<--- Back to Details
First PageDocument Content
Information theory / Information flow / Mutual information / Conditional mutual information / Conditional entropy
Date: 2017-06-07 20:45:26
Information theory
Information flow
Mutual information
Conditional mutual information
Conditional entropy

Automatically Calculating Quantitative Integrity Measures for Imperative Programs Tom Chothia1 , Chris Novakovic1 , and Rajiv Ranjan Singh2 1 2

Add to Reading List

Source URL: www.cs.bham.ac.uk

Download Document from Source Website

File Size: 783,50 KB

Share Document on Facebook

Similar Documents

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

DocID: 1xVUp - View Document

Nickel A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, and Xi Wang

Nickel A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, and Xi Wang

DocID: 1xV5v - View Document

A Semantic Approach to Secure Information Flow K. Rustan M. Leino1 and Rajeev Joshi2 1 DEC SRC, Palo Alto, CA 94301, USA

A Semantic Approach to Secure Information Flow K. Rustan M. Leino1 and Rajeev Joshi2 1 DEC SRC, Palo Alto, CA 94301, USA

DocID: 1xUnb - View Document

arXiv:1608.01654v2 [cs.PL] 7 NovHypercollecting Semantics and its Application to Static Analysis of Information Flow Mounir Assaf

arXiv:1608.01654v2 [cs.PL] 7 NovHypercollecting Semantics and its Application to Static Analysis of Information Flow Mounir Assaf

DocID: 1xTMD - View Document

Rain: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking

Rain: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking

DocID: 1xTBL - View Document