%0 Conference Proceedings %T Symbolic Privacy Analysis through Linkability and Detectability %+ Eindhoven University of Technology [Eindhoven] (TU/e) %A Veeningen, Meilof %A Weger, Benne, De %A Zannone, Nicola %Z Part 1: Full Papers %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 7th Trust Management (TM) %C Malaga, Spain %Y Carmen Fernández-Gago %Y Fabio Martinelli %Y Siani Pearson %Y Isaac Agudo %I Springer %3 Trust Management VII %V AICT-401 %P 1-16 %8 2013-06-03 %D 2013 %R 10.1007/978-3-642-38323-6_1 %Z Computer Science [cs]Conference papers %X More and more personal information is exchanged on-line using communication protocols. This makes it increasingly important that such protocols satisfy privacy by data minimisation. Formal methods have been used to verify privacy properties of protocols; but so far, mostly in an ad-hoc way. In previous work, we provided general definitions for the fundamental privacy concepts of linkability and detectability. However, this approach is only able to verify privacy properties for given protocol instances. In this work, by generalising the approach, we formally analyse privacy of communication protocols independently from any instance. We implement the model; identify its assumptions by relating it to the instantiated model; and show how to visualise results. To demonstrate our approach, we analyse privacy in Identity Mixer. %G English %Z TC 11 %Z WG 11.11 %2 https://inria.hal.science/hal-01468177/document %2 https://inria.hal.science/hal-01468177/file/978-3-642-38323-6_1_Chapter.pdf %L hal-01468177 %U https://inria.hal.science/hal-01468177 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-TM %~ IFIP-WG11-11 %~ IFIP-AICT-401