Inductive Study of Confidentiality

نویسنده

  • Giampaolo Bella
چکیده

This document contains the full theory files accompanying article “Inductive Study of Confidentiality — for Everyone” [1]. They aim at an illustrative and didactic presentation of the Inductive Method of protocol analysis, focusing on the treatment of one of the main goals of security protocols: confidentiality against a threat model. The treatment of confidentiality, which in fact forms a key aspect of all protocol analysis tools, has been found cryptic by many learners of the Inductive Method, hence the motivation for this work. The theory files in this document guide the reader step by step towards design and proof of significant confidentiality theorems. These are developed against two threat models, the standard Dolev-Yao and a more audacious one, the General Attacker, which turns out to be particularly useful also for teaching purposes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Kerberos Version IV: Inductive Analysis of the Secrecy Goals

An operational model of crypto-protocols is tailored to the detailed analysis of the secrecy goals accomplished by Kerberos Version IV. The model is faithful to the specification of the protocol presented by the MIT technical plan [14] — e.g. timestamping, double session key delivery mechanism are included. It allows an eavesdropper to exploit the shared keys of compromised agents, and admits t...

متن کامل

Statement on Research

My research looks for patterns and structures of organizational behavior in the domains of technology management, computer security and infrastructure vulnerability. Case study alone results in rich detail and low generalizability [1]. In my targeted domains, grounded research often produces confidential results that cannot be disseminated beyond those involved with the problem in question. I c...

متن کامل

The Tension between Transparency and Confidentiality in International Arbitrations

The present research study intends to investigate the concepts of transparency, confidentiality and privacy within the scope of Investor-State Arbitration and International Commercial Arbitration.Transparency, confidentiality and privacy are the main pillars of international arbitration which have a close relationship together, however in some cases they are in a controversial situation. The te...

متن کامل

Study of Healthcare Service Recipients' Perceptions Regarding Observance of Patient Privacy and Medical Confidentiality in Teaching Healthcare Centers Affiliated with the Qom University of Medical Sciences in 2015-2016, Iran

Background and Objectives: Medical confidentiality and maintenance of patient personal privacy are considered two important moral obligations in medical ethics with a long history in medicine. To be efficient, a healthcare system needs active participation of and appropriate cooperation between the recipients and providers of healthcare services. This study was conducted to investigate healthca...

متن کامل

مقایسه‌ سطوح دسترسی و محرمانگی مدارک پزشکی در کشورهای منتخب و ایران

Introduction: Undoubtedly, the medical record is one of the most important documents containing the most sensitive information on the public health and treatment. As a matter of fact, protecting the confidentiality of the recorded information and the documents there in should be given top priority. Thus, given the importance of the confidentiality of medical document, and their impact on the be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Archive of Formal Proofs

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012