Opacity Analysis in Trust Management Systems

  • Mo Becker ,
  • Masoud Koleini

14th Information Security Conference (ISC 2011) |

Published by Springer

Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy.