Opacity Analysis in Trust Management Systems

@inproceedings{Becker2011OpacityAI,
  title={Opacity Analysis in Trust Management Systems},
  author={Moritz Y. Becker and Masoud Koleini},
  booktitle={ISC},
  year={2011}
}
Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy. 

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-2 OF 2 CITATIONS

Foundations of Logic-Based Trust Management

  • 2012 IEEE Symposium on Security and Privacy
  • 2012
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 21 REFERENCES

Design and Semantics of a Decentralized Authorization Language

  • 20th IEEE Computer Security Foundations Symposium (CSF'07)
  • 2007
VIEW 5 EXCERPTS

Information Flow in Credential Systems

  • 2010 23rd IEEE Computer Security Foundations Symposium
  • 2010
VIEW 3 EXCERPTS

DKAL: Distributed-Knowledge Authorization Language

  • 2008 21st IEEE Computer Security Foundations Symposium
  • 2008
VIEW 1 EXCERPT

SAML 2.0 Profile of XACML v2

A. Anderson, H. Lockhart
  • OASIS Standard,
  • 2005
VIEW 1 EXCERPT

Cassandra: flexible trust management, applied to electronic health records

  • Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004.
  • 2004
VIEW 1 EXCERPT

Safety in Automated Trust Negotiation

  • IEEE Symposium on Security and Privacy
  • 2004
VIEW 1 EXCERPT