A probabilistic approach to information hiding

  • McIver A
  • Morgan C
N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security in a computer system must at some level be regarded as the control of information flow. Here we approach the issue 'from first principles', linking information flow in the sense of Shannon to a sequential programming model enriched with probabilities. From that we extract criteria for secure encapsulation of data, and we discuss the interaction of our criteria with refinement.

Cite

CITATION STYLE

APA

McIver, A., & Morgan, C. (2003). A probabilistic approach to information hiding (pp. 441–460). https://doi.org/10.1007/978-0-387-21798-7_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free