Opacity analysis in trust management systems

  • Authors:
  • Moritz Y. Becker;Masoud Koleini

  • Affiliations:
  • Microsoft Research, Cambridge, UK;University of Birmingham, UK

  • Venue:
  • ISC'11 Proceedings of the 14th international conference on Information security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy.