Safety versus Secrecy (invited Paper)
نویسنده
چکیده
Safety and secrecy are formulated for a deterministic programming language. A safety property is deened as a set of program traces and secrecy is deened as a binary relation on traces, characterizing a form of Noninterference. Safety properties may have sound and complete execution monitors whereas secrecy has no such monitor.
منابع مشابه
Formalization and Proof of Secrecy Properties
After looking at the security literature, you will nd secrecy is formalized in diierent ways, depending on the application. Applications have threat models that innuence our choice of secrecy properties. A property may be reasonable in one context and completely unsatisfactory in another if other threats exist. The primary goal of this panel is to foster discussion on what sorts of secrecy prop...
متن کاملAnalysis of a Biometric Authentication Protocol for Signature Creation Application
This paper presents an analysis of biometric authentication for signature creation application. We extend the established protocol in order to verify the two properties: secrecy and safety. We have analysed the protocol using applied pi calculus and ProVerif. The verification of the secrecy property shows that the protocol holds the biometric data securely while the verification of the safety p...
متن کاملIs Silence Golden? Patents versus Secrecy at the Firm Level
In the 1990s, patenting schemes changed in many respects: upcoming new technologies accelerated the shift from price competition towards competition based on technical inventions, a worldwide surge in patenting took place, and the ‘patent thicket’ arose as a consequence of strategic patenting. This study analyzes the importance of patenting versus secrecy as an effective alternative to protect ...
متن کاملAchievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel
In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...
متن کاملOn the Location of the Eavesdropper in Multi-Terminal Networks
Abstract We study the optimum location of an eavesdropper from a secrecy capacity perspective in multi-terminal networks with power control. We determine the logical location of an eavesdropper (represented by the channel gain from all the transmitters) which a) results in zero secrecy capacity for maximum number of users in the network and b) results in zero secrecy capacity for the bottle-nec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999