Secrecy logic: S-secrecy structures

被引:0
|
作者
Voutsadakis, George [1 ]
机构
[1] Lake Super State Univ, Sch Math & Comp Sci, Sault Sainte Marie, MI 49783 USA
关键词
Secrecy-preserving reasoning; abstract algebraic logic; logical matrices; protoalgebraic logics; first-order structures; homomorphism theorems; regular categories; subdirect products; subdirectly irreducible structures; REFUSAL;
D O I
10.3906/mat-0910-92
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Let S = < L, proves(S)> be a deductive system. An S-secrecy logic is a quadruple K = < Fm-L(V),K,B, S >, where Fm-L(V) is the algebra of L-formulas, K,B are S-theories, with B subset of K and S subset of K such that S boolean AND B = theta. K corresponds to information deducible from a knowledge base, B to information deducible from the publicly accessible (or browsable) part of the knowledge base and S is a secret set, a set of sensitive or private information that the knowledge base aims at concealing from its users. To provide models for this context, the notion of an S-secrecy structure is introduced. It is a quadruple A = < A, K-A, B-A, S-A >, consisting of an L-algebra A, two S-filters K-A, B-A on A, with B-A subset of K-A, and a subset S-A subset of K-A, such that S-A boolean AND B-A = theta. Several model theoretic/universal algebraic and categorical properties of the class of S-secrecy structures, endowed with secrecy homomorphisms, are studied relating to various universal algebraic and categorical constructs.
引用
收藏
页码:1 / 27
页数:27
相关论文
共 50 条
  • [1] SECRECY LOGIC: PROTOALGEBRAIC S-SECRECY LOGICS
    Voutsadakis, George
    [J]. REPORTS ON MATHEMATICAL LOGIC, 2012, 47 : 3 - 28
  • [2] Secrecy analysis in protocol composition logic
    Roy, Arnab
    Datta, Anupam
    Derek, Ante
    Mitchell, John C.
    Seifert, Jean-Pierre
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 197 - +
  • [3] Secrecy's Softwares
    Nuttall, Sarah
    Mbembe, Achille
    [J]. CURRENT ANTHROPOLOGY, 2015, 56 : S317 - S324
  • [4] Heimann's Secrecy
    Schloesser, Hermann
    [J]. LITERATUR UND KRITIK, 2014, (485): : 51 - 57
  • [5] THE LOGIC OF SECRECY: DIGITAL SURVEILLANCE IN TURKEY AND RUSSIA
    Unver, Akin
    [J]. TURKISH POLICY QUARTERLY, 2018, 17 (02): : 93 - 103
  • [6] On Secrecy above Secrecy Capacity
    Rajesh, R.
    Shah, Shahid M.
    Sharma, Vinod
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (IEEE ICCS 2012), 2012, : 70 - 74
  • [7] STRUCTURES AND IMAGES OF SECRECY IN STENDHAL 'ARMANCE'
    BORDERIE, R
    [J]. POETIQUE, 1993, (93): : 77 - 90
  • [8] Privacy? It's secrecy by stealth
    O'Brien, James
    [J]. BRITISH JOURNALISM REVIEW, 2011, 22 (03) : 31 - 35
  • [9] Project on Government Secrecy/Secrecy News
    Miller, Barbara
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2014, 31 (02) : 345 - 346
  • [10] Analyzing security protocols with secrecy types and logic programs
    Abadi, M
    Blanchet, B
    [J]. ACM SIGPLAN NOTICES, 2002, 37 (01) : 33 - 44