitherto disconnected topics: entity resolution (ER) and data privacy (DP). As more of our sensitive data gets exposed to a variety of merchants, health care providers, employers, social sites and so on, there is a higher chance that an adversary can “connect the dots” and piece together our information, leading to even mo...
متن کاملStatistical Measurement of Information Leakage
Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the loss of anonymity in secure systems. However, previous work has tended to assume that the exact probabilities of every action are known, or that the system is non-deterministic. In this paper, we show that measures of ...
متن کاملRational Information Leakage
Empirical evidence suggests that information leakage in capital markets is common. We present a trading model to study the incentives of an informed trader (e.g., a well informed insider) to voluntarily leak information about an asset’s value to another independent trader. Our model shows that, while leaking information dissipates the insider’s information advantage about the asset’s value, it ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Problems in Engineering
سال: 2013
ISSN: 1024-123X,1563-5147
DOI: 10.1155/2013/962342