Formalization and Proof of Secrecy Properties

  • Authors:
  • D. Volpano

  • Affiliations:
  • -

  • Venue:
  • CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

After looking at the security literature, you will find secrecy is formalized in different ways, depending on the application. Applications have threat models that influence our choice of secrecy properties. A property may be reasonable in one context and completely unsatisfactory in another if other threats exist. The primary goal of this panel is to foster discussion on what sorts of secrecy properties are appropriate for different applications and to investigate what they have in common. We also want to explore what is meant by secrecy in different contexts. Perhaps there is enough overlap among our threat models that we can begin to identify some key secrecy properties for wider application.