Hauptnavigation

SFB 876 - News

A5 Exchange and Fusion of Information under Availability and Confidentiality Requirements in MultiAgent Systems


Prof. Dr. Gabriele Kern-Isberner
Prof. Dr. Joachim Biskup
Achieving both availability and confidentiality of information implies the development and employment of concepts and algorithms that handle conflicting security issues of actors and persons concerned in general. This should be possible even in situations with limited technical infrastructure in terms of time, space, and communication. To achieve these goals, this project aims at extending data base techniques for multi-agent systems, in particular, for the purpose of data mining in embedded systems.

Publications

  • [1] Biskup, J.:
    Security in Computing Systems – Challenges, Approaches and Solutions. Springer, 2009.
  • [2] Biskup, J.:
    Usability confinement of server reactions maintaining inference-proof client views by controlled interaction execution. In: Databases in Networked Information Systems, DNIS 2010 , Bd. 5999 d. Reihe Lecture Notes in Computer Science, S. 80–106. Springer, 2010.
  • [3] Biskup, J. und P. Bonatti:
    Controlled query evaluation with open queries for a decidable relational submodel. Annals of Mathematics and Artificial Intelligence, 50:39–77, 2007.
  • [4] Biskup, J., C. Gogolin, J. Seiler und T. Weibert:
    Requirements and Protocols for Inference-Proof Interactions in Information Systems. In: European Symposium on Research in Computer Security, ESORICS 2009 , Bd. 5789 d. Reihe Lecture Notes in Computer Science, S. 285–302. Springer, 2009.
  • [5] Biskup, J., G. Kern-Isberner und M. Thimm:
    Towards Enforcement of Confidentiality in Agent Interactions. In: Pagnucco, M. und M. Thielscher (Hrsg.): Proceedings of the 12th International Workshop on Non-Monotonic Reasoning (NMR’08), S. 104–112, Sydney, Australia, September 2008. University of New South Wales, Technical Report No. UNSW-CSE-TR-0819.
  • [6] Biskup, J. und T. Weibert:
    Keeping Secrets in Incomplete Databases. Int. Journal of Information Security, 7:199–217, 2008.
  • [7] Biskup, J. und L. Wiese:
    Preprocessing for controlled query evaluation with availability policy. Journal of Computer Security, 16:477–494, 2008.
  • [8] Falappa, M. A., G. Kern-Isberner und G. R. Simari:
    Belief Revision and Argumentation Theory. In: Argumentation in Artificial Intelligence, S. 341–360. Springer, 2009.
  • [9] Kern-Isberner, G.:
    Linking iterated belief change operations to nonmonotonic reasoning. In: Proceedings 11th International Conference on Knowledge Representation and Reasoning, KR-2008 , S. 166–176, 2008.
  • [10] Kern-Isberner, G. und J. Fisseler:
    Knowledge discovery by reversing inductive knowledge representation. In: Proceedings of the Ninth International Conference on the Principles of Knowledge Representation and Reasoning, KR-2004 , S. 34–44. AAAI Press, 2004.
  • [11] Krümpelmann, P., M. Thimm, M. Ritterskamp und G. Kern- Isberner:
    Belief Operations for Motivated BDI Agents. In: Padgham, L., D. C. Parkes, J. P. Müller und S. Parsons (Hrsg.): Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), S. 421–428, Estoril, Portugal, May 2008.
  • [12] Thimm, M. und G. Kern-Isberner:
    A Distributed Argumentation Framework using Defeasible Logic Programming. In: Besnard, P., S. Doutre und A. Hunter (Hrsg.): Proceedings of the 2nd International Conference on Computational Models of Argument (COMMA’08), Nr. 172 in Frontiers in Artificial Intelligence and Applications, S. 381–392, Toulouse, France, May 2008. IOS Press.

Publications (State of the art)

  • [60] Thimm, M., A. J. Garcia, G. Kern-Isberner und G. R. Simari:
    Using Collaborations for Distributed Argumentation with Defeasible Logic Programming. In: Pagnucco, M. und M. Thielscher (Hrsg.): Proceedings of the 12th International Workshop on Non-Monotonic Reasoning (NMR’08), S. 179–188, Sydney, Australia, September 2008. University of New South Wales, Technical Report No. UNSW-CSE-TR-0819.