Synthesis of insertion functions for enforcement of opacity security properties
From MaRDI portal
Recommendations
- Synthesis of Optimal Insertion Functions for Opacity Enforcement
- Enforcement of opacity by public and private insertion functions
- Embedded Insertion Functions for Opacity Enforcement
- Extended Insertion Functions for Opacity Enforcement in Discrete-Event Systems
- Opacity Enforcement Using Nondeterministic Publicly Known Edit Functions
- Opacity Enforcement via Attribute-Based Edit Functions in the Presence of an Intended Receiver
- Synthesis of obfuscation policies to ensure privacy and utility
- \(k\)-memory-embedded insertion mechanism for opacity enforcement
- Compositional and Abstraction-Based Approach for Synthesis of Edit Functions for Opacity Enforcement
Cites work
- scientific article; zbMATH DE number 781092 (Why is no real title available?)
- Comparative analysis of related notions of opacity in centralized and coordinated architectures
- Enforcement and validation (at runtime) of various notions of opacity
- Introduction to Discrete Event Systems
- Modelling opacity using Petri nets
- Opacity of discrete event systems and its applications
- Opacity-Enforcing Supervisory Strategies via State Estimator Constructions
- Supervisory Control for Opacity
- Supervisory Control of a Class of Discrete Event Processes
- Synthesis of opaque systems with static and dynamic masks
Cited in
(31)- Enforcement and validation (at runtime) of various notions of opacity
- Enforcement for infinite-step opacity and K-step opacity via insertion mechanism
- A general approach for optimizing dynamic sensor activation for discrete event systems
- Opacity of networked discrete event systems
- Decidability of opacity verification problems in labeled Petri net systems
- Matrix approach for verification of opacity of partially observed discrete event systems
- Obfuscation mechanism for simultaneous public event information release and private event information hiding in discrete event systems
- Enforcing opacity by insertion functions under multiple energy constraints
- On privacy preserving data release of linear dynamic networks
- \(k\)-memory-embedded insertion mechanism for opacity enforcement
- Security and privacy with opacity-based state observation for finite state machine
- Synthesis of obfuscation policies to ensure privacy and utility
- Supervisory control of discrete-event systems under attacks
- A new approach for the verification of infinite-step and \(K\)-step opacity using two-way observers
- Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations
- Enforcement of opacity by public and private insertion functions
- Enforcing opacity of regular predicates on modal transition systems
- Enhancement of opacity for distributed state estimation in cyber-physical systems
- Enforcing current-state opacity through shuffle and deletions of event observations
- Verification and enforcement of strong infinite- and \(k\)-step opacity using state recognizers
- Current-state opacity enforcement in discrete event systems under incomparable observations
- Opacity Enforcement via Attribute-Based Edit Functions in the Presence of an Intended Receiver
- A novel approach for supervisor synthesis to enforce opacity of discrete event systems
- A general language-based framework for specifying and verifying notions of opacity
- Active opacity of discrete-event systems
- Opacity enforcement in discrete event systems using differential privacy
- Synthesis of opaque systems with static and dynamic masks
- Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder
- Compositional and Abstraction-Based Approach for Synthesis of Edit Functions for Opacity Enforcement
- Secret inference and attacktability analysis of discrete event systems
- Game current-state opacity formulation in probabilistic resource automata
This page was built for publication: Synthesis of insertion functions for enforcement of opacity security properties
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q458746)