A5 Exchange and Fusion of Information under