Hidden-Markov Program Algebra with iteration

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

We use Hidden Markov Models to motivate a quantitative compositional semantics for noninterference-based security with iteration, including a refinement- or "implements" relation that compares two programs with respect to their information leakage; and we propose a program algebra for source-level reasoning about such programs, in particular as a means of establishing that an "implementation" program leaks no more than its "specification" program.

This joins two themes: we extend our earlier work, having iteration but only qualitative, by making it quantitative; and we extend our earlier quantitative work by including iteration.

We advocate stepwise refinement and source-level program algebra, both as conceptual reasoning tools and as targets for automated assistance. A selection of algebraic laws is given to support this view in the case of quantitative noninterference; and it is demonstrated on a simple iterated password-guessing attack.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Hidden-Markov Program Algebra with iteration does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Hidden-Markov Program Algebra with iteration, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hidden-Markov Program Algebra with iteration will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-79643

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.