%O Report %F PI-1921 %A Dubreil, J. %A Darondeau, Ph. %A Marchand, H. %T Supervisory Control for Opacity %N 1921 %I IRISA %X In the field of computer security, a problem that received little attention so far is the enforcement of confidentiality properties by supervisory control. Given a critical system G that may leak confidential information, the problem consists in designing a controller C, possibly disabling occurrences of a fixed subset of events of G, so that the closed-loop system G/C does not leak confidential information. We consider this problem in the case where G is a finite transition system with set of events A and an inquisitive user, called the adversary, observes a subset Aa of A. The confidential information is the fact (when it is true) that the trace of the execution of G on A* belongs to a regular set S in A, called the secret. The secret S is said to be opaque w.r.t. G (resp. G/C) and Aa if the adversary cannot safely infer this fact from the trace of the execution of G (resp. G/C) on Aa*. In the converse case, the secret can be disclosed. We present an effective algorithm for computing the most permissive controller C such that S is opaque w.r.t. G/C and Aa. This algorithm subsumes two earlier algorithms working under the strong assumption that the alphabet Aa of the adversary and the set of events that the controller can disable are comparable %U http://www.irisa.fr/vertecs/Publis/Ps/PI-1921.pdf %8 February %D 2009