23 research outputs found

    I Did Not Accept That: Demonstrating Consent in Online Collection of Personal Data

    Get PDF
    Privacy in online collection of personal data is currently a much debated topic considering, amongst other reasons, the incidents with well known digital organisations, such as social networks and, in Europe, the recent EU/GDPR regulation. Among other required practices, explicit and simply worded consent from individuals must be obtained before collecting and using personal information. Further, individuals must also be given detailed information about what, how and what for data is collected. Consent is typically obtained at the collection point and, at a single point in time (ignoring updates), associated with Privacy Policies or End-User Agreements. At any moment, both the user and the organization should be able to produce evidence of this consent. This proof should not be disputable which leads us to strong cryptographic properties. The problem we discuss is how to robustly demonstrate such consent was given. We adapt fair-exchange protocols to this particular problem and, upon an exchange of personal data, we are able to produce a cryptographic receipt of acceptance that any party can use to prove consent and elicit non-repudiation. We discuss two broad strategies: a pure peerto-peer scheme and the use of a Trusted Third Party

    Optimistic Non-repudiation Protocol Analysis

    Get PDF
    The original publication is available at www.springerlink.com ; ISBN 978-3-540-72353-0 (Pring) 0302-9743 (Online) 1611-3349International audienceNon-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol

    Automatic Methods for Analyzing Non-repudiation Protocole with an Active Intruder

    Get PDF
    International audienceNon-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. After discussing the limitations of this method, we define a new one based on the handling of the knowledge of protocol participants. This second method is general and of natural use, as it consists in adding simple annotations in the protocol specification. It is very easy to implement in tools able to handle participants knowledge. We have implemented it in the AVISPA Tool and analyzed the optimistic Cederquist-Corin-Dashti protocol, discovering two attacks. This extension of the AVISPA Tool for handling non-repudiation opens a highway to the specification of many other properties, without any more change in the tool itself

    Dependable Transaction for Electronic Commerce

    No full text

    A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages

    No full text

    An Evenhanded Certified Email System for Contract Signing

    No full text

    A Portfolio Theory Approach to Network Program Selection

    No full text
    This article proposes a new approach to explaining network program selection behavior. It draws on literature in the area of finance to build a model of networks' program choice. The basis for the model is the traditional theory of portfolio selection. It will be argued that networks' management of program schedules is analogous to the management of a portfolio of investments. Networks maximize profits or returns while minimizing risk, and invest in programs to achieve this goal. Programs are, in effect, a network's assets. A network's selection of programs is motivated by its desire to maximize returns for a given level of risk. Therefore, its selection of programs and construction of a program schedule can be conceived of as an exercise in selecting financial securities in a portfolio. The network investor strives to develop a portfolio of securities that fulfills its investment objective. Earlier studies have looked at factors governing the cancellation and renewal of programs. A portfolio theory approach goes beyond these studies and provides a more comprehensive understanding of the factors that determine the selection of programs and the resulting optimal program mix.

    On the Security of a Multi-Party Certified Email Protocol

    No full text
    As a value-added service to deliver important data over the Internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a number of research papers appeared in the literature. But most of them deal with the two-party scenarios, i.e., there are only one sender and one recipient. In some applications, however, the same certified message may need to be sent to a set of recipients. In ISC'02, Ferrer-Gomila et. al. presented a multi-party certified email protocol [5]. It has two major features. A sender could notify multiple recipients of the same information while only those recipients who acknowledged are able to get the information. In addition, its exchange protocol is optimized, which has only three steps. In this paper, we demonstrate some flaws and weaknesses in that protocol, and propose an improved version which is robust against the identified attacks while preserving the features of the original protocol
    corecore