Browsing by Subject "Security applications"
Now showing items 1-2 of 2
-
Conference Object
Opacity-enforcing supervisory strategies for secure discrete event systems
(2008)Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Specifically, a system is initial-state opaque if the ...
-
Conference Object
Verification of initial-state opacity in security applications of DES
(2008)Motivated by security applications where the initial state of a system needs to be kept secret (opaque) to outside observers (intruders), we formulate, analyze and verify the notion of initial-state opacity in discrete ...