{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T05:22:08Z","timestamp":1776316928862,"version":"3.50.1"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,10,1]],"date-time":"2008-10-01T00:00:00Z","timestamp":1222819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-00-1-03-41N00014-01-10-511"],"award-info":[{"award-number":["N00014-00-1-03-41N00014-01-10-511"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IRI-96-25901IIS-0090145"],"award-info":[{"award-number":["IRI-96-25901IIS-0090145"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IRI-96-25901IIS-0090145"],"award-info":[{"award-number":["IRI-96-25901IIS-0090145"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["N00014-01-1-0795"],"award-info":[{"award-number":["N00014-01-1-0795"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2008,10]]},"abstract":"<jats:p>We introduce a general framework for reasoning about secrecy requirements in multiagent systems. Our definitions extend earlier definitions of secrecy and nondeducibility given by Shannon and Sutherland. Roughly speaking, one agent maintains secrecy with respect to another if the second agent cannot rule out any possibilities for the behavior or state of the first agent. We show that the framework can handle probability and nondeterminism in a clean way, is useful for reasoning about asynchronous systems as well as synchronous systems, and suggests generalizations of secrecy that may be useful for dealing with issues such as resource-bounded reasoning. We also show that a number of well-known attempts to characterize the absence of information flow are special cases of our definitions of secrecy.<\/jats:p>","DOI":"10.1145\/1410234.1410239","type":"journal-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:43Z","timestamp":1225979383000},"page":"1-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":69,"title":["Secrecy in Multiagent Systems"],"prefix":"10.1145","volume":"12","author":[{"given":"Joseph Y.","family":"Halpern","sequence":"first","affiliation":[{"name":"Cornell University"}]},{"given":"Kevin R.","family":"O'Neill","sequence":"additional","affiliation":[{"name":"Cornell University"}]}],"member":"320","published-online":{"date-parts":[[2008,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_20"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)00290-7"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/800214.806556"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02)","author":"Di Pierro A."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(83)90082-8"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 7th Conference on Theoretical Aspects of Rationality and Knowledge (TARK'98)","author":"Engelhardt K."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(90)90060-U"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Fagin R. Halpern J. Y. Moses Y. and Vardi M. Y. 1995. Reasoning about Knowledge (Revised 2003). MIT Press Cambridge MA. Fagin R. Halpern J. Y. Moses Y. and Vardi M. Y. 1995. Reasoning about Knowledge (Revised 2003) . MIT Press Cambridge MA.","DOI":"10.7551\/mitpress\/5803.001.0001"},{"key":"e_1_2_1_11_1","first-page":"5","article-title":"A classification of security properties for process algebra","volume":"3","author":"Focardi R.","year":"1994","journal-title":"J. Comput. Sci."},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Focardi R. and Gorrieri R. 2001. Classification of security properties (Part I: Information flow). In Foundations of Security Analysis and Design. Springer 331--396. Focardi R. and Gorrieri R. 2001. Classification of security properties (Part I: Information flow). In Foundations of Security Analysis and Design . Springer 331--396.","DOI":"10.1007\/3-540-45608-2_6"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 1st Seattle Conference on Biostatistics. 255--294","author":"Gill R. D."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP'82)","author":"Goguen J. A."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s004460050043"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622434.1622443"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.2002.2925"},{"key":"e_1_2_1_18_1","unstructured":"Halpern J. Y. 2003. Reasoning About Uncertainty. MIT Press Cambridge MA. Halpern J. Y. 2003. Reasoning About Uncertainty . MIT Press Cambridge MA."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212706"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1410234.1410239"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the Formal Aspects of Security (FASec'02)","volume":"2629","author":"Halpern J. Y."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/846241.846258"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/153724.153770"},{"key":"e_1_2_1_24_1","volume-title":"Recent Work in Philosophy","author":"Kyburg H."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/794201.795167"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/794200.795152"},{"key":"e_1_2_1_27_1","unstructured":"Mantel H. 2003. A uniform framework for the formal specification and verification of information flow security. Ph.D. thesis Universit\u00e4t des Saarlandes. Mantel H. 2003. A uniform framework for the formal specification and verification of information flow security. Ph.D. thesis Universit\u00e4t des Saarlandes."},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP'87)","author":"McCullough D.","year":"1987"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/882490.884224"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1997.2679"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2005.10.044"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0266267100003382"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009380.1009673"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.16"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(82)90010-1"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 12th Computer Security Foundations Workshop (CSFW'99)","author":"Ryan P. Y. A."},{"key":"e_1_2_1_37_1","unstructured":"Ryan P. Y. A. Schneider S. A. Goldsmith M. H. Lowe G. and Roscoe A. W. 2001. Modeling and Analysis of Security Protocols. Addison-Wesley Reading MA. Ryan P. Y. A. Schneider S. A. Goldsmith M. H. Lowe G. and Roscoe A. W. 2001. Modeling and Analysis of Security Protocols . Addison-Wesley Reading MA."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_2_1_39_1","volume-title":"European Symposium on Research in Computer Security (ESORICS'96)","author":"Schneider S."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 9th National Security Conference. 175--183","author":"Sutherland D.","year":"1986"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.12"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy (SP'90)","author":"Wittbold J. T."},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP'97)","author":"Zakinthinos A."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1410234.1410239","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1410234.1410239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:36Z","timestamp":1750253376000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1410234.1410239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["10.1145\/1410234.1410239"],"URL":"https:\/\/doi.org\/10.1145\/1410234.1410239","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,10]]},"assertion":[{"value":"2005-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}