Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
Non-interference, who needs it?, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.237-238, 2001. ,
DOI : 10.1109/CSFW.2001.930149
Assessing security threats of looping constructs, Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. POPL '07, pp.225-235, 2007. ,
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007. ,
DOI : 10.3233/JCS-2007-15302
A mathematical theory of communication. The Bell system technical journal 27, pp.379-423, 1948. ,
Covert Channel Capacity, 1987 IEEE Symposium on Security and Privacy, pp.60-66, 1987. ,
DOI : 10.1109/SP.1987.10013
Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow, p.3453, 2011. ,
Quantifying Information Leakage of Randomized Protocols, Lecture Notes in Computer Science, vol.7737, pp.68-87, 2013. ,
DOI : 10.1007/978-3-642-35873-9_7
URL : https://hal.archives-ouvertes.fr/hal-01242614
Specification and refinement of probabilistic processes, [1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science, pp.266-277, 1991. ,
DOI : 10.1109/LICS.1991.151651
Markov Decision Processes: Discrete Stochastic Dynamic Programming, 1994. ,
DOI : 10.1002/9780470316887
Introduction to Numerical Analysis, Texts in Applied Mathematics, 2010. ,
Information Theory and Statistical Mechanics, Physical Review, vol.106, issue.4, pp.620-630, 1957. ,
DOI : 10.1103/PhysRev.106.620
Quantitative Information Flow, Relations and Polymorphic Types, Special Issue on Lambda-calculus, type theory and natural language, pp.181-199, 2005. ,
DOI : 10.1093/logcom/exi009
On the Foundations of Quantitative Information Flow, Lecture Notes in Computer Science, vol.38, issue.1, pp.288-302, 2009. ,
DOI : 10.1137/060651380
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Automatic Quantification of Cache Side-Channels, Lecture Notes in Computer Science, vol.7358, pp.564-580, 2012. ,
DOI : 10.1007/978-3-642-31424-7_40
Quantitative Information Flow - Verification Hardness and Possibilities, 2010 23rd IEEE Computer Security Foundations Symposium, pp.15-27, 2010. ,
DOI : 10.1109/CSF.2010.9
Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
A lattice of information, [1993] Proceedings Computer Security Foundations Workshop VI, pp.65-70, 1993. ,
DOI : 10.1109/CSFW.1993.246638
Estimating the maximum information leakage, International Journal of Information Security, vol.176, issue.1, pp.219-242, 2008. ,
DOI : 10.1007/s10207-007-0050-x
Abstract non-interference: parameterizing noninterference by abstract interpretation, pp.186-197, 2004. ,
An abstract interpretation-based model for safety semantics, International Journal of Computer Mathematics, vol.116, issue.4, pp.665-694, 2011. ,
DOI : 10.1007/BF01211865
Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008. ,
DOI : 10.1016/j.ic.2007.07.003
URL : https://hal.archives-ouvertes.fr/inria-00349225
Probabilistic Anonymity, LNCS, vol.3653, pp.171-185, 2005. ,
DOI : 10.1007/11539452_16
URL : https://hal.archives-ouvertes.fr/inria-00201101
Quantifying maximal loss of anonymity in protocols, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.206-217, 2009. ,
DOI : 10.1145/1533057.1533087
Lagrange multipliers and maximum information leakage in different observational models. PLAS '08, pp.135-146, 2008. ,
Depth-First Search and Linear Graph Algorithms, SIAM Journal on Computing, vol.1, issue.2, pp.146-160, 1972. ,
DOI : 10.1137/0201010
Model-Checking ??-Regular Properties of Interval Markov Chains, Lecture Notes in Computer Science, vol.4962, pp.302-317, 2008. ,
DOI : 10.1007/978-3-540-78499-9_22
Interval-valued finite Markov chains, Reliable Computing, vol.8, issue.2, pp.97-113, 2002. ,
DOI : 10.1023/A:1014745904458
Entropy Maximization for Markov and Semi-Markov Processes, Methodology and Computing in Applied Probability, vol.6, issue.1, pp.109-127, 2004. ,
DOI : 10.1023/B:MCAP.0000012418.88825.18
Formal Verification of Probabilistic Systems, 1997. ,
Temporal logics for the specification of performance and reliability, STACS. Lecture Notes in Computer Science, vol.1200, pp.165-176, 1997. ,
DOI : 10.1007/BFb0023457
Abstract Probabilistic Automata, Lecture Notes in Computer Science, vol.2, issue.1-2, pp.324-339, 2011. ,
DOI : 10.1007/11817949_5
URL : https://hal.archives-ouvertes.fr/hal-01084342