Security in a computer system must at some level be regarded as the control of information flow. Here we approach the issue 'from first principles', linking information flow in the sense of Shannon to a sequential programming model enriched with probabilities. From that we extract criteria for secure encapsulation of data, and we discuss the interaction of our criteria with refinement.
CITATION STYLE
McIver, A., & Morgan, C. (2003). A probabilistic approach to information hiding (pp. 441–460). https://doi.org/10.1007/978-0-387-21798-7_20
Mendeley helps you to discover research relevant for your work.