Journal
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS
Volume 25, Issue 4, Pages 531-570Publisher
SPRINGER
DOI: 10.1007/s10626-014-0196-4
Keywords
Opacity; K-step opacity; Runtime verification; Runtime enforcement
Ask authors/readers for more resources
We are interested in the validation of opacity. Opacity models the impossibility for an attacker to retrieve the value of a secret in a system of interest. Roughly speaking, ensuring opacity provides confidentiality of a secret on the system that must not leak to an attacker. More specifically, we study how we can model-check, verify and enforce at system runtime, several levels of opacity. Besides existing notions of opacity, we also introduce K-step strong opacity, a more practical notion of opacity that provides a stronger level of confidentiality.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available