Formal privacy analysis of communication protocols for identity management

Meilof Veeningen, Benne de Weger, Nicola Zannone

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

7 Citations (Scopus)

Abstract

Over the years, formal methods have been developed for the analysis of security and privacy aspects of communication in IT systems. However, existing methods are insufficient to deal with privacy, especially in identity management (IdM), as they fail to take into account whether personal information can be linked to its data subject. In this paper, we propose a general formal method to analyze privacy of communication protocols for IdM. To express privacy, we represent knowledge of personal information in a three-layer model. We show how to deduce knowledge from observed messages and how to verify a range of privacy properties. We validate the approach by applying it to an IdM case study.

Original languageEnglish
Title of host publicationInformation Systems Security - 7th International Conference, ICISS 2011, Proceedings
Pages235-249
Number of pages15
Volume7093 LNCS
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event7th International Conference on Information Systems Security, ICISS 2011 - Kolkata, India
Duration: 15 Dec 201119 Dec 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7093 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Conference

Conference7th International Conference on Information Systems Security, ICISS 2011
CountryIndia
CityKolkata
Period15/12/1119/12/11

Fingerprint Dive into the research topics of 'Formal privacy analysis of communication protocols for identity management'. Together they form a unique fingerprint.

Cite this