Conference item icon

Conference item

The foul adversary: formal models

Abstract:

In classical notions of privacy in computer security, users attempt to keep their data private. A user that is bribed, extorted or blackmailed (i.e., coerced) may not do so. To get a general model of coercion, we strengthen the Dolev-Yao adversary with the ability to coerce others, to the foul adversary. We show that, depending on the setting, subtly different abilities should be assigned to the adversary – whereas existing approaches are one-size-fits-all. The variations of the foul adversar...

Expand abstract
Publication status:
Published
Peer review status:
Peer reviewed

Actions


Access Document


Files:
Publisher copy:
10.1007/978-3-030-02450-5_3

Authors


More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author
Publisher:
Springer Publisher's website
Journal:
ICFEM Journal website
Volume:
11232
Pages:
37-53
Series:
Lecture Notes in Computer Science
Host title:
20th International Conference on Formal Engineering Methods, 12-16 November 2018 - Gold Coast, Australia
Publication date:
2018-10-11
Acceptance date:
2018-06-29
DOI:
Source identifiers:
864582
ISBN:
9783030024499
Pubs id:
pubs:864582
UUID:
uuid:03a78cba-59d9-44c3-8527-7f5b68cb02e7
Local pid:
pubs:864582
Deposit date:
2018-07-05

Terms of use


Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP