Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services
详细信息    查看全文
  • 作者:Joachim Biskup (19)
    Cornelia Tadros (19)
  • 关键词:agent ; a priori knowledge ; attacker assumption ; belief ; belief revision ; confidentiality policy ; constraint ; censor ; data mining ; data publishing ; formal semantics ; frontend ; group ; inference control ; inference ; usability confinement ; information engineering ; information flow ; information integration ; invariant ; logic ; lying ; overestimation ; permission ; possibilistic secrecy ; prohibition ; query answering ; reasoning ; refreshment ; refusal ; simulation ; state ; theorem ; proving ; update processing
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2014
  • 出版时间:2014
  • 年:2014
  • 卷:8364
  • 期:1
  • 页码:35-44
  • 全文大小:230 KB
  • 参考文献:1. Andrighetto, G., Governatori, G., Noriega, P., van der Torre, L.W.N. (eds.): Normative Multi-Agent Systems. Dagstuhl Follow-Ups, vol.?4. Schloss Dagstuhl -Leibniz-Zentrum für Informatik (2013)
    2. Biskup, J.: Dynamic policy adaption for inference control of queries to a propositional information system. Journal of Computer Security?20, 509-46 (2012)
    3. Biskup, J.: Inference-usability confinement by maintaining inference-proof views of an information system. International Journal of Computational Science and Engineering?7(1), 17-7 (2012) CrossRef
    4. Biskup, J.: Logic-oriented confidentiality policies for controlled interaction execution. In: Madaan, A., Kikuchi, S., Bhalla, S. (eds.) DNIS 2013. LNCS, vol.?7813, pp. 1-2. Springer, Heidelberg (2013) CrossRef
    5. Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec.?3(1), 14-7 (2004) CrossRef
    6. Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell.?40(1-2), 37-2 (2004) CrossRef
    7. Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell.?50(1-2), 39-7 (2007) CrossRef
    8. Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Inference-proof view update transactions with forwarded refreshments. Journal of Computer Security?19, 487-29 (2011)
    9. Biskup, J., Li, L.: On inference-proof view processing of XML documents. IEEE Trans. Dependable Sec. Comput.?10(2), 99-13 (2013) CrossRef
    10. Biskup, J., Tadros, C.: Preserving confidentiality while reacting on iterated queries and belief revisions. Ann. Math. Artif. Intell. (2013), doi:10.1007/s10472-013-9374-6
    11. Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec.?7(3), 199-17 (2008) CrossRef
    12. Biskup, J., Wiese, L.: A sound and complete model-generation procedure for consistent and confidentiality-preserving databases. Theoretical Computer Science?412, 4044-072 (2011) CrossRef
    13. Brewka, G.: Multi-context systems: Specifying the interaction of knowledge bases declaratively. In: Kr?tzsch, M., Straccia, U. (eds.) RR 2012. LNCS, vol.?7497, pp. 1-. Springer, Heidelberg (2012) CrossRef
    14. Calvanese, D., Giacomo, G.D., Lenzerini, M., Rosati, R.: View-based query answering in description logics: Semantics and complexity. J. Comput. Syst. Sci.?78(1), 26-6 (2012) CrossRef
    15. Halpern, J.Y., O’Neill, K.R.: Secrecy in multiagent systems. ACM Trans. Inf. Syst. Secur.?12(1), 5.1-.47 (2008)
    16. Huget, M.-P., Poslad, S.: The Foundation of Intelligent Physical Agents, http://www.fipa.org
    17. Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design. Journal of Computer Security?21(2), 283-15 (2013)
    18. Kott, A., McEneaney, W.M. (eds.): Adversarial Reasoning: Computational Approaches to Reading the Opponent’s Mind. Chapman & Hall/CRC, Boca Raton (2007)
    19. Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur.?12(3) (2009)
    20. Pretschner, A., Hilty, M., Basin, D.A.: Distributed usage control. Commun. ACM?49(9), 39-4 (2006) CrossRef
    21. Sarawagi, S.: Information extraction. Foundations and Trends in Databases?1(3), 261-77 (2008) CrossRef
    22. Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst.?8(1), 41-9 (1983) CrossRef
    23. Wooldridge, M.J.: An Introduction to MultiAgent Systems, 2nd edn. Wiley, Hoboken (2009)
  • 作者单位:Joachim Biskup (19)
    Cornelia Tadros (19)

    19. Fakult?t für Informatik, Technische Universit?t Dortmund, Germany
  • ISSN:1611-3349
文摘
To protect an agent’s own knowledge or belief against unwanted information inferences by cooperating agents, Controlled Interaction Execution offers a variety of control methods to confine the information content of outgoing interaction data according to agent-specific confidentiality policies, assumptions and reaction specifications. Based on preliminary experiences with a prototype implementation as a frontend to a relational DBMS, in this article we outline the architectural design and the parameterized construction of specific tasks to uniformly shield all information services in need of confinement, potentially comprising query answering, update processing with refreshments, belief revision, data publishing and data mining. Refraining from any intervention at the cooperating agents, which are also seen as intelligently attacking the defending agent’s own interest in preserving confidentiality, the engineering solely aims at self-confinement when releasing information.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700