Skip to main content

Reasoning on Secrecy Constraints under Uncertainty to Classify Possible Actions

  • Conference paper
Foundations of Information and Knowledge Systems (FoIKS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8367))

  • 634 Accesses

Abstract

Within a multiagent system, we focus on an intelligent agent \(\mathcal{D}\) maintaining a view on the world and interacting with another agent \(\mathcal{A}\). Defending its own interests, \(\mathcal{D}\) wants to protect sensitive information according to secrecy constraints in a secrecy policy. Hereby, a secrecy constraint intuitively expresses the desire that \(\mathcal{A}\), seen as attacking these interests, should not believe some target sentence by reasoning on the world. For deciding on its actions, \(\mathcal{D}\) has to interpret secrecy constraints under uncertainty about the epistemic state of \(\mathcal{A}\). To this end, we equip \(\mathcal{D}\) with a secrecy reasoner which classifies the agent’s possible actions according to their compliance with its secrecy policy. For this classification task, we introduce principles to guide the reasoning based on postulates about \(\mathcal{A}\). In particular, these principles give guidance on how to deal with the uncertainty about \(\mathcal{A}\) and, if in the face of other desires, \(\mathcal{D}\) considers an action which is potentially violating secrecy constraints, how to mitigate the effect of potential violations. Moreover, we design a secrecy reasoner by presenting a constructive approach for the classification task and verify that the designed reasoner adheres to the principles.

This work has been supported by the Deutsche Forschungsgemeinschaft (German Research Council) under grant SFB 876/A5 within the framework of the Collaborative Research Center “Providing Information by Resource-Constrained Data Analysis”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aucher, G., Boella, G., van der Torre, L.: A dynamic logic for privacy compliance. Artificial Intelligence and Law 19(2), 187–231 (2011)

    Article  Google Scholar 

  2. Bacchus, F., Grove, A.J., Halpern, J.Y., Koller, D.: From statistical knowledge bases to degrees of belief. In: CoRR, cs.AI/0307056 (2003)

    Google Scholar 

  3. Bartha, P.: Conditional obligation, deontic paradoxes, and the logic of agency. Annals of Mathematics and Artificial Intelligence 9(1-2), 1–23 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  4. Biskup, J.: Inference-usability confinement by maintaining inference-proof views of an information system. International Journal of Computational Science and Engineering 7(1), 17–37 (2012)

    Article  Google Scholar 

  5. Biskup, J., Tadros, C.: Preserving confidentiality while reacting on iterated queries and belief revisions. In: Annals of Mathematics and Artificial Intelligence (2013), doi:10.1007/s10472-013-9374-6

    Google Scholar 

  6. Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. International Journal of Information Security 7(3), 199–217 (2008)

    Article  Google Scholar 

  7. Broersen, J., van der Torre, L.: Ten problems of deontic logic and normative reasoning in computer science. In: Bezhanishvili, N., Goranko, V. (eds.) ESSLLI 2010 and ESSLLI 2011. LNCS, vol. 7388, pp. 55–88. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  8. Burmeister, B., Arnold, M., Copaciu, F., Rimassa, G.: BDI-agents for agile goal-oriented business processes. In: Berger, M., Burg, B., Nishiyama, S. (eds.) AAMAS (Industry Track), pp. 37–44. International Foundation for Autonomous Agents and Multiagent Systems, Richland, Richland (2008)

    Google Scholar 

  9. Gelfond, M., Leone, N.: Logic programming and knowledge representation: the A-Prolog perspective. Artificial Intelligence 138 (2002)

    Google Scholar 

  10. Halpern, J.Y., O’Neill, K.R.: Secrecy in multiagent systems. ACM Transactions on Information and System Security 12(1) (2008)

    Google Scholar 

  11. He, M., Jennings, N.R., Leung, H.-F.: On agent-mediated electronic commerce. IEEE Transactions on Knowledge and Data Engineering 15(4), 985–1003 (2003)

    Article  Google Scholar 

  12. Kern-Isberner, G. (ed.): Conditionals in Nonmonotonic Reasoning and Belief Revision - Considering Conditionals as Agents. LNCS, vol. 2087. Springer, Heidelberg (2001)

    Google Scholar 

  13. Kott, A., McEneaney, W.M.: Adversarial Reasoning: Computational Approaches to Reading the Opponent’s Mind. Chapman & Hall/CRC, Boca Raton (2007)

    Google Scholar 

  14. Kuijer, L.B.: Sanction semantics and contrary-to-duty obligations. In: Ågotnes, T., Broersen, J., Elgesem, D. (eds.) DEON 2012. LNCS, vol. 7393, pp. 76–90. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  15. Makinson, D.: Five faces of minimality. Studia Logica 52(3), 339–379 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  16. Makinson, D.: General patterns in nonmonotonic reasoning. In: Handbook of Logic in Artificial Intelligence And Logic Programming, Vol. III. Clarendon Press, Oxford (1994)

    Google Scholar 

  17. van der Torre, L., Tan, Y.-H.: The many faces of defeasibility in defeasible deontic logic. In: Nute, D. (ed.) Defeasible Deontic Logic. Synthese Library, vol. 263, pp. 79–121. Springer, Netherlands (1997)

    Google Scholar 

  18. Wooldridge, M.: Intelligent agents. In: Weiss, G. (ed.) Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press, Cambridge (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Biskup, J., Kern-Isberner, G., Krümpelmann, P., Tadros, C. (2014). Reasoning on Secrecy Constraints under Uncertainty to Classify Possible Actions. In: Beierle, C., Meghini, C. (eds) Foundations of Information and Knowledge Systems. FoIKS 2014. Lecture Notes in Computer Science, vol 8367. Springer, Cham. https://doi.org/10.1007/978-3-319-04939-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04939-7_4

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04938-0

  • Online ISBN: 978-3-319-04939-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics