cocon a conference management system with verified
play

CoCon: A Conference Management System with Verified Document - PowerPoint PPT Presentation

CoCon: A Conference Management System with Verified Document Confidentiality Sudeep Kanav Peter Lammich Andrei Popescu Technische Universit at M unchen Overview What? Overview What? Implementation of CoCon, a conf. manag. sys.


  1. CoCon: A Conference Management System with Verified Document Confidentiality Sudeep Kanav Peter Lammich Andrei Popescu Technische Universit¨ at M¨ unchen

  2. Overview What?

  3. Overview What? • Implementation of CoCon, a conf. manag. sys.

  4. Overview What? • Implementation of CoCon, a conf. manag. sys. • Verification in Isabelle of its information flow

  5. Overview What? • Implementation of CoCon, a conf. manag. sys. • Verification in Isabelle of its information flow Why?

  6. Overview What? • Implementation of CoCon, a conf. manag. sys. • Verification in Isabelle of its information flow Why? • Anonymity and integrity concerns

  7. Why It is our pleasure to inform you that your paper has been accepted to the IEEE Symposium of Security and Privacy (Oakland) 2012.

  8. Why It is our pleasure to inform you that your paper has been accepted to the IEEE Symposium of Security and Privacy (Oakland) 2012. We are sorry to inform you that your paper was not one of those accepted for this year’s conference. We apologize for an earlier ”acceptance” notification. It was due to a system error.

  9. Why It is our pleasure to inform you that your paper has been accepted to the IEEE Symposium of Security and Privacy (Oakland) 2012. We are sorry to inform you that your paper was not one of those accepted for this year’s conference. We apologize for an earlier ”acceptance” notification. It was due to a system error.

  10. Overview What? • Implementation of CoCon, a conf. manag. sys. • Verification in Isabelle of its information flow Why? • Anonymity and integrity concerns

  11. Overview What? • Implementation of CoCon, a conf. manag. sys. • Verification in Isabelle of its information flow Why? • Anonymity and integrity concerns • System with complex information flow

  12. Overview What? • Implementation of CoCon, a conf. manag. sys. • Verification in Isabelle of its information flow Why? • Anonymity and integrity concerns • System with complex information flow • Knowledge on how to approach similar systems

  13. CoCon’s Architecture code generation Isabelle Scala Specification Program REST Web Service Web Application

  14. CoCon’s Architecture code generation Isabelle Scala Specification Program REST Web Service Web Application http://vmnipkow1.informatik.tu-muenchen.de Used it for Isabelle 2014 Workshop

  15. System Specification Multi-user, multi-conference system • Users: ID and password • State: papers, authors, reviews, discussions, notifications, . . . • Actions: register paper, upload new version , bid on papers (if committee), assign reviewer (if chair), . . . • Outputs: download paper, read review, list committee members, . . .

  16. End Product of System Specification step : state → act → out × state

  17. Verified Confidentiality Properties What, when, by whom

  18. Verified Confidentiality Properties What, when, by whom can be learned about

  19. Verified Confidentiality Properties What, when, by whom can be learned about the documents in the system (papers, reviews, discussions, preferences)

  20. Source Declassification Trigger Declassification Bound Paper Paper Authorship Last Uploaded Version Content Paper Authorship or PC Membership B Nothing Last Edited Version Review Review Authorship Before Discussion and All the Later Versions Review Authorship or Last Edited Version Non-Conflict PC Membership D Before Notification Review Authorship or Non-Conflict PC Membership D or Nothing PC Membership N or Paper Authorship N Discussion Non-Conflict PC Membership Nothing Decision Non-Conflict PC Membership Last Edited Version Non-Conflict PC Membership or PC Membership N or Paper Authorship N Nothing Reviewer Non-Conflict PC Membership Non-Conflict PC Membership R Assignment of Reviewers and to Paper Number of Reviewers Non-Conflict PC Membership R or Non-Conflict PC Membership Paper Authorship N of Reviewers Phase Stamps: B = Bidding, D = Discussion, N = Notification, R = Review

  21. Source Declassification Trigger Declassification Bound Paper Paper Authorship Last Uploaded Version Content Paper Authorship or PC Membership B Nothing Last Edited Version Review Review Authorship Before Discussion and All the Later Versions Review Authorship or Last Edited Version Non-Conflict PC Membership D Before Notification Review Authorship or Non-Conflict PC Membership D or Nothing PC Membership N or Paper Authorship N Discussion Non-Conflict PC Membership Nothing Decision Non-Conflict PC Membership Last Edited Version Non-Conflict PC Membership or PC Membership N or Paper Authorship N Nothing Reviewer Non-Conflict PC Membership Non-Conflict PC Membership R Assignment of Reviewers and to Paper Number of Reviewers Non-Conflict PC Membership R or Non-Conflict PC Membership Paper Authorship N of Reviewers Phase Stamps: B = Bidding, D = Discussion, N = Notification, R = Review

