Calculating Quantitative Integrity and Secrecy for Imperative Programs

Calculating Quantitative Integrity and Secrecy for Imperative Programs

Tom Chothia, Chris Novakovic, Rajiv Ranjan Singh
Copyright: © 2015 |Volume: 6 |Issue: 2 |Pages: 24
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466678668|DOI: 10.4018/IJSSE.2015040102
Cite Article Cite Article

MLA

Chothia, Tom, et al. "Calculating Quantitative Integrity and Secrecy for Imperative Programs." IJSSE vol.6, no.2 2015: pp.23-46. http://doi.org/10.4018/IJSSE.2015040102

APA

Chothia, T., Novakovic, C., & Singh, R. R. (2015). Calculating Quantitative Integrity and Secrecy for Imperative Programs. International Journal of Secure Software Engineering (IJSSE), 6(2), 23-46. http://doi.org/10.4018/IJSSE.2015040102

Chicago

Chothia, Tom, Chris Novakovic, and Rajiv Ranjan Singh. "Calculating Quantitative Integrity and Secrecy for Imperative Programs," International Journal of Secure Software Engineering (IJSSE) 6, no.2: 23-46. http://doi.org/10.4018/IJSSE.2015040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper presents a framework for calculating measures of data integrity for programs in a small imperative language. The authors develop a Markov chain semantics for their language which calculates Clarkson and Schneider's definitions of data contamination, data suppression, program suppression and program transmission. The authors then propose their own definition of program integrity for probabilistic specifications. These definitions are based on conditional mutual information and entropy; they present a result relating them to mutual information, which can be calculated by a number of existing tools. The authors extend a quantitative information flow tool (CH-IMP) to calculate these measures of integrity and demonstrate this tool with examples including error correcting codes, the Dining Cryptographers protocol and the attempts by a number of banks to influence the Libor rate.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.