Specifying and verifying secrecy in workflows with arbitrarily many agents

5Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Web-based workflow management systems, like EasyChair, HealthVault, Ebay, or Amazon, often deal with confidential information such as the identity of reviewers, health data, or credit card numbers. Because the number of participants in the workflow is in principle unbounded, it is difficult to describe the information flow policy of such systems in specification languages that are limited to a fixed number of agents. We introduce a first-order version of HyperLTL, which allows us to express information flow requirements in workflows with arbitrarily many agents. We present a bounded model checking technique that reduces the violation of the information flow policy to the satisfiability of a first-order formula. We furthermore identify conditions under which the resulting satisfiability problem is guaranteed to be decidable.

Cite

CITATION STYLE

APA

Finkbeiner, B., Seidl, H., & Müller, C. (2016). Specifying and verifying secrecy in workflows with arbitrarily many agents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9938 LNCS, pp. 157–173). Springer Verlag. https://doi.org/10.1007/978-3-319-46520-3_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free