  22. Source Declassification Trigger Declassification Bound Paper Paper Authorship Last Uploaded Version Content Paper Authorship or PC Membership B Nothing Last Edited Version Review Review Authorship Before Discussion and All the Later Versions Review Authorship or Last Edited Version Non-Conflict PC Membership D Before Notification Review Authorship or Non-Conflict PC Membership D or Nothing PC Membership N or Paper Authorship N Discussion Non-Conflict PC Membership Nothing Decision Non-Conflict PC Membership Last Edited Version Non-Conflict PC Membership or PC Membership N or Paper Authorship N Nothing Reviewer Non-Conflict PC Membership Non-Conflict PC Membership R Assignment of Reviewers and to Paper Number of Reviewers Non-Conflict PC Membership R or Non-Conflict PC Membership Paper Authorship N of Reviewers Phase Stamps: B = Bidding, D = Discussion, N = Notification, R = Review

  23. Source Declassification Trigger Declassification Bound Paper Paper Authorship Last Uploaded Version Content Paper Authorship or PC Membership B Nothing Last Edited Version Review Review Authorship Before Discussion and All the Later Versions Review Authorship or Last Edited Version Non-Conflict PC Membership D Before Notification Review Authorship or Non-Conflict PC Membership D or Nothing PC Membership N or Paper Authorship N Discussion Non-Conflict PC Membership Nothing Decision Non-Conflict PC Membership Last Edited Version Non-Conflict PC Membership or PC Membership N or Paper Authorship N Nothing Reviewer Non-Conflict PC Membership Non-Conflict PC Membership R Assignment of Reviewers and to Paper Number of Reviewers Non-Conflict PC Membership R or Non-Conflict PC Membership Paper Authorship N of Reviewers Phase Stamps: B = Bidding, D = Discussion, N = Notification, R = Review

  24. Source Declassification Trigger Declassification Bound Paper Paper Authorship Last Uploaded Version Content Paper Authorship or PC Membership B Nothing Last Edited Version Review Review Authorship Before Discussion and All the Later Versions Review Authorship or Last Edited Version Non-Conflict PC Membership D Before Notification Review Authorship or Non-Conflict PC Membership D or Nothing PC Membership N or Paper Authorship N Discussion Non-Conflict PC Membership Nothing Decision Non-Conflict PC Membership Last Edited Version Non-Conflict PC Membership or PC Membership N or Paper Authorship N Nothing Reviewer Non-Conflict PC Membership Non-Conflict PC Membership R Assignment of Reviewers and to Paper Number of Reviewers Non-Conflict PC Membership R or Non-Conflict PC Membership Paper Authorship N of Reviewers Phase Stamps: B = Bidding, D = Discussion, N = Notification, R = Review

  25. Source Declassification Trigger Declassification Bound Paper Paper Authorship Last Uploaded Version Content Paper Authorship or PC Membership B Nothing Last Edited Version Review Review Authorship Before Discussion and All the Later Versions Review Authorship or Last Edited Version Non-Conflict PC Membership D Before Notification Review Authorship or Non-Conflict PC Membership D or Nothing PC Membership N or Paper Authorship N Discussion Non-Conflict PC Membership Nothing Decision Non-Conflict PC Membership Last Edited Version Non-Conflict PC Membership or PC Membership N or Paper Authorship N Nothing Reviewer Non-Conflict PC Membership Non-Conflict PC Membership R Assignment of Reviewers and to Paper Number of Reviewers Non-Conflict PC Membership R or Non-Conflict PC Membership Paper Authorship N of Reviewers Phase Stamps: B = Bidding, D = Discussion, N = Notification, R = Review

  26. Bounded-Deducibility Security ϕ : Event → Bool f : Event → Val V = ”filter with ϕ , then apply f , event-wise” List(Event) Nothing Nothing Nothing List(Val) Nothing Nothing Nothing List(Obs)

  27. Bounded-Deducibility Security ϕ : Event → Bool f : Event → Val V = ”filter with ϕ , then apply f , event-wise” V List(Event) Nothing Nothing Nothing List(Val) Nothing Nothing Nothing List(Obs)

  28. Bounded-Deducibility Security γ : Event → Bool g : Event → Obs E = ”filter with γ , then apply g , event-wise” V List(Event) Nothing Nothing Nothing List(Val) Nothing Nothing E Nothing List(Obs)

  29. Bounded-Deducibility Security T : Event → Bool B relation on List(Val) Unless T occurs, E can learn nothing about V beyond B V List(Event) Nothing Nothing Nothing List(Val) T Nothing Nothing E Nothing List(Obs)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend