Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Opacity Analysis in Trust Management Systems

Moritz Y. Becker and Masoud Koleini

Abstract

Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy.

Details

Publication typeInproceedings
Published in14th Information Security Conference (ISC 2011)
PublisherSpringer
> Publications > Opacity Analysis in Trust Management Systems