Symbolic privacy analysis through linkability and detectability

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

More and more personal information is exchanged on-line using communication protocols. This makes it increasingly important that such protocols satisfy privacy by data minimisation. Formal methods have been used to verify privacy properties of protocols; but so far, mostly in an ad-hoc way. In previous work, we provided general definitions for the fundamental privacy concepts of linkability and detectability. However, this approach is only able to verify privacy properties for given protocol instances. In this work, by generalising the approach, we formally analyse privacy of communication protocols independently from any instance. We implement the model; identify its assumptions by relating it to the instantiated model; and show how to visualise results. To demonstrate our approach, we analyse privacy in Identity Mixer.

Cite

CITATION STYLE

APA

Veeningen, M., de Weger, B., & Zannone, N. (2013). Symbolic privacy analysis through linkability and detectability. In IFIP Advances in Information and Communication Technology (Vol. 401, pp. 1–16). Springer Science and Business Media, LLC. https://doi.org/10.1007/978-3-642-38323-6_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free