2006 8th International Workshop on Discrete Event Systems
DOI: 10.1109/wodes.2006.1678407
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent Secrets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
42
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 39 publications
(42 citation statements)
references
References 3 publications
0
42
0
Order By: Relevance
“…This definition generalizes the notions of secrecy considered in [2], [5], [12], which require only the first part above. When an observer does not know the exact behaviors of a discrete-event system (DES), a weaker notion of secrecy can be defined, which we introduce in this paper: For each property-satisfying event-trace of the system, there exists an indistinguishable property-violating event-trace (not necessarily executable in the system), and vice-versa.…”
Section: Introductionmentioning
confidence: 95%
See 2 more Smart Citations
“…This definition generalizes the notions of secrecy considered in [2], [5], [12], which require only the first part above. When an observer does not know the exact behaviors of a discrete-event system (DES), a weaker notion of secrecy can be defined, which we introduce in this paper: For each property-satisfying event-trace of the system, there exists an indistinguishable property-violating event-trace (not necessarily executable in the system), and vice-versa.…”
Section: Introductionmentioning
confidence: 95%
“…Recently, secrecy-enforcing supervisory control has been studied in [2], [5], [12]. In [2], the authors considered the situation where there are multiple observers with different observable event sets, and addressed the problem of synthesizing a maximally permissive supervisor that guarantees that each observer never unambiguously knows whether an executed trace belongs to the traces representing a secret property.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Even under partial observation, some hidden information may be computationally reconstructible from some specification of the system. Typical fields that address such issues are those of information flow detection (Badouel et al 2007;Bryans et al 2008;Cassez 2009), diagnosis (Sampath et al 1995;Yoo and Lafortune 2002;Jéron et al 2006;Tripakis 2002;Bouyer et al 2005), and combination of both (Dubreil et al 2009). …”
Section: Introductionmentioning
confidence: 99%
“…On the one hand, information flow detection relates to computer security, based on the notion of opacity (Bryans et al 2008;Badouel et al 2007;Dubreil et al 2009). The opacity problem consists in determining whether an observer, who knows the system's behavior but who imperfectly observes it, is able to reconstruct critical information (e.g., a password stored in a file, the value of some hidden variables, etc.).…”
Section: Introductionmentioning
confidence: 99%