Advertisement

Data-security in heterogeneous agent systems

  • Piero A. Bonatti
  • Sarit Kraus
  • Jose Salinas
  • V. S. Subrahmanian
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1435)

Abstract

In this paper, we describe: (i) how agents can protect information from other agents and (ii) how servers that support agent cooperation can help in this process. We show that agents' data security policies can be encoded through three structures called metaknowledge, history and agent security tables. We develop a framework that allows arbitrary metalanguages and history maintenance policies to be “plugged in”, and develop complexity results, including polynomial (efficiently computable) approximations.

Keywords

Police Officer Logic Program Mobile Agent Security Policy Stable Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    S. Adali, K.S. Candan, Y. Papakonstantinou and V.S. Subrahmanian. (1996) Query Processing in Distributed Mediated Systems, in: Proc. 1996 ACM SIGMOD Conf. on Management of Data, Montreal, Canada, June 1996.Google Scholar
  2. 2.
    K.Apt, H. Blair and9 A. Walker. (1988) Towards a theory of declarative knowledge, in J. Minker (ed.) “Foundations of Deductive Databases and Logic Programming”, pps 89–148, Morgan Kaufman.Google Scholar
  3. 3.
    K. Arisha, S. Kraus, F. Ozcan, R. Ross and V.S. Subrahmanian (1998). IMPACT: The Interactive Maryland Platform for Agents Collaborating Together (submitted).Google Scholar
  4. 4.
    E. Bertino, C. Bettini, E. Ferrari and P. Samarati. (1996) A Temporal Access Control Mechanism for Database Systems, IEEE Trans. on Knowledge and Data Engineering, Vol. 8, Nr. 1, pps 67–80CrossRefGoogle Scholar
  5. 5.
    E. Bertino, P. Samarati and S. Jajodia. Authorizations in relational database management systems, Proc. 1st ACM Conf. on Computer and Comm. Security, Fairfax, VA, Nov. 1993.Google Scholar
  6. 6.
    P. Bonatti, S. Kraus and V.S. Subrahmanian. Foundations of Secure Deductive Databases, IEEE Transactions on Knowledge and Data Engineering, 7,3, June 1995.CrossRefGoogle Scholar
  7. 7.
    A. Brink, S. Marcus and V.S. Subrahmanian. Heterogeneous Multimedia Reasoning. IEEE Computer, 28(9):33–39, Sep. 1995.Google Scholar
  8. 8.
    K.S. Candan, S. Jajodia and V.S. Subrahmanian. (1996) Secure Mediated Databases, in: Proc. 1996 Intl. Conf. on Data Engineering, Feb. 1996, New Orleans, LA.Google Scholar
  9. 9.
    S. Castano, M.G. Fugini, G. Martella, and P. Samarati, Database Security, Addison-Wesley, 1995.Google Scholar
  10. 10.
    R.G.G. Cattell. (ed.) (1993) The Object Database Standard: ODMG-93, Morgan Kaufmann.Google Scholar
  11. 11.
    D. M. Chess (1996). Security in Agents Systems,http://www.av.ibm.com/InsideTheLab/Bookshelf/ScientificPapers/.Google Scholar
  12. 12.
    The CORBAservices Specifications, 1997. http://www.omg.org/library/corbserv.htmGoogle Scholar
  13. 13.
    M. Crosbie and E. Spafford (1995). Applying genetic programming to intrusion detection. In Proceedings of the AAAI 1995 Fall Symposium series, November 1995.Google Scholar
  14. 14.
    T. Eiter, V.S.Subrahmanian and G. Pick. (1998) Heterogeneous Active Agents, draft manuscript, 115 pages.Google Scholar
  15. 15.
    L. N. Foner (1996). A Security Architecture for Multi-Agent Matchmaking, Second International Conference on Multi-Agent Systems (ICMAS96), Japan.Google Scholar
  16. 16.
    M. Gelfond and V. Lifschitz. (1988) The Stable Model Semantics for Logic Programming, in: Proc. 5th International Conference and Symposium on Logic Programming, ed R. A. Kowalski and K. A. Bowen, pp 1070–1080.Google Scholar
  17. 17.
    G. Gottlob (1992). Complexity results for nonmonotonic logics, Journal of Logic and Computation, 2(3):397–425, June 1992.zbMATHMathSciNetGoogle Scholar
  18. 18.
    G. Gottlob. (1995) The complexity of default reasoning under the stationary fixed point semantics, Information and Computation, 121(1):81–92, 15 August 1995.zbMATHMathSciNetCrossRefGoogle Scholar
  19. 19.
    S. Jajodia and R. Sandhu, Toward a Multilevel Relational Data Model, in Proc. ACM-SIGMOD Conf., Denver, May 1991.Google Scholar
  20. 20.
    J.W. Lloyd. (1987) Foundations of Logic Programming, Springer.Google Scholar
  21. 21.
    J. Lu, G. Moerkotte, J. Schue, and V.S. Subrahmanian. Efficient Maintenance of Materialized Mediated Views, in: Proc. 1995 ACM SIGMOD Conf. on Management of Data, San Jose, CA, May 1995.Google Scholar
  22. 22.
    J. Lu, A. Nerode and V.S. Subrahmanian. Hybrid Knowledge Bases, IEEE Transactions on Knowledge and Data Engineering, 8, 5, pp 773–785, Oct. 1996. Released as a University of Maryland Technical Report, Summer 1993.CrossRefGoogle Scholar
  23. 23.
    T. F. Lunt. Access control policies for database systems. In C. E. Landwehr,editor, Database Security II: Status and Prospects, pages 41–52. North-Holland,Amsterdam, 1989.Google Scholar
  24. 24.
    S. Marcus and V.S. Subrahmanian. Foundations of Multimedia Database Systems, Journal of the ACM, Vol. 43, 3, pp 474–523, 1996.zbMATHMathSciNetCrossRefGoogle Scholar
  25. 25.
    W. Marek, A. Nerode and J.B. Remmel. (1990) Non-Monotonic Rule Systems 1, 2, Annals of Mathematics and Artificial Intelligence, pps 241–273.Google Scholar
  26. 26.
    A. Martelli and U. Montanari. (1982) An Efficient Unification Algorithm, ACM Trans. on Prog. Lang. and Systems, 4, 2, pps 258–282.zbMATHCrossRefGoogle Scholar
  27. 27.
    J. Millen and T. Lunt, Security for Object-Oriented Database Systems, in Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland, California, May 1992.Google Scholar
  28. 28.
    R. Moore. Semantical Considerations on Nonmonotonic Logics. Artificial Intelligence, 25:75–94, 1985.zbMATHMathSciNetCrossRefGoogle Scholar
  29. 29.
    T. Przymusinski. (1988) On the declarative semantics of deductive databases and logic programs, in J. Minker (ed.) “Foundations of Deductive Databases and Logic Programming”, pps 193–216, Morgan Kaufman.Google Scholar
  30. 30.
    C. Thirunavukkarasu, T. Finin and J. Mayfield (1995). Secret Agents — A Security Architecture for the KQML Agent Communication Language, Intelligent Information Agents Workshop held in conjunction with Fourth International Conference on Information and Knowledge Management CIKM'95.Google Scholar
  31. 31.
    T. Sander, C. Tschudin. Protecting mobile agents against malicious hosts. In G. Vigna (ed.) Mobile Agents and Security, LNCS, to appear.Google Scholar
  32. 32.
    M. Winslett, K. Smith, and X. Qian, Formal Query Languages for Secure Relational Databases, ACM-TODS, 19, 4, pp. 626–662, December 1994.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Piero A. Bonatti
    • 1
  • Sarit Kraus
    • 2
  • Jose Salinas
    • 3
  • V. S. Subrahmanian
    • 4
  1. 1.Université di TorinoItalia
  2. 2.Bar-Han UniversityUSA
  3. 3.Army Research LabUSA
  4. 4.University of MarylandUSA

Personalised recommendations