License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported license (CC BY-NC-ND 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagRep.2.11.135
URN: urn:nbn:de:0030-drops-39824
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2013/3982/
Go back to Dagstuhl Reports


Köpf, Boris ; Malacaria, Paquale ; Palamidessi, Catuscia
Weitere Beteiligte (Hrsg. etc.): Boris Köpf and Pasquale Malacaria and Catuscia Palamidessi

Quantitative Security Analysis (Dagstuhl Seminar 12481)

pdf-format:
dagrep_v002_i011_p135_s12481.pdf (0.8 MB)


Abstract

The high amount of trust put into today's software systems calls for a rigorous analysis of their security. Unfortunately, security is often in conflict with requirements on the functionality or the performance of a system, making perfect security an impossible or overly expensive goal. Under such constraints, the relevant question is not whether a system is secure, but rather how much security it provides. Quantitative notions of security can express degrees of protection and thus enable reasoning about the trade-off between security and conflicting requirements. Corresponding quantitative security analyses bear the potential of becoming an important tool for the rigorous development of practical systems, and a formal foundation for the management of security risks.

BibTeX - Entry

@Article{kpf_et_al:DR:2013:3982,
  author =	{Boris K{\"o}pf and Paquale Malacaria and Catuscia Palamidessi},
  title =	{{Quantitative Security Analysis (Dagstuhl Seminar 12481)}},
  pages =	{135--154},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{11},
  editor =	{Boris K{\"o}pf and Pasquale Malacaria and Catuscia Palamidessi},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2013/3982},
  URN =		{urn:nbn:de:0030-drops-39824},
  doi =		{10.4230/DagRep.2.11.135},
  annote =	{Keywords: Security, Privacy,Information theory, Programming languages, Formal methods}
}

Keywords: Security, Privacy,Information theory, Programming languages, Formal methods
Collection: Dagstuhl Reports, Volume 2, Issue 11
Issue Date: 2013
Date of publication: 25.03.2013


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI