{"id":"https://openalex.org/W2914280847","doi":"https://doi.org/10.1109/tac.2019.2897553","title":"Opacity Enforcement Using Nondeterministic Publicly Known Edit Functions","display_name":"Opacity Enforcement Using Nondeterministic Publicly Known Edit Functions","publication_year":2019,"publication_date":"2019-02-05","ids":{"openalex":"https://openalex.org/W2914280847","doi":"https://doi.org/10.1109/tac.2019.2897553","mag":"2914280847"},"language":"en","primary_location":{"id":"doi:10.1109/tac.2019.2897553","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2019.2897553","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084543188","display_name":"Yiding Ji","orcid":"https://orcid.org/0000-0003-2678-7051"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yiding Ji","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034304769","display_name":"Xiang Yin","orcid":"https://orcid.org/0000-0003-1944-1570"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Yin","raw_affiliation_strings":["Department of Automation, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027585653","display_name":"St\u00e9phane Lafortune","orcid":"https://orcid.org/0000-0002-7526-6642"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stephane Lafortune","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084543188"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":5.6006,"has_fulltext":false,"cited_by_count":76,"citation_normalized_percentile":{"value":0.96641803,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"64","issue":"10","first_page":"4369","last_page":"4376"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/edit-distance","display_name":"Edit distance","score":0.774307131767273},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7186431884765625},{"id":"https://openalex.org/keywords/nondeterministic-algorithm","display_name":"Nondeterministic algorithm","score":0.5629051923751831},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5228734016418457},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36967745423316956},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.35827410221099854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32646602392196655}],"concepts":[{"id":"https://openalex.org/C44359876","wikidata":"https://www.wikidata.org/wiki/Q5338467","display_name":"Edit distance","level":2,"score":0.774307131767273},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7186431884765625},{"id":"https://openalex.org/C176181172","wikidata":"https://www.wikidata.org/wiki/Q3490301","display_name":"Nondeterministic algorithm","level":2,"score":0.5629051923751831},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5228734016418457},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36967745423316956},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.35827410221099854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32646602392196655},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tac.2019.2897553","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2019.2897553","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-119377","is_oa":false,"landing_page_url":"http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=0018-9286&rft.volume=64&rft.issue=10&rft.date=2019&rft.spage=4369&rft.aulast=Ji&rft.aufirst=Y.&rft.atitle=Opacity+enforcement+using+nondeterministic+publicly+known+edit+functions&rft.title=IEEE+Transactions+on+Automatic+Control","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[{"id":"https://openalex.org/G1057488928","display_name":null,"funder_award_id":"CNS-1421122","funder_id":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka"},{"id":"https://openalex.org/G1195885390","display_name":null,"funder_award_id":"61833012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G229885113","display_name":null,"funder_award_id":"61803259","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6610675984","display_name":null,"funder_award_id":"CCF-1138860","funder_id":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335353","display_name":"National Science Foundation of Sri Lanka","ror":"https://ror.org/010xaa060"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1976202267","https://openalex.org/W1985508025","https://openalex.org/W2001653139","https://openalex.org/W2004398490","https://openalex.org/W2008737885","https://openalex.org/W2040603575","https://openalex.org/W2052227055","https://openalex.org/W2077280257","https://openalex.org/W2142367687","https://openalex.org/W2149854232","https://openalex.org/W2162000948","https://openalex.org/W2416559203","https://openalex.org/W2497816991","https://openalex.org/W2509841691","https://openalex.org/W2521231675","https://openalex.org/W2538443008","https://openalex.org/W2601738991","https://openalex.org/W2736690356","https://openalex.org/W2761853058","https://openalex.org/W2768356411","https://openalex.org/W2782836056","https://openalex.org/W2796125030","https://openalex.org/W2883340027"],"related_works":["https://openalex.org/W3044917232","https://openalex.org/W1498160656","https://openalex.org/W2055693471","https://openalex.org/W2119149496","https://openalex.org/W1529656707","https://openalex.org/W2053233145","https://openalex.org/W4232009464","https://openalex.org/W2928599599","https://openalex.org/W2170634995","https://openalex.org/W2807937018"],"abstract_inverted_index":{"This":[0,78],"note":[1],"investigates":[2],"enforcement":[3,102],"of":[4,56,75,92],"opacity":[5,62,101],"by":[6,17,34,95],"nondeterministic":[7,170],"edit":[8,11,26,76,93,97,112,124,132,149,157,171],"functions.":[9,77,158],"The":[10,25],"functions":[12,94,150,172],"alter":[13],"the":[14,35,54,57,66,73,90,100,111,114,130,139,161],"system's":[15],"output":[16],"inserting":[18],"fictitious":[19],"events":[20],"or":[21,69],"erasing":[22],"observed":[23],"events.":[24],"decisions":[27],"are":[28],"randomly":[29],"made":[30],"while":[31],"not":[32,71],"known":[33],"outside":[36],"environment":[37],"a":[38,46,107,117],"priori.":[39],"There":[40],"is":[41,80,104,135],"an":[42,165],"intruder":[43,67],"characterized":[44],"as":[45,82],"passive":[47],"observer":[48],"with":[49],"malicious":[50],"goals":[51],"to":[52,106,122,137],"infer":[53],"secrets":[55],"system.":[58],"We":[59,87],"require":[60],"that":[61,167,173],"be":[63],"enforced":[64],"when":[65],"may":[68,70,152],"know":[72],"implementation":[74],"requirement":[79],"termed":[81],"private":[83,176],"and":[84,116,151,178],"public":[85,179],"safety.":[86,180],"also":[88,153],"restrict":[89],"operation":[91],"defining":[96],"constraints.":[98],"Then,":[99],"problem":[103],"transformed":[105],"three-player":[108],"game":[109,127],"among":[110,141],"function,":[113],"environment,":[115],"dummy":[118],"player,":[119],"which":[120],"helps":[121],"determine":[123],"decisions.":[125],"A":[126],"structure":[128,133],"called":[129],"all":[131,146],"(AES)":[134],"introduced":[136],"characterize":[138],"interaction":[140],"those":[142],"players.":[143],"It":[144],"embeds":[145],"privately":[147],"safe":[148,156],"embed":[154],"publicly":[155],"Based":[159],"on":[160],"AES,":[162],"we":[163],"present":[164],"algorithm":[166],"provably":[168],"synthesizes":[169],"satisfy":[174],"both":[175],"safety":[177]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
