Security and Privacy of Protocols and Software with Formal Methods [chapter]

Fabrizio Biondi, Axel Legay
2016 Lecture Notes in Computer Science  
The protection of users' data conforming to best practice and legislation is one of the main challenges in computer science. Very often, large-scale data leaks remind us that the state of the art in data privacy and anonymity is severely lacking. The complexity of modern systems make it impossible for software architect to create secure software that correctly implements privacy policies without the help of automated tools. The academic community needs to invest more effort in the formal
more » ... ation of security and anonymity properties, providing a deeper understanding of the underlying concepts and challenges and allowing the creation of automated tools to help software architects and developers. This track provides numerous contributions to the formal modeling of security and anonymity properties and the creation of tools to verify them on large-scale software projects. However, these basic properties are not defining which potentially sensitive information about the user is the system handling, or whether the system should have access to such information to start with [6, 11, 35] . This is the reason why we add the following property: Anonymity The user has control on what information about them is collected by the system, and can decide how it is collected and used, by whom, and for what purpose.
doi:10.1007/978-3-319-47166-2_61 fatcat:ygef2jw6dneabg7dgdskc26pz4