The not-so-secret-agent:
نویسندگان
چکیده
It is well-known that, when agents in an organization possess private information that is unverifiable by an outside party, games where agents simply announce their information can have multiple equilibria that may impede the successful implementation of the organization's objectives. We show that the introduction of a professional monitor (e.g. auditor, regulator, supervisor) can help to destroy the "bad" equilibria when agents have private information but have incomplete information about others' information.
منابع مشابه
Distributed Contingency Logic and Security
In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...
متن کاملEthics and politics in Joseph Conrad’s The Secret Agent And Bozorg Alavi’s Her Eyes
In this paper, the writers try to compare two authors, the Iranian leftist, Bozorg Alavi (1904-1997) and the Polish Joseph Conrad (1857-1924). Although these two writers have different attitudes to Socialism and the question of revolution, both share Romantic idealism and a tragic sense of personal and social life. Moreover, they both are precursors of modernist novel in their countries, and sh...
متن کاملThe Representation of Secret in Masnavi Manavi
Being one of the significant mystic books, Masnavi Manavi has a prominent place in presenting ontology of human being. As though by its revelation, one can reach many mystic and human concepts. Some of the important issues in this work include knowing the secret and secret keeping. The most profound place in Masnavi is where secret and secret keeping are mentioned. Molavi, himself as a...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملAutomatic Repair Mechanism of Secret Sharing Storage System
For mission-critical and safety-critical systems such as medical, financial, or administrative information systems, a secure and reliable storage system is indispensable. The main purpose of our research is to develop a highly secure and highly reliable storage system. We have proposed a storage system that utilizes a secret sharing scheme. The storage system is called the Secret Sharing Storag...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002