Skip to main navigation Skip to search Skip to main content

Reliable evidence: Auditability by typing

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what data to log is left to the programmer's intuition, and there is no guarantee that it constitutes enough evidence. We give a precise definition of auditability and we show how typechecking can be used to statically verify that a protocol always logs enough evidence. We apply our approach to several examples, including a full-scale auction-like protocol programmed in ML.

Original languageEnglish
Title of host publicationComputer Security - ESORICS 2009 - 14th European Symposium on Research in Computer Security, Proceedings
Pages168-183
Number of pages16
DOIs
Publication statusPublished - 2 Nov 2009
Event14th European Symposium on Research in Computer Security, ESORICS 2009 - Saint-Malo, France
Duration: 21 Sept 200923 Sept 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5789 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th European Symposium on Research in Computer Security, ESORICS 2009
Country/TerritoryFrance
CitySaint-Malo
Period21/09/0923/09/09

Fingerprint

Dive into the research topics of 'Reliable evidence: Auditability by typing'. Together they form a unique fingerprint.

Cite this