References of "Tabatabaei, Masoud 50003163"
     in
Bookmark and Share    
Full Text
See detailGAMES AND STRATEGIES IN ANALYSIS OF SECURITY PROPERTIES
Tabatabaei, Masoud UL

Doctoral thesis (2016)

Information security problems typically involve decision makers who choose and adjust their behaviors in the interaction with each other in order to achieve their goals. Consequently, game theoretic ... [more ▼]

Information security problems typically involve decision makers who choose and adjust their behaviors in the interaction with each other in order to achieve their goals. Consequently, game theoretic models can potentially be a suitable tool for better understanding the challenges that the interaction of participants in information security scenarios bring about. In this dissertation, we employ models and concepts of game theory to study a number of subjects in the field of information security. In the first part, we take a game-theoretic approach to the matter of preventing coercion in elections. Our game models for the election involve an honest election authority that chooses between various protection methods with different levels of resistance and different implementation costs. By analysing these games, it turns out that the society is better off if the security policy is publicly announced, and the authorities commit to it. Our focus in the second part is on the property of noninterference in information flow security. Noninterference is a property that captures confidentiality of actions executed by a given process. However, the property is hard to guarantee in realistic scenarios. We show that the security of a system can be seen as an interplay between functionality requirements and the strategies adopted by users, and based on this we propose a weaker notion of noninterference, which we call strategic noninterference. We also give a characterisation of strategic noninterference through unwinding relations for specific subclasses of goals and for the simplified setting where a strategy is given as a parameter. In the third part, we study the security of information flow based on the consequences of information leakage to the adversary. Models of information flow security commonly prevent any information leakage, regardless of how grave or harmless the consequences the leakage can be. Even in models where each piece of information is classified as either sensitive or insensitive, the classification is “hardwired” and given as a parameter of the analysis, rather than derived from more fundamental features of the system. We suggest that information security is not a goal in itself, but rather a means of preventing potential attackers from compromising the correct behavior of the system. To formalize this, we first show how two information flows can be compared by looking at the adversary’s ability to harm the system. Then, we propose that the information flow in a system is effectively secure if it is as good as its idealized variant based on the classical notion of noninterference. Finally, we shift our focus to the strategic aspect of information security in voting procedures. We argue that the notions of receipt-freeness and coercion resistance are underpinned by existence (or nonexistence) of a suitable strategy for some participants of the voting process. In order toback the argument formally, we provide logical “transcriptions” of the informal intuitions behind coercion-related properties that can be found in the existing literature. The transcriptions are formulatedin the modal game logic ATL*, well known in the area of multi-agent systems. [less ▲]

Detailed reference viewed: 55 (15 UL)
Full Text
Peer Reviewed
See detailInformation Security as Strategic (In)effectivity
Jamroga, Wojciech UL; Tabatabaei, Masoud UL

in 12th International Workshop on Security and Trust Management (STM), 2016. (2016)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailExpressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt
Tabatabaei, Masoud UL; Jamroga, Wojciech UL; Ryan, Peter UL

in The International Workshop on AI for Privacy and Security (PrAISe), 2016. (2016)

Voting is a mechanism of utmost importance to social processes. In this paper, we focus on the strategic aspect of information security in voting procedures. We argue that the notions of receipt-freeness ... [more ▼]

Voting is a mechanism of utmost importance to social processes. In this paper, we focus on the strategic aspect of information security in voting procedures. We argue that the notions of receipt-freeness and coercion resistance are underpinned by existence (or nonexistence) of a suitable strategy for some participants of the voting process. In order to back the argument formally, we provide logical ``transcriptions'' of the informal intuitions behind coercion-related properties that can be found in the existing literature. The transcriptions are formulated in the modal game logic ATL*, well known in the area of multi-agent systems. [less ▲]

Detailed reference viewed: 19 (6 UL)
Full Text
Peer Reviewed
See detailPreventing Coercion in E-Voting: Be Open and Commit
Jamroga, Wojciech UL; Tabatabaei, Masoud UL

in Proceedings of the 12th International Joint Conference on Electronic Voting (E-Vote-ID) (2016)

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailAccumulative knowledge under bounded resources
Jamroga, Wojciech; Tabatabaei, Masoud UL

in Journal of Logic & Computation (2015)

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detailStrategic Noninterference
Jamroga, Wojciech; Tabatabaei, Masoud UL

in ICT Systems Security and Privacy Protection (2015)

Detailed reference viewed: 40 (3 UL)
Full Text
Peer Reviewed
See detailAccumulative Knowledge Under Bounded Resources.
Jamroga, Wojciech UL; Tabatabaei, Masoud UL

in Computational Logic in Multi-Agent Systems (2013, September 16)

Detailed reference viewed: 41 (12 UL)
Full Text
Peer Reviewed
See detailPreventing Coercion in E-Voting: Be Open and Commit
Tabatabaei, Masoud UL; Jamroga, Wojciech UL; Ryan, Peter UL

Scientific Conference (2013, March 17)

Detailed reference viewed: 163 (11 UL)
Full Text
Peer Reviewed
See detailGeneration of Realistic Mobility for VANETs Using Genetic Algorithms
Seredynski, Marcin UL; Danoy, Grégoire UL; Tabatabaei, Masoud UL et al

in Proceedings of the IEEE Congress on Evolutionary Computation (2012)

Detailed reference viewed: 28 (4 UL)