Synthesis of insertion functions for enforcement of opacity security properties
From MaRDI portal
Publication:458746
DOI10.1016/J.AUTOMATICA.2014.02.038zbMATH Open1296.93114OpenAlexW2040603575MaRDI QIDQ458746FDOQ458746
Authors: Yi-Chin Wu, Stéphane Lafortune
Publication date: 8 October 2014
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2014.02.038
Recommendations
- Synthesis of Optimal Insertion Functions for Opacity Enforcement
- Enforcement of opacity by public and private insertion functions
- Embedded Insertion Functions for Opacity Enforcement
- Extended Insertion Functions for Opacity Enforcement in Discrete-Event Systems
- Opacity Enforcement Using Nondeterministic Publicly Known Edit Functions
- Opacity Enforcement via Attribute-Based Edit Functions in the Presence of an Intended Receiver
- Synthesis of obfuscation policies to ensure privacy and utility
- \(k\)-memory-embedded insertion mechanism for opacity enforcement
- Compositional and Abstraction-Based Approach for Synthesis of Edit Functions for Opacity Enforcement
Cellular automata (computational aspects) (68Q80) Discrete event control/observation systems (93C65)
Cites Work
- Introduction to Discrete Event Systems
- Supervisory Control of a Class of Discrete Event Processes
- Modelling opacity using Petri nets
- Comparative analysis of related notions of opacity in centralized and coordinated architectures
- Supervisory Control for Opacity
- Opacity of discrete event systems and its applications
- Synthesis of opaque systems with static and dynamic masks
- Title not available (Why is that?)
- Opacity-Enforcing Supervisory Strategies via State Estimator Constructions
- Enforcement and validation (at runtime) of various notions of opacity
Cited In (31)
- Enforcing opacity by insertion functions under multiple energy constraints
- Matrix approach for verification of opacity of partially observed discrete event systems
- Opacity of networked discrete event systems
- Security and privacy with opacity-based state observation for finite state machine
- Enforcing opacity of regular predicates on modal transition systems
- A general approach for optimizing dynamic sensor activation for discrete event systems
- Enforcement for infinite-step opacity and K-step opacity via insertion mechanism
- Supervisory control of discrete-event systems under attacks
- A new approach for the verification of infinite-step and \(K\)-step opacity using two-way observers
- Synthesis of opaque systems with static and dynamic masks
- Compositional and Abstraction-Based Approach for Synthesis of Edit Functions for Opacity Enforcement
- Synthesis of obfuscation policies to ensure privacy and utility
- \(k\)-memory-embedded insertion mechanism for opacity enforcement
- Opacity Enforcement via Attribute-Based Edit Functions in the Presence of an Intended Receiver
- Current-state opacity enforcement in discrete event systems under incomparable observations
- Opacity enforcement in discrete event systems using differential privacy
- Enforcement and validation (at runtime) of various notions of opacity
- Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations
- On privacy preserving data release of linear dynamic networks
- A novel approach for supervisor synthesis to enforce opacity of discrete event systems
- A general language-based framework for specifying and verifying notions of opacity
- Obfuscation mechanism for simultaneous public event information release and private event information hiding in discrete event systems
- Decidability of opacity verification problems in labeled Petri net systems
- Enhancement of opacity for distributed state estimation in cyber-physical systems
- Enforcing current-state opacity through shuffle and deletions of event observations
- Verification and enforcement of strong infinite- and \(k\)-step opacity using state recognizers
- Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder
- Enforcement of opacity by public and private insertion functions
- Active opacity of discrete-event systems
- Secret inference and attacktability analysis of discrete event systems
- Game current-state opacity formulation in probabilistic resource automata
Uses Software
This page was built for publication: Synthesis of insertion functions for enforcement of opacity security properties
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q458746)