Design and verification of trusted collective adaptive systems
A Aldini - ACM Transactions on Modeling and Computer …, 2018 - dl.acm.org
Collective adaptive systems (CAS) often adopt cooperative operating strategies to run
distributed decision-making mechanisms. Sometimes, their effectiveness massively relies on …
distributed decision-making mechanisms. Sometimes, their effectiveness massively relies on …
[HTML][HTML] Probabilistic divide & congruence: Branching bisimilarity
V Castiglioni, S Tini - Theoretical Computer Science, 2020 - Elsevier
Since the seminal paper by Bloom, Fokkink and van Glabbeek, the Divide and Congruence
technique allows for the derivation of compositional properties of nondeterministic …
technique allows for the derivation of compositional properties of nondeterministic …
Measuring the confinement of probabilistic systems
In this paper we lay the semantic basis for a quantitative security analysis of probabilistic
systems by introducing notions of approximate confinement based on various process …
systems by introducing notions of approximate confinement based on various process …
Hidden-Markov program algebra with iteration
We use hidden Markov models to motivate a quantitative compositional semantics for
noninterference-based security with iteration, including a refinement-or 'implements' relation …
noninterference-based security with iteration, including a refinement-or 'implements' relation …
Estimating the maximum information leakage
A Aldini, A Di Pierro - International Journal of Information Security, 2008 - Springer
Preventing improper information leaks is a greatest challenge of the modern society. In this
paper, we present a technique for measuring the ability of several families of adversaries to …
paper, we present a technique for measuring the ability of several families of adversaries to …
Source-level reasoning for quantitative information flow
We present a novel formal system for proving quantitative-leakage properties of programs.
Based on a theory of Quantitative Information Flow (QIF) that models information leakage as …
Based on a theory of Quantitative Information Flow (QIF) that models information leakage as …
A Spectrum of Approximate Probabilistic Bisimulations
This paper studies various notions of approximate probabilistic bisimulation on labeled
Markov chains (LMCs). We introduce approximate versions of weak and branching …
Markov chains (LMCs). We introduce approximate versions of weak and branching …
A layered description of ATM cell traffic streams and correlation analysis
O Gihr, P Tran-Gia - IEEE INFCOM'91-Communications Societies …, 1991 - computer.org
An approach is presented to describe traffic processes in asynchronous transfer mode
(ATM) environments. Using a discrete-time Markov chain to describe the cell process …
(ATM) environments. Using a discrete-time Markov chain to describe the cell process …
Source-Level Reasoning for Quantifying Information Leaks
Abstract Information-leak analysis for programs designates certain variables as “high
security”, ie that should not be directly readable by an adversary; the aim then is to show that …
security”, ie that should not be directly readable by an adversary; the aim then is to show that …
Ask a (n) droid to tell you the odds: probabilistic security-by-contract for mobile devices
Security-by-contract is a paradigm proposed for the secure installation, usage, and
monitoring of apps into mobile devices, with the aim of establishing, controlling, and, if …
monitoring of apps into mobile devices, with the aim of establishing, controlling, and, if …