![]() Tabatabaei, Masoud ![]() Doctoral thesis (2016) Information security problems typically involve decision makers who choose and adjust their behaviors in the interaction with each other in order to achieve their goals. Consequently, game theoretic ... [more ▼] Information security problems typically involve decision makers who choose and adjust their behaviors in the interaction with each other in order to achieve their goals. Consequently, game theoretic models can potentially be a suitable tool for better understanding the challenges that the interaction of participants in information security scenarios bring about. In this dissertation, we employ models and concepts of game theory to study a number of subjects in the field of information security. In the first part, we take a game-theoretic approach to the matter of preventing coercion in elections. Our game models for the election involve an honest election authority that chooses between various protection methods with different levels of resistance and different implementation costs. By analysing these games, it turns out that the society is better off if the security policy is publicly announced, and the authorities commit to it. Our focus in the second part is on the property of noninterference in information flow security. Noninterference is a property that captures confidentiality of actions executed by a given process. However, the property is hard to guarantee in realistic scenarios. We show that the security of a system can be seen as an interplay between functionality requirements and the strategies adopted by users, and based on this we propose a weaker notion of noninterference, which we call strategic noninterference. We also give a characterisation of strategic noninterference through unwinding relations for specific subclasses of goals and for the simplified setting where a strategy is given as a parameter. In the third part, we study the security of information flow based on the consequences of information leakage to the adversary. Models of information flow security commonly prevent any information leakage, regardless of how grave or harmless the consequences the leakage can be. Even in models where each piece of information is classified as either sensitive or insensitive, the classification is “hardwired” and given as a parameter of the analysis, rather than derived from more fundamental features of the system. We suggest that information security is not a goal in itself, but rather a means of preventing potential attackers from compromising the correct behavior of the system. To formalize this, we first show how two information flows can be compared by looking at the adversary’s ability to harm the system. Then, we propose that the information flow in a system is effectively secure if it is as good as its idealized variant based on the classical notion of noninterference. Finally, we shift our focus to the strategic aspect of information security in voting procedures. We argue that the notions of receipt-freeness and coercion resistance are underpinned by existence (or nonexistence) of a suitable strategy for some participants of the voting process. In order toback the argument formally, we provide logical “transcriptions” of the informal intuitions behind coercion-related properties that can be found in the existing literature. The transcriptions are formulatedin the modal game logic ATL*, well known in the area of multi-agent systems. [less ▲] Detailed reference viewed: 165 (35 UL)![]() Tabatabaei, Masoud ![]() ![]() ![]() in The International Workshop on AI for Privacy and Security (PrAISe), 2016. (2016) Voting is a mechanism of utmost importance to social processes. In this paper, we focus on the strategic aspect of information security in voting procedures. We argue that the notions of receipt-freeness ... [more ▼] Voting is a mechanism of utmost importance to social processes. In this paper, we focus on the strategic aspect of information security in voting procedures. We argue that the notions of receipt-freeness and coercion resistance are underpinned by existence (or nonexistence) of a suitable strategy for some participants of the voting process. In order to back the argument formally, we provide logical ``transcriptions'' of the informal intuitions behind coercion-related properties that can be found in the existing literature. The transcriptions are formulated in the modal game logic ATL*, well known in the area of multi-agent systems. [less ▲] Detailed reference viewed: 145 (8 UL)![]() Jamroga, Wojciech ![]() ![]() in 12th International Workshop on Security and Trust Management (STM), 2016. (2016) Detailed reference viewed: 110 (1 UL)![]() Jamroga, Wojciech ![]() ![]() in Proceedings of the 12th International Joint Conference on Electronic Voting (E-Vote-ID) (2016) Detailed reference viewed: 142 (3 UL)![]() ; Tabatabaei, Masoud ![]() in Journal of Logic and Computation (2015) Detailed reference viewed: 143 (3 UL)![]() ; Tabatabaei, Masoud ![]() in ICT Systems Security and Privacy Protection (2015) Detailed reference viewed: 143 (3 UL)![]() Jamroga, Wojciech ![]() ![]() in Computational Logic in Multi-Agent Systems (2013, September 16) Detailed reference viewed: 145 (15 UL)![]() Tabatabaei, Masoud ![]() ![]() ![]() Scientific Conference (2013, March 17) Detailed reference viewed: 357 (12 UL)![]() Seredynski, Marcin ![]() ![]() ![]() in Proceedings of the IEEE Congress on Evolutionary Computation (2012) Detailed reference viewed: 191 (28 UL) |
||