Conference paper
A Flow-Sensitive Analysis of Privacy Properties
In this paper we consider service oriented architectures where many components interact with one another using a wireless network. We are interested in questions like: ldr Can I be sure that I do not get unsolicited information from some service? - unless I give my permission? ldr Can I be sure that information I send to some service never is leaked to another service? - unless I give my permission? We shall develop a static program analysis for the pi- calculus and show how it can be used to give privacy guarantees like the ones requested above.
The analysis records the explicit information flow of the system and keeps track of, not only the potential configurations of the system, but also the order in which they may be encountered.
Language: | English |
---|---|
Publisher: | IEEE Computer Society Press |
Year: | 2007 |
Pages: | 249-264 |
Proceedings: | Computer Security Foundations Symposium |
ISBN: | 0769528198 and 9780769528199 |
ISSN: | 23775459 and 10636900 |
Types: | Conference paper |
DOI: | 10.1109/CSF.2007.4 |
ORCIDs: | Nielson, Hanne Riis and Nielson, Flemming |