Abstract
To protect an agent’s own knowledge or belief against unwanted information inferences by cooperating agents, Controlled Interaction Execution offers a variety of control methods to confine the information content of outgoing interaction data according to agent-specific confidentiality policies, assumptions and reaction specifications. Based on preliminary experiences with a prototype implementation as a frontend to a relational DBMS, in this article we outline the architectural design and the parameterized construction of specific tasks to uniformly shield all information services in need of confinement, potentially comprising query answering, update processing with refreshments, belief revision, data publishing and data mining. Refraining from any intervention at the cooperating agents, which are also seen as intelligently attacking the defending agent’s own interest in preserving confidentiality, the engineering solely aims at self-confinement when releasing information.
This work has been supported by the Deutsche Forschungsgemeinschaft (German Research Council) under grant SFB 876/A5 within the framework of the Collaborative Research Center “Providing Information by Resource-Constrained Data Analysis”.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
- agent
- a priori knowledge
- attacker assumption
- belief
- belief revision
- confidentiality policy
- constraint
- censor
- data mining
- data publishing
- formal semantics
- frontend
- group
- inference control
- inference-usability confinement
- information engineering
- information flow
- information integration
- invariant
- logic
- lying
- overestimation
- permission
- possibilistic secrecy
- prohibition
- query answering
- reasoning
- refreshment
- refusal
- simulation
- state
- theorem-proving
- update processing
References
Andrighetto, G., Governatori, G., Noriega, P., van der Torre, L.W.N. (eds.): Normative Multi-Agent Systems. Dagstuhl Follow-Ups, vol. 4. Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)
Biskup, J.: Dynamic policy adaption for inference control of queries to a propositional information system. Journal of Computer Security 20, 509–546 (2012)
Biskup, J.: Inference-usability confinement by maintaining inference-proof views of an information system. International Journal of Computational Science and Engineering 7(1), 17–37 (2012)
Biskup, J.: Logic-oriented confidentiality policies for controlled interaction execution. In: Madaan, A., Kikuchi, S., Bhalla, S. (eds.) DNIS 2013. LNCS, vol. 7813, pp. 1–22. Springer, Heidelberg (2013)
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14–27 (2004)
Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40(1-2), 37–62 (2004)
Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1-2), 39–77 (2007)
Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Inference-proof view update transactions with forwarded refreshments. Journal of Computer Security 19, 487–529 (2011)
Biskup, J., Li, L.: On inference-proof view processing of XML documents. IEEE Trans. Dependable Sec. Comput. 10(2), 99–113 (2013)
Biskup, J., Tadros, C.: Preserving confidentiality while reacting on iterated queries and belief revisions. Ann. Math. Artif. Intell. (2013), doi:10.1007/s10472-013-9374-6
Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7(3), 199–217 (2008)
Biskup, J., Wiese, L.: A sound and complete model-generation procedure for consistent and confidentiality-preserving databases. Theoretical Computer Science 412, 4044–4072 (2011)
Brewka, G.: Multi-context systems: Specifying the interaction of knowledge bases declaratively. In: Krötzsch, M., Straccia, U. (eds.) RR 2012. LNCS, vol. 7497, pp. 1–4. Springer, Heidelberg (2012)
Calvanese, D., Giacomo, G.D., Lenzerini, M., Rosati, R.: View-based query answering in description logics: Semantics and complexity. J. Comput. Syst. Sci. 78(1), 26–46 (2012)
Halpern, J.Y., O’Neill, K.R.: Secrecy in multiagent systems. ACM Trans. Inf. Syst. Secur. 12(1), 5.1–5.47 (2008)
Huget, M.-P., Poslad, S.: The Foundation of Intelligent Physical Agents, http://www.fipa.org
Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design. Journal of Computer Security 21(2), 283–315 (2013)
Kott, A., McEneaney, W.M. (eds.): Adversarial Reasoning: Computational Approaches to Reading the Opponent’s Mind. Chapman & Hall/CRC, Boca Raton (2007)
Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3) (2009)
Pretschner, A., Hilty, M., Basin, D.A.: Distributed usage control. Commun. ACM 49(9), 39–44 (2006)
Sarawagi, S.: Information extraction. Foundations and Trends in Databases 1(3), 261–377 (2008)
Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1), 41–59 (1983)
Wooldridge, M.J.: An Introduction to MultiAgent Systems, 2nd edn. Wiley, Hoboken (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Biskup, J., Tadros, C. (2014). Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services. In: Jürjens, J., Piessens, F., Bielova, N. (eds) Engineering Secure Software and Systems. ESSoS 2014. Lecture Notes in Computer Science, vol 8364. Springer, Cham. https://doi.org/10.1007/978-3-319-04897-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-04897-0_3
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04896-3
Online ISBN: 978-3-319-04897-0
eBook Packages: Computer ScienceComputer Science (R0)