{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T10:45:27Z","timestamp":1759401927612,"version":"3.44.0"},"reference-count":35,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"vor","delay-in-days":20,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012456","name":"National Social Science Fund of China","doi-asserted-by":"publisher","award":["24AZX019"],"award-info":[{"award-number":["24AZX019"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["202306990071"],"award-info":[{"award-number":["202306990071"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The distinction between de re (of the thing) and de dicto (of what is said) readings of sentences has long been the topic of studies in logic and philosophy of language. The article proposes to apply these concepts to anonymity. It argues that, in the proposed setting, de dicto knowledge preserves anonymity, while de re knowledge does not. The article also considers a third, \u201covert,\u201d form of knowledge. The main technical result is a sound and complete logical system that captures the interplay between a data traceability expression and the de re, de dicto, and overt knowledge modalities. The article also shows that the three knowledge modalities are not definable through each other even in the presence of the traceability expression.<\/jats:p>","DOI":"10.1093\/cybsec\/tyae025","type":"journal-article","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:54:58Z","timestamp":1737438898000},"source":"Crossref","is-referenced-by-count":1,"title":["De re\/de dicto distinction: a logicians\u2019 perspective on data anonymity"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2865-5642","authenticated-orcid":false,"given":"Junli","family":"Jiang","sequence":"first","affiliation":[{"name":"Institute of Logic and Intelligence, Southwest University , Tian Sheng Road, Chongqing 400715 ,","place":["China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1687-045X","authenticated-orcid":false,"given":"Pavel","family":"Naumov","sequence":"additional","affiliation":[{"name":"School of Electronics and Computer Science, University of Southampton, University Road , Southampton, SO17 1BJ ,","place":["United Kingdom"]}]}],"member":"286","published-online":{"date-parts":[[2025,1,21]]},"reference":[{"key":"2025092301112690300_bib1","doi-asserted-by":"crossref","first-page":"177","DOI":"10.2307\/2022451","article-title":"Quantifiers and propositional attitudes","volume":"53","author":"Quine","year":"1956","journal-title":"J Philos"},{"key":"2025092301112690300_bib2","doi-asserted-by":"crossref","first-page":"513","DOI":"10.2307\/2184843","article-title":"Attitudes de dicto and de se","volume":"88","author":"Lewis","year":"1979","journal-title":"Philos Review"},{"key":"2025092301112690300_bib3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF00355667","article-title":"Knowledge and belief: \u2018De dicto\u2019 and \u2018de re\u2019","volume":"29","author":"Chisholm","year":"1976","journal-title":"Philos Stud"},{"key":"2025092301112690300_bib4","first-page":"167","article-title":"De re\/de dicto","volume-title":"The Oxford Handbook of Reference","author":"Keshet","year":"2019"},{"key":"2025092301112690300_bib5","first-page":"611","article-title":"When names are not commonly known: epistemic logic with assignments","volume-title":"Advances in Modal Logic 12, proceedings of the 12th conference on \u201cAdvances in Modal Logic\u201d, held in Bern, Switzerland, August 27-31, 2018","author":"Wang","year":"2018"},{"key":"2025092301112690300_bib6","first-page":"103","article-title":"De Re Updates","volume-title":"Proceedings Eighteenth Conference on Theoretical Aspects of Rationality and Knowledge, TARK 2021, Beijing, China, June 25-27, 2021","author":"Cohen","year":"2021"},{"key":"2025092301112690300_bib7","doi-asserted-by":"crossref","first-page":"91","DOI":"10.2307\/2214717","article-title":"Egocentric logic","volume":"2","author":"Prior","year":"1968","journal-title":"No\u00fbs"},{"key":"2025092301112690300_bib8","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-642-18026-2_15","article-title":"Logic in the community","volume-title":"Logic and Its Applications","author":"Seligman","year":"2011"},{"key":"2025092301112690300_bib9","first-page":"229","article-title":"Facebook and the Epistemic Logic of Friendship","volume-title":"14th conference on Theoretical Aspects of Rationality and Knowledge (TARK \u201813), January 2013, Chennai, India","author":"Seligman","year":"2013"},{"key":"2025092301112690300_bib10","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.jal.2014.11.011","article-title":"A logic for diffusion in social networks","volume":"13","author":"Christoff","year":"2015","journal-title":"J Appl Logic"},{"key":"2025092301112690300_bib11","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s10849-016-9242-y","article-title":"Reflecting on social influence in networks","volume":"25","author":"Christoff","year":"2016","journal-title":"J Logic Lang Inform"},{"key":"2025092301112690300_bib12","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/s11229-024-04655-3","article-title":"A logic of higher-order preferences","volume":"203","author":"Jiang","year":"2024","journal-title":"Synthese"},{"key":"2025092301112690300_bib13","article-title":"Two-Dimensional Semantics","volume-title":"The Stanford Encyclopedia of Philosophy","author":"Schroeter","year":"2021","edition":"Fall 2021"},{"key":"2025092301112690300_bib14","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1163\/9789004368873_013","article-title":"Assertion","volume-title":"Pragmatics","author":"Stalnaker","year":"1978"},{"key":"2025092301112690300_bib15","first-page":"301","article-title":"Naming and Identity in a Multi-Agent Epistemic Logic","volume-title":"Proceedings of the 2nd International Conference on Principles of Knowledge Representation and Reasoning (KR\u201991). Cambridge, MA, USA, April 22-25, 1991","author":"Grove","year":"1991"},{"key":"2025092301112690300_bib16","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1093\/logcom\/3.4.345","article-title":"Naming and identity in epistemic logics Part I: the propositional case","volume":"3","author":"Grove","year":"1993","journal-title":"J Logic Comput"},{"key":"2025092301112690300_bib17","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/0004-3702(95)98593-D","article-title":"Naming and identity in epistemic logic Part II: a first-order logic for naming","volume":"74","author":"Grove","year":"1995","journal-title":"Artif Intell"},{"key":"2025092301112690300_bib18","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v35i13.17367","article-title":"Epistemic Logic of Know-Who","volume-title":"Proceedings of Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI-21)","author":"Epstein","year":"2021"},{"key":"2025092301112690300_bib19","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1093\/logcom\/exad053","article-title":"An egocentric logic of de dicto and de re knowing who","volume":"34","author":"Epstein","year":"2023","journal-title":"J Logic Comput"},{"key":"2025092301112690300_bib20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/jsl.2023.45","article-title":"An egocentric logic of knowing how to tell them apart","author":"Naumov","year":"2023","journal-title":"J Symbolic Logic"},{"key":"2025092301112690300_bib21","first-page":"91","article-title":"The ceteris paribus structure of logics of game forms","volume":"53","author":"Grossi","year":"2015","journal-title":"J Artif Intel Res"},{"key":"2025092301112690300_bib22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10992-020-09588-z","article-title":"A simple logic of functional dependence","volume":"50","author":"Baltag","year":"2021","journal-title":"J Philos Logic"},{"key":"2025092301112690300_bib23","doi-asserted-by":"crossref","first-page":"103727","DOI":"10.1016\/j.artint.2022.103727","article-title":"Data-Informed Knowledge and Strategies","volume":"309","author":"Jiang","year":"2022","journal-title":"Artif Intell"},{"key":"2025092301112690300_bib24","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1007\/s10992-023-09740-5","article-title":"A Dynamic Logic of Data-Informed Knowledge","volume":"53","author":"Deuser","year":"2024","journal-title":"J Philos Logic"},{"key":"2025092301112690300_bib25","doi-asserted-by":"publisher","DOI":"10.1007\/s11229-024-04671-3","article-title":"A logic of trust-based beliefs","volume":"204","author":"Jiang","year":"2024","journal-title":"Synthese"},{"key":"2025092301112690300_bib26","first-page":"19876","article-title":"The Logic of Doxastic Strategies","volume-title":"Proceedings of 38th AAAI Conference on Artificial Intelligence (AAAI-24)","author":"Jiang","year":"2024"},{"article-title":"Truth set algebra: a new way to prove undefinability","year":"2022","author":"Knight","key":"2025092301112690300_bib27"},{"key":"2025092301112690300_bib28","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v38i18.29968","article-title":"Responsibility in Extensive Form Games","volume-title":"Proceedings of 38th AAAI Conference on Artificial Intelligence (AAAI-24)","author":"Shi","year":"2024"},{"key":"2025092301112690300_bib29","doi-asserted-by":"crossref","DOI":"10.1215\/00294527-2024-0018","article-title":"Responsibility in Infinite Games","author":"Cui","year":"2024","journal-title":"Notre Dame Journal of Formal Logic"},{"article-title":"Introduction to mathematical logic","year":"2009","author":"Mendelson","key":"2025092301112690300_bib30"},{"key":"2025092301112690300_bib31","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1145\/128749.150945","article-title":"What can machines know? On the properties of knowledge in distributed systems","volume":"39","author":"Fagin","year":"1992","journal-title":"J ACM (JACM)"},{"key":"2025092301112690300_bib32","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"K-anonymity: A Model for Protecting Privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"article-title":"Database anonymization: privacy models, data utility, and microaggregation-based inter-model connections","year":"2022","author":"Domingo-Ferrer","key":"2025092301112690300_bib33"},{"key":"2025092301112690300_bib34","first-page":"814","article-title":"Group principals and the formalization of anonymity","volume-title":"International Symposium on Formal Methods","author":"Syverson","year":"1999"},{"key":"2025092301112690300_bib35","first-page":"75","article-title":"Anonymity and information hiding in multiagent systems","volume-title":"Proceedings of the Sixteenth IEEE Computer Security Foundations Workshop","author":"Halpern","year":"2003"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyae025\/61526049\/tyae025.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyae025\/61526049\/tyae025.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T05:11:55Z","timestamp":1758604315000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyae025\/7965383"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyae025","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyae025"}}