메뉴 건너뛰기




Volumn 55, Issue 5, 2010, Pages 1089-1100

Supervisory control for opacity

Author keywords

Confidentiality; Control; Discrete event systems (DES); Opacity; Partial observation; Security

Indexed keywords

COMPUTER SECURITY; CONFIDENTIAL INFORMATION; CRITICAL SYSTEMS; DISCRETE EVENT SYSTEMS; EFFECTIVE ALGORITHMS; PARTIAL OBSERVATION; PERMISSIVE CONTROLLERS; SUPERVISORY CONTROL; TRANSITION SYSTEM;

EID: 77952173305     PISSN: 00189286     EISSN: None     Source Type: Journal    
DOI: 10.1109/TAC.2010.2042008     Document Type: Article
Times cited : (174)

References (26)
  • 1
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • G. Lowe, "Towards a completeness result for model checking of security protocols," J. Comput. Security, vol.7, no.2-3, pp. 89-146, 1999
    • (1999) J. Comput. Security , vol.7 , Issue.2-3 , pp. 89-146
    • Lowe, G.1
  • 4
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol.3, no.1, pp. 30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 5
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • J. Ligatti, L. Bauer, and D.Walker, "Edit automata: Enforcement mechanisms for run-time security policies," Int. J. Inf. Sec., vol.4, no.1-2, pp. 2-16, 2005.
    • (2005) Int. J. Inf. Sec. , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 7
    • 38349070556 scopus 로고    scopus 로고
    • Information flow testing-The third path towards confidentiality guarantee
    • G. Le Guernic, "Information flow testing-The third path towards confidentiality guarantee," in Proc. Adv. Comput. Sci. (ASIAN'07), 2007, pp. 33-47.
    • (2007) Proc. Adv. Comput. Sci. (ASIAN'07) , pp. 33-47
    • Le Guernic, G.1
  • 8
    • 77952204321 scopus 로고    scopus 로고
    • Monitoring information flow by diagnosis techniques
    • Budapest, Hungary, Aug.
    • J. Dubreil, T. Jéron, and H. Marchand, "Monitoring information flow by diagnosis techniques," in Proc. Eur. Control Conf. (ECC), Budapest, Hungary, Aug. 2009, pp. 2854-2859.
    • (2009) Proc. Eur. Control Conf. (ECC) , pp. 2854-2859
    • Dubreil, J.1    Jéron, T.2    Marchand, H.3
  • 10
    • 13544269120 scopus 로고    scopus 로고
    • Using unification for opacity properties
    • 7Workshop Issues Theory Security (WITS'04), Barcelona, Spain
    • L. Mazaré, "Using unification for opacity properties," in Proc. 4th IFIP WG1.7Workshop Issues Theory Security (WITS'04), Barcelona, Spain, 2004, pp. 165-176.
    • (2004) Proc. 4th IFIP WG1 , pp. 165-176
    • Mazaré, L.1
  • 13
    • 53149132772 scopus 로고    scopus 로고
    • Verification of initial-state opacity in security applications of des
    • Workshop Discrete Event Systems (WODES'08) , May
    • A. Saboori and C. Hadjicostis, "Verification of initial-state opacity in security applications of DES," in Proc. 9th Int. Workshop Discrete Event Systems (WODES'08) , May 2008, p. 6.
    • (2008) Proc. 9th Int. , pp. 6
    • Saboori, A.1    Hadjicostis, C.2
  • 15
    • 3042668408 scopus 로고    scopus 로고
    • Classification of security properties: Information flow
    • R. Focardi and R. Gorrieri, "Classification of security properties: Information flow," in Proc. Found. Security Anal. Design, 2000, pp. 331-396.
    • (2000) Proc. Found. Security Anal. Design , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 18
    • 0023104549 scopus 로고
    • Supervisory control of a class of discrete event processes
    • Jan.
    • P. J. Ramadge and W. M. Wonham, "Supervisory control of a class of discrete event processes," SIAM J. Control Optim., vol.25, no.1, pp. 206-230, Jan. 1987.
    • (1987) SIAM J. Control Optim. , vol.25 , Issue.1 , pp. 206-230
    • Ramadge, P.J.1    Wonham, W.M.2
  • 19
    • 0024479313 scopus 로고
    • The control of discrete event systems
    • Jan.
    • P. J. Ramadge and W. M.Wonham, "The control of discrete event systems," Proc. IEEE, vol.77, no.1, pp. 81-98, Jan. 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.1 , pp. 81-98
    • Ramadge, P.J.1    Wonham, W.M.2
  • 20
    • 34250741060 scopus 로고    scopus 로고
    • A question of access: Decentralized control and communication strategies for security policies
    • Jun.
    • L. Ricker, "A question of access: Decentralized control and communication strategies for security policies," in Proc. 8th Int. Workshop Discrete Event Syst., Jun. 2006, pp. 58-63.
    • (2006) Proc. 8th Int. Workshop Discrete Event Syst. , pp. 58-63
    • Ricker, L.1
  • 23
    • 70449682552 scopus 로고    scopus 로고
    • A formula for the supremal controllable and opaque sublanguage arising in supervisory control
    • Mar.
    • S. Takai and Y. Oka, "A formula for the supremal controllable and opaque sublanguage arising in supervisory control," SICE J. Control, Meas., Syst. Integr., vol.1, no.4, pp. 307-312, Mar. 2008.
    • (2008) SICE J. Control, Meas., Syst. Integr. , vol.1 , Issue.4 , pp. 307-312
    • Takai, S.1    Oka, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.