Secrecy and Safety
نویسندگان
چکیده
منابع مشابه
SECRECY AND SAFETY by Andrew
We employ a simple two-period model to show that the use of confidential settlement as a strategy for a firm facing tort litigation leads to lower average product safety than that which would be produced if a firm were committed to openness. Moreover, confidentiality can even lead to declining average product safety over time. We also show that a rational risk-neutral consumer’s response to a m...
متن کاملSafety versus Secrecy (invited Paper)
Safety and secrecy are formulated for a deterministic programming language. A safety property is deened as a set of program traces and secrecy is deened as a binary relation on traces, characterizing a form of Noninterference. Safety properties may have sound and complete execution monitors whereas secrecy has no such monitor.
متن کاملSecrecy logic: S -secrecy structures
Let S = 〈L, S〉 be a deductive system. An S -secrecy logic is a quadruple K = 〈FmL(V ),K,B, S〉 , where FmL(V ) is the algebra of L-formulas, K,B are S -theories, with B ⊆ K and S ⊆ K such that S ∩ B = ∅ . K corresponds to information deducible from a knowledge base, B to information deducible from the publicly accessible (or browsable) part of the knowledge base and S is a secret set, a set of s...
متن کاملSecrecy-Preserving Reasoning using Secrecy Envelopes
Inmany applications of networked information systems, the need to share information often has to be balanced against the need to protect secret information from unintended disclosure, e.g., due to copyright, privacy, security, or commercial considerations. We study the problem of secrecy-preserving reasoning, that is, answering queries using secret information, whenever it is possible to do so,...
متن کاملPerfect Secrecy and Statistical
There are two key properties of the above. First, given only c, Eve should not be able to learn what m is. Second, Dec(Enc(m)) = m, so that Bob can accurately determine the message that Alice wanted to send. Creating functions Enc and Dec which satisfy this is a fundamental problem of cryptography. But given the above encryption scheme, knowing what these functions are is enough for anyone to d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: American Economic Review
سال: 2005
ISSN: 0002-8282
DOI: 10.1257/0002828054825673