Symbolic privacy analysis through linkability and detectability

M.G. Veeningen, B.M.M. Weger, de, N. Zannone

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)
4 Downloads (Pure)

Samenvatting

More and more personal information is exchanged on-line using communication protocols. This makes it increasingly important that such protocols satisfy privacy by data minimisation. Formal methods have been used to verify privacy properties of protocols; but so far, mostly in an ad-hoc way. In previous work, we provided general definitions for the fundamental privacy concepts of linkability and detectability. However, this approach is only able to verify privacy properties for given protocol instances. In this work, by generalising the approach, we formally analyse privacy of communication protocols independently from any instance. We implement the model; identify its assumptions by relating it to the instantiated model; and show how to visualise results. To demonstrate our approach, we analyse privacy in Identity Mixer.
Originele taal-2Engels
TitelTrust Management VII (7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings)
RedacteurenC. Fernández-Gago, F. Martinelli, S. Pearson, I. Agudo
Plaats van productieBerlin
UitgeverijSpringer
Pagina's1-16
ISBN van geprinte versie978-3-642-38322-9
DOI's
StatusGepubliceerd - 2013

Publicatie series

NaamIFIP Advances in Information and Communication Technology
Volume401
ISSN van geprinte versie1868-4238

Vingerafdruk

Duik in de onderzoeksthema's van 'Symbolic privacy analysis through linkability and detectability'. Samen vormen ze een unieke vingerafdruk.

Citeer dit