Corpus ID: 18104408

Knowledge and Security

@article{Pucella2013KnowledgeAS,
  title={Knowledge and Security},
  author={Riccardo Pucella},
  journal={ArXiv},
  year={2013},
  volume={abs/1305.0876}
}
Epistemic concepts, and in some cases epistemic logic, have been used in security research to formalize security properties of systems. This survey illustrates some of these uses by focusing on confidentiality in the context of cryptographic protocols, and in the context of multi-level security systems. 
An Epistemic Foundation for Authentication Logics (Extended Abstract)
TLDR
This work presents a simple logic based on the well-understood modal operators of knowledge, time, and probability, and shows that it is able to handle issues that have often been swept under the rug by other approaches, while being flexible enough to capture all the higher- level security notions that appear in BAN logic. Expand
Telling Lies in Process Algebra
  • M. Mousavi, M. Varshosaz
  • Computer Science
  • 2018 International Symposium on Theoretical Aspects of Software Engineering (TASE)
  • 2018
TLDR
This work expresses the epistemic properties of operational frameworks in a rich extension of modal µ-calculus with the belief modality and defines the semantics of their operational models in the semantic domain of the logic. Expand
A Substructural Epistemic Resource Logic: Theory and Modelling Applications
TLDR
A substructural epistemic logic is presented, based on Boolean BI, in which the epistemic modalities are parametrized on agents' local resources, and the logic combines Boolean BI's resource semantics with epistemic agency. Expand
Autoepistemic answer set programming
TLDR
The main result proves that this new semantics precisely captures the set of world views of the original semantics that are founded, and paves the way for the development of an autoepistemic extension of ASP. Expand
Knowledge requires belief – and it doesn’t? On belief as such and belief necessary for knowledge
ABSTRACT Does knowledge entail belief? This paper argues that the answer depends on how one interprets ‘belief’. There are two different notions of belief: belief as such and belief for knowledge.Expand
Formalising privacy policies in social networks
TLDR
This work provides specific rules for describing Twitter's behaviour, and proves that it is privacy-preserving (i.e., that privacy is preserved under every possible event of the system), and shows how Twitter and Facebook are not privacy- Preserving in the presence of additional natural privacy policies. Expand
Privacy Policies for Social Networks - A Formal Approach
Online Social Networks (OSNs) are ubiquitous, with more than 70% of Internet users being part of them. The pervasive nature of OSNs brings many threats and challenges, privacy being one of them. VeryExpand
Knowledge before Gettier
ABSTRACT According to a historical claim oft-repeated by contemporary epistemologists, the ‘traditional’ conception of knowledge prevailed in Western philosophy prior to the publication in 1963 ofExpand
Science, technology, security: Towards critical collaboration
TLDR
This work identifies several key challenges to critical social engagement of STS scholars in security-related issues and demonstrates how these challenges played out over the course of three case studies from their own experience in engaging security communities of practice. Expand
Setting a Knowledge Boundary for Enhancing Work Coordination and Team Performance: Knowledge Protection Regulation across Teams
TLDR
The analysis results drawn from 138 teams of seven companies show that both task uncertainty and task interdependency enhance knowledge protection regulation in teams and IT support moderates the relationship between task Uncertainty and knowledge Protection regulation. Expand
...
1
2
...

References

SHOWING 1-10 OF 131 REFERENCES
A complete and decidable security-specialised logic and its application to the TESLA protocol
TLDR
A logic to reason about security protocols by means of temporal and epistemic concepts is examined, and results on completeness and decidability of the formalism as well as its expressiveness are reported. Expand
Update Semantics of Security Protocols
We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemicExpand
Epistemic temporal logic for information flow security
TLDR
The paper presents a computational model and an epistemic temporal logic used to reason about knowledge acquired by observing program outputs that elegantly capture standard notions of noninterference and declassification in the literature as well as information flow properties where sensitive and public data intermingle in delicate ways. Expand
A Logic for the Analysis of Cryptographic Protocols
TLDR
A logic designed to analyze cryptographic protocols has distinct means for representing propositional knowledge in the sense of familiarity with an individual, e.g., a particular key. Expand
Information flow in nondeterministic systems
  • J. T. Wittbold, D. Johnson
  • Computer Science
  • Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
  • 1990
TLDR
An analysis of some recent combinatorial theories of computer security is presented from the perspective of information theory, intended to be applicable to nondeterministic systems that may be networked. Expand
A Spatial-Epistemic Logic and Tool for Reasoning about Security Protocols
Reasoning about security properties involves reasoning about where the knowledge of the several principals of a system is located, and how it evolves over time. Building on this observation, weExpand
Security Policies and Security Models
We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information inExpand
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the actions of a maliciousExpand
The Complexity of Epistemic Model Checking: Clock Semantics and Branching Time
TLDR
The paper characterizes the complexity of model checking branching time logics of knowledge in finite state systems with respect to the clock semantics. Expand
A logical approach to multilevel security of probabilistic systems
  • J. W. Gray, P. Syverson
  • Computer Science
  • Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy
  • 1992
A second-order modal logic for reasoning about multilevel security in probabilistic systems is proposed. A possible world semantics is presented, and it is proved that the logic is sound with respectExpand
...
1
2
3
4
5
...