“…In the context of DES, opacity has been studied very extensively in the past few years; see, e.g., some recent works [2], [5], [12], [13], [21], [25], [27], [30]- [33], [36], [42], [55] and the survey papers [18], [22]. Especially, to characterize different types of security requirements, different notions of opacity are proposed in the literature.…”