Abstract—State-based notions of opacity, such as initial-state opacity and infinite-step opacity, emerge as key properties in numerous security applications of discrete event systems. We consider systems that are modeled as partially observed non-deterministic finite automata and tackle the problem of constructing a minimally restrictive opacity-enforcing supervisor (MOES), which limits the system’s behavior within some pre-specified legal behavior while enforcing initial-state opacity or infinite-step opacity requirements. We characterize the solution to MOES, under some mild assumptions, in terms of the supremal ele-ment of certain controllable, normal, and opaque languages. We also show that this supremal element always exists and that i...
International audienceIn discrete-event systems, the opacity of a secret ensures that some behaviors...
We consider the verification of current-state and K-step opacity for systems modeled as interacting ...
In the field of computer security, a problem that received little attention so far is the enforcemen...
Current-state opacity is a key security property in discrete event systems. A system is said to be c...
Motivated by security and privacy considerations in applications of discrete event systems, we descr...
In this paper we tackle the opacity enforcement problem in discrete event systems using supervisory ...
Current-state opacity is a key security property in discrete event systems. A system is said to be c...
Abstract — Enhancing the security and reliability of auto-mated systems that control vital national ...
A system is said to be current-state opaque if the entrance of the system state to a set of secret s...
Motivated by security considerations in applications of discrete event systems, we describe and anal...
International audienceGiven a finite transition system and a regular predicate, we address the probl...
Security is one of the most important properties of systems such as Internet of things, communicatio...
International audienceGiven a labelled transition system G partially observed by an attacker, and a ...
In this paper, we formulate and analyze methodologies for verifying the notion of initial-state opac...
Abstract—Motivated by security and privacy consid-erations in a variety of applications of discrete ...
International audienceIn discrete-event systems, the opacity of a secret ensures that some behaviors...
We consider the verification of current-state and K-step opacity for systems modeled as interacting ...
In the field of computer security, a problem that received little attention so far is the enforcemen...
Current-state opacity is a key security property in discrete event systems. A system is said to be c...
Motivated by security and privacy considerations in applications of discrete event systems, we descr...
In this paper we tackle the opacity enforcement problem in discrete event systems using supervisory ...
Current-state opacity is a key security property in discrete event systems. A system is said to be c...
Abstract — Enhancing the security and reliability of auto-mated systems that control vital national ...
A system is said to be current-state opaque if the entrance of the system state to a set of secret s...
Motivated by security considerations in applications of discrete event systems, we describe and anal...
International audienceGiven a finite transition system and a regular predicate, we address the probl...
Security is one of the most important properties of systems such as Internet of things, communicatio...
International audienceGiven a labelled transition system G partially observed by an attacker, and a ...
In this paper, we formulate and analyze methodologies for verifying the notion of initial-state opac...
Abstract—Motivated by security and privacy consid-erations in a variety of applications of discrete ...
International audienceIn discrete-event systems, the opacity of a secret ensures that some behaviors...
We consider the verification of current-state and K-step opacity for systems modeled as interacting ...
In the field of computer security, a problem that received little attention so far is the enforcemen...