spacer
spacer search

Software Engineering for Service-Oriented Overlay Computers
Software Engineering for Service-Oriented Overlay Computers

Search
spacer
 
header
Main Menu
 
Home arrow Publications arrow All Publications

SENSORIA All Publications Print

Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

show main publications


Quantifying Information leakage in process calculi


@ARTICLE{Bor09,
  title = {{Quantifying Information leakage in process calculi }},
  author = {{Michele} {Boreale}},
  journal = {Information and Computation},
  pages = {699-725},
  abstract = {Building on simple information-theoretic concepts, we study two quantitative models of information leakage in the pi-calculus. The first model presupposes an attacker with an essentially unlimited computational power. The resulting notion of absolute leakage, measured in bits, is in agreement with secrecy as defined by Abadi and Gordon: a process has an absolute leakage of zero precisely when it satisfies secrecy. The second model assumes a restricted observation scenario, inspired by the testing equivalence framework, where the attacker can only conduct repeated success-or-failure experiments on processes. Moreover, each experiment has a cost in terms of communication effort. The resulting notion of leakage rate, measured in bits per action, is in agreement with the first model: the maximum amount of information that can be extracted by repeated experiments coincides with the absolute leakage A of the process. Moreover, the overall extraction cost is at least A/R, where R is the rate of the process. The compositionality properties of the two models are also investigated. },
  publisher = {Elsevier},
  volume = {207(6)},
  year = {2009},
  url = {http://rap.dsi.unifi.it/sensoriasite/IC09.pdf},
  address = {Italy},
  doi = {10.1016/j.ic.2008.12.007 },
  institution = {Dipartimento di Sistemi e Informatica},
  keywords = {information leakage, information theory, process calculi, secrecy},
  partner = {DSIUF},
  school = {University of Firenze},
  status = {public},
  task = {T4.4},
}

spacer

The Sensoria Project Website
2005 - 2010
spacer