10.1109/PCCC.2008.4745079">
 

Towards mathematically modeling the anonymity reasoning ability of an adversary

Document Type

Conference Proceeding

Publication Date

12-7-2008

Abstract

With the aim to preserve privacy over a communications network, a plethora of anonymous protocols have been proposed along with many empirical investigations into specific adversary attacks over those networks. However, few formal methods have been adequately developed and applied towards anonymous systems with the goal of modeling how an adversary reasons about anonymity. Indeed, many analyses assume a passive, global adversary but fail to provide a rigorous approach to defining and modeling anonymity concepts to ensure information and data assurance as is customary when formally proving other security aspects of a system. Hence, this paper proposes the possibilistic anonymity logical model (PALM) for capturing the knowledge and reasoning ability of an adversary in an anonymous network. Abstract © IEEE

Comments

Copyright © 2008, IEEE

Co-author D. Kelly was an AFIT PhD student at the time of this paper. (AFIT-DCS-ENG-09-08, March 2009)

Source Publication

International Performance Computing and Communications Conference, 2008 IEEE

This document is currently not available here.

Share

COinS