Mutual Opacity between Multiple Adversaries

نویسندگان

چکیده

We investigate opacity, an information-flow privacy property, in a setting where there are two competing agents or adversaries whose objective is to hide their secrets and expose the of other agent. Each agent has only partial information about state system. The can achieve by enabling disabling events from set controllable events. examine different scenarios. In first problem, passive with no control capabilities, we seek global controller enforce mutual opacity. second formerly autonomous have capabilities. plausibility controllers, one for each agent, see if synthesize winning strategy so that adversary always discover without revealing its own.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SPARSI: Partitioning Sensitive Data amongst Multiple Adversaries

We present SPARSI, a novel theoretical framework for partitioning sensitive data across multiple non-colluding adversaries. Most work in privacy-aware data sharing has considered disclosing summaries where the aggregate information about the data is preserved, but sensitive user information is protected. Nonetheless, there are applications, including online advertising, cloud computing and crow...

متن کامل

Biometrics between opacity and transparency.

The overall aim of the democratic constitutional state is to protect a social order in which the individual liberty of the citizen is a major concern. As a consequence the democratic constitutional state should guarantee simultaneously and paradoxically a high level of individual freedom and an order in which such freedom is made possible and guaranteed. Biometrics provide a strong and expressi...

متن کامل

Multiple Spoofing Adversaries Detection and Localization in Wireless Networks

The openness of wireless networks enables adversaries to deception as other devices. Spoofing attacks are vulnerable in wireless network, which are allowed the many form of attacks in the network. Wireless spoofing attacks are effortless to start and can extensively impact the performance of networks. A physical property coupled with each node is proposed which uses spatial information, hard to...

متن کامل

Mutual relationship between Entropies

Our paper analyzes some new lines to advance on an evolving concept, the so-called Entropy. We need to model this measure by adequate conditions, departing from vague pieces of information. For this, it will be very necessary to analyze the relationship between some such measures, which may be of di¤erent types, with their very interesting applications, as Graph Entropy, Metric Entropy, Algorit...

متن کامل

An Efficient Heuristic Approach for Security Against Multiple Adversaries

In adversarial multiagent domains, security, commonly defined as the ability to deal with intentional threats from other agents, is a critical issue. This paper focuses on domains where these threats come from unknown adversaries. These domains can be modeled as Bayesian games; much work has been done on finding equilibria for such games. However, it is often the case in multiagent security dom...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IFAC-PapersOnLine

سال: 2022

ISSN: ['2405-8963', '2405-8971']

DOI: https://doi.org/10.1016/j.ifacol.2022.10.332