Model Secrecy and Stress Tests
نویسندگان
چکیده
Should regulators reveal the models they use to stress-test banks? In our setting, revealing leads gaming, but secrecy can induce banks underinvest in socially desirable assets for fear of failing test. We show that although regulator solve this underinvestment problem by making test easier, some disclosure may still be optimal (e.g., if have high appetite risk or capital shortfalls are not very costly). Cutoff rules within monotone rules, more generally is single-peaked. discuss policy implications and offer applications beyond stress tests.
منابع مشابه
Secure communications with an asymptotic secrecy model
As knowledge based systems become more sophisticated, communications between systems or among their subsystems often conducted over public channels such as the Internet, wireless medium, etc. To secure communications over public channels, the most often used method is Diffie and Hellman’s public key infrastructure approach. This method requires a trusted third party to verify identifies, which ...
متن کاملModel-driven Transformation-based Generation of Java Stress Tests
This paper describes a practical application of transformation-based analysis and code generation. An overview is given of an approach for automatically constructing Java stress tests whose execution exercises all “interesting” class initialization sequence possibilities for a given class hierarchy.
متن کاملSecrecy logic: S -secrecy structures
Let S = 〈L, S〉 be a deductive system. An S -secrecy logic is a quadruple K = 〈FmL(V ),K,B, S〉 , where FmL(V ) is the algebra of L-formulas, K,B are S -theories, with B ⊆ K and S ⊆ K such that S ∩ B = ∅ . K corresponds to information deducible from a knowledge base, B to information deducible from the publicly accessible (or browsable) part of the knowledge base and S is a secret set, a set of s...
متن کاملSimultaneous Secrecy and Reliability Amplification for a General Channel Model
We present a general notion of channel for cryptographic purposes, which can model either a (classical) physical channel or the consequences of a cryptographic protocol, or any hybrid. We consider simultaneous secrecy and reliability amplification for such channels. We show that simultaneous secrecy and reliability amplification is not possible for the most general model of channel, but, at lea...
متن کاملInformation Theoretic Authentication and Secrecy Codes in the Splitting Model
In the splitting model, information theoretic authentication codes allow non-deterministic encoding, that is, several messages can be used to communicate a particular plaintext. Certain applications require that the aspect of secrecy should hold simultaneously. Ogata–Kurosawa–Stinson–Saido (2004) have constructed optimal splitting authentication codes achieving perfect secrecy for the special c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Finance
سال: 2023
ISSN: ['0022-1082', '1540-6261']
DOI: https://doi.org/10.1111/jofi.13207