D. Clark, S. Hunt, and P. Malacaria, Quantitative information flow, relations and polymorphic types, J. of Logic and Computation, vol.18, issue.2, pp.181-199, 2005.

C. E. Shannon, A mathematical theory of communication, Bell System Technical Journal, vol.27, pp.625-56, 1948.

G. Massey and . Entropy, Proceedings of the IEEE Int. Symposium on Information Theory, p.204, 1994.

G. Smith, On the foundations of quantitative information flow, Proc. of FOSSACS, vol.5504, pp.288-302, 2009.

M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring information leakage using generalized gain functions, Proc. of CSF, pp.265-279, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00734044

A. Mciver, L. Meinicke, and C. Morgan, Compositional Closure for Bayes Risk in Probabilistic Noninterference, Proc. of ICALP, vol.6199, pp.223-235, 2010.

A. Khinchin, Mathematical Foundations of Information Theory, 1957.

A. Rényi, Proceedings of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability, pp.547-561, 1961.

B. Lin and D. Kifer, Information measures in statistical privacy and data processing applications, TKDD, vol.9, issue.4, p.28, 2015.

M. S. Alvim, K. Chatzikokolakis, A. Mciver, C. Morgan, C. Palamidessi et al., Axioms for information leakage, Proc. of CSF, pp.77-92, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01330414

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, On the Bayes risk in information-hiding protocols, J. of Comp. Security, vol.16, issue.5, pp.531-571, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00349224

M. S. Alvim, K. Chatzikokolakis, A. Mciver, C. Morgan, C. Palamidessi et al., Additive and multiplicative notions of leakage, and their capacities, Proc. of CSF, pp.308-322, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00989462

M. S. Alvim, A. Scedrov, and F. B. Schneider, When not all bits are equal: Worth-based information flow, Proc. 3rd Conference on Principles of Security and Trust, pp.120-139, 2014.

A. Mciver, C. Morgan, G. Smith, B. Espinoza, and L. Meinicke, Abstract channels and their robust information-leakage ordering, Proc. of POST, vol.8414, pp.83-102, 2014.

R. T. Rockafellar, Convex analysis, 1970.

S. Shalev-shwartz, Online learning and online convex optimization, Foundations and Trends in, Machine Learning, vol.4, issue.2, pp.107-194, 2012.

M. Boreale and F. Pampaloni, Quantitative information flow under generic leakage functions and adaptive adversaries, Proc. of FORTE, vol.8461, pp.166-181, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01398015

M. Boreale and F. Pampaloni, Quantitative information flow under generic leakage functions and adaptive adversaries, Logical Methods in Computer Science, vol.11, issue.4
URL : https://hal.archives-ouvertes.fr/hal-01398015

J. Mclean, Security models and information flow, Proc. of S&P, pp.180-189, 1990.

G. Smith and D. Volpano, Secure information flow in a multi-threaded imperative language, Proc. of POPL, POPL '98, pp.355-364, 1998.

M. Giry, A categorical approach to probability theory, vol.915, pp.68-85, 1981.

A. Mciver, L. Meinicke, and C. Morgan, A Kantorovich-monadic powerdomain for information hiding, with probability and nondeterminism, Proc. LiCS, 2012.

T. Schrijvers, A monadic model for computations that leak secrets, 2015.

A. Mciver, L. Meinicke, and C. Morgan, Hidden-markov program algebra with iteration, Mathematical Structures in Computer Science, vol.25, issue.2, pp.320-360, 2015.

F. Van-breugel, The metric monad for probabilistic nondeterminism, 2005.

T. M. Cover and J. A. Thomas, Elements of Information Theory, 2006.

C. Dwork, Differential privacy, Proc. of ICALP, vol.4052, pp.1-12, 2006.

I. Csiszár, Axiomatic characterizations of information measures, Entropy, vol.10, issue.3, p.261, 2008.

D. Denning, C. , and D. Security, , 1983.

P. Malacaria, Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007.

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Inf. and Comp, vol.206, issue.2-4, pp.378-401, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00201110

P. Malacaria and H. Chen, Lagrange multipliers and maximum information leakage in different observational models, Proc. of PLAS, ACM, pp.135-146, 2008.

I. S. Moskowitz, R. E. Newman, and P. F. Syverson, Quasi-anonymous channels, Proc. of CNIS 2003, IASTED, pp.126-131, 2003.

I. S. Moskowitz, R. E. Newman, D. P. Crepeau, and A. R. Miller, Covert channels and anonymizing networks, Proc. of WPES, pp.79-88, 2003.

M. S. Alvim, M. E. Andres, and C. Palamidessi, Information Flow in Interactive Systems, J. of Comp. Security, vol.1, issue.20, pp.3-50, 2012.
URL : https://hal.archives-ouvertes.fr/inria-00479672

D. Kifer and B. Lin, Towards an axiomatization of statistical privacy and utility, Proc. of PODS, pp.147-158, 2010.

B. Lin and D. Kifer, Reasoning about privacy using axioms, Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers, ACSCC 2012, pp.975-979, 2012.

D. Kifer and B. Lin, An axiomatic view of statistical privacy and utility, Journal of Privacy and Confidentiality, vol.4, issue.1, pp.5-49, 2012.