Attack Model Clause Samples

Attack Model. Here, we briefly discuss some of the goals of the adversary in a digital provenance scheme similar to discussions in [5] [6]. A detailed analysis of attacks and their prevention in our scheme is discussed in Section V. We consider an adversary with the intentions of, 1) obtaining confidential information from the provenance records about the operations performed on the document
Attack Model. There are two types of attackers: 1) internal attackers and 2) external attackers. Internal attackers are those actively engaged in the scheme, such as ESs and SDs. External attackers are not involved in the scheme and do not have access to critical materials. Some typical attacks are as follows.