POSTER–TRIPLEX: Verifying Data Minimisation in Communication Systems

نویسندگان

  • Meilof Veeningen
  • Mayla Brusò
  • Jerry den Hartog
  • Nicola Zannone
چکیده

Systems dealing with personal information are legally required to satisfy the principle of data minimisation. Privacy-enhancing protocols use cryptographic primitives to minimise the amount of personal information exposed by communication. However, the complexity of these primitives and their interplay makes it hard for noncryptography experts to understand the privacy implications of their use. In this demo, we present TRIPLEX, a framework for the analysis of data minimisation in privacy-enhancing protocols.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ساختار مولکول DNA سه رشته ای: اهمیت و کاربردهای پزشکی آن

Back in 1957, when investigators produced a triple-stranded form of DNA while studying synthetic nucleic acids, few researchers paid much attention to the discovery. However, triplex DNA was never entirely forgotton and especially since 1987 its structural and functional importance in biological systems as well as its medical applications and therapeutic potentional have been extensively studie...

متن کامل

Finite-Horizon Bisimulation Minimisation for Probabilistic Systems

We present model reduction techniques to improve the efficiency and scalability of verifying probabilistic systems over a finite time horizon. We propose a finite-horizon variant of probabilistic bisimulation for discrete-time Markov chains, which preserves a bounded fragment of the temporal logic PCTL. In addition to a standard partitionrefinement based minimisation algorithm, we present on-th...

متن کامل

High-Speed Data Dissemination over Device-to-Device Millimeter-Wave Networks for Highway Vehicular Communication

Gigabit-per-second connectivity among vehicles is expected to be a key enabling technology for sensor information sharing, in turn, resulting in safer Intelligent Transportation Systems (ITSs). Recently proposed millimeter-wave (mmWave) systems appear to be the only solution capable of meeting the data rate demand imposed by future ITS services. In this poster, we assess the performance of a mm...

متن کامل

Poster: Fast Object Identification for Kernel Data Anomaly Detection

As recent adversaries turned their eyes to attacking a system through non-control kernel data, in order to ensure the integrity of the kernel, the need arose for verifying noncontrol kernel data. This complicates typical security measures relying on integrity specifications set by security administrators, as it is non-trivial to manually encompass specifications for noncontrol kernel data. Fore...

متن کامل

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset

We present DIALDroid, a scalable and accurate tool for analyzing inter-app Inter-Component Communication (ICC) among Android apps, which outperforms current stateof-the-art ICC analysis tools. Using DIALDroid, we performed the first large-scale detection of collusive and vulnerable apps based on inter-app ICC data flows among 110,150 real-world apps and identified key security insights.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013