Formal privacy analysis of communication protocols for identity management

7Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Over the years, formal methods have been developed for the analysis of security and privacy aspects of communication in IT systems. However, existing methods are insufficient to deal with privacy, especially in identity management (IdM), as they fail to take into account whether personal information can be linked to its data subject. In this paper, we propose a general formal method to analyze privacy of communication protocols for IdM. To express privacy, we represent knowledge of personal information in a three-layer model. We show how to deduce knowledge from observed messages and how to verify a range of privacy properties. We validate the approach by applying it to an IdM case study. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Veeningen, M., De Weger, B., & Zannone, N. (2011). Formal privacy analysis of communication protocols for identity management. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7093 LNCS, pp. 235–249). https://doi.org/10.1007/978-3-642-25560-1_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free