2016
DOI: 10.1007/978-3-319-30024-5_12
|View full text |Cite
|
Sign up to set email alerts
|

Selected Results and Related Issues of Confidentiality-Preserving Controlled Interaction Execution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 59 publications
0
1
0
Order By: Relevance
“…Among others, this makes GPL a natural choice for the formal study of access control mechanisms that need to maintain the confidentiality of some pieces of knowledge. For example, [78] discusses a number of settings where an information system needs to be able to determine whether answering a given query would allow the user to derive information that is supposed to remain secret, based on possibly incomplete knowledge of what that user already knows. The use of GPL is also natural in game theoretic settings, where agents need to reason based on their incomplete knowledge about the goals of other agents, e.g., as part of a negotiation process [79].…”
Section: Discussionmentioning
confidence: 99%
“…Among others, this makes GPL a natural choice for the formal study of access control mechanisms that need to maintain the confidentiality of some pieces of knowledge. For example, [78] discusses a number of settings where an information system needs to be able to determine whether answering a given query would allow the user to derive information that is supposed to remain secret, based on possibly incomplete knowledge of what that user already knows. The use of GPL is also natural in game theoretic settings, where agents need to reason based on their incomplete knowledge about the goals of other agents, e.g., as part of a negotiation process [79].…”
Section: Discussionmentioning
confidence: 99%