2014
DOI: 10.1007/978-3-319-08867-9_11
|View full text |Cite
|
Sign up to set email alerts
|

A Conference Management System with Verified Document Confidentiality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 29 publications
(20 citation statements)
references
References 27 publications
(30 reference statements)
0
20
0
Order By: Relevance
“…Smaller relations B mean that an observer may deduce some information about the secrets, but nothing beyond B-for example, if B is an equivalence relation, then the observer may deduce the equivalence class, but not the concrete secret within the equivalence class. The original formulation of BD security in [18] includes an additional parameter T, a declassification trigger: The above condition is only required to hold for traces tr where T does not occur. Hence, as soon as the trigger occurs, the security property no longer offers any guarantees.…”
Section: Bd Security Recalledmentioning
confidence: 99%
See 1 more Smart Citation
“…Smaller relations B mean that an observer may deduce some information about the secrets, but nothing beyond B-for example, if B is an equivalence relation, then the observer may deduce the equivalence class, but not the concrete secret within the equivalence class. The original formulation of BD security in [18] includes an additional parameter T, a declassification trigger: The above condition is only required to hold for traces tr where T does not occur. Hence, as soon as the trigger occurs, the security property no longer offers any guarantees.…”
Section: Bd Security Recalledmentioning
confidence: 99%
“…In our case studies, we assume the observers to be users of the system, and our goal is to verify that, by interacting with the system, the observers cannot learn more about confidential information than what we have specified. As a first case study, we have developed CoCon [18], a conference system (à la EasyChair) verified for confidentiality. We have verified a comprehensive list of confidentiality properties, systematically covering the relevant sources of information from CoCon's application logic [18, §4.5].…”
Section: Introductionmentioning
confidence: 99%
“…Their work has been recently extended to support any cloud-based system such as public tender management and recruitment process. Kanav et al [17] introduce CoCon, a formally verified implementation of conference management system that guarantees confidentiality. All of the mentioned systems, however, assume trusted managers.…”
Section: Related Workmentioning
confidence: 99%
“…Programs can be written and verified in Isabelle/HOL, and efficient code for them (in Haskell, Standard ML, OCaml and Scala) can be produced using a code generator [19]. This certified programming methodology has yielded a wide range of verified software systems, from a Java compiler [32] to an LTL model checker [14] to a conference management system [23]. The formal guarantees of all such systems, as well as those considered by some formal certification agencies [21], are based on one major assumption: the correctness/consistency of Isabelle/HOL's inference engine.…”
Section: Introductionmentioning
confidence: 99%