Developing GDPR Compliant Apps for the Edge

  • Lodge T
  • Crabtree A
  • Brown A
N/ACitations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Attack trees are an important modeling formalism to identify and quantify attacks on security and privacy. They are very useful as a tool to understand step by step the ways through a system graph that lead to the violation of security policies. In this paper, we present how attacks can be refined based on the violation of a policy. To that end we provide a formal definition of attack trees in Isabelle’s Higher Order Logic: a proof calculus that defines how to refine sequences of attack steps into a valid attack. We use a notion of Kripke semantics as formal foundation that then allows to express attack goals using branching time temporal logic CTL. We illustrate the use of the mechanized Isabelle framework on the example of a privacy attack to an IoT healthcare system.

Cite

CITATION STYLE

APA

Lodge, T., Crabtree, A., & Brown, A. (2018). Developing GDPR Compliant Apps for the Edge (pp. 313–328). https://doi.org/10.1007/978-3-030-00305-0_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free