A Flow-Sensitive Analysis of Privacy Properties

Hanne Riis Nielson, Flemming Nielson

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    298 Downloads (Pure)

    Abstract

    In this paper we consider service oriented architectures where many components interact with one another using a wireless network. We are interested in questions like: ldr Can I be sure that I do not get unsolicited information from some service? - unless I give my permission? ldr Can I be sure that information I send to some service never is leaked to another service? - unless I give my permission? We shall develop a static program analysis for the pi- calculus and show how it can be used to give privacy guarantees like the ones requested above. The analysis records the explicit information flow of the system and keeps track of, not only the potential configurations of the system, but also the order in which they may be encountered.
    Original languageEnglish
    Title of host publicationProceedings of Computer Security Foundations Symposium, CFS 2007
    PublisherIEEE Computer Society Press
    Publication date2007
    ISBN (Print)0-7695-2819-8
    DOIs
    Publication statusPublished - 2007
    EventComputer Security Foundations Symposium -
    Duration: 1 Jan 2007 → …

    Conference

    ConferenceComputer Security Foundations Symposium
    Period01/01/2007 → …

    Bibliographical note

    Copyright: 2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE

    Fingerprint

    Dive into the research topics of 'A Flow-Sensitive Analysis of Privacy Properties'. Together they form a unique fingerprint.

    Cite this