Automated Synthesis of Privacy-Preserving Distributed Applications

One of the central challenges in the development of distributed systems is the design of cryptographic protocols that meet the desired functional requirements and enforce the intended security properties. There is a common understanding that basic security properties such as secrecy and authentication can easily be enforced via encryption and digital signatures, respectively. Modern applications, however, exhibit more sophisticated and heterogeneous security requirements: for example, social networks, e-health systems, and reviewing systems must fulfill sophisticated access control, privacy, and anonymity constraints.

Provided by: Saarland University Topic: Security Date Added: Dec 2011 Format: PDF

Find By Topic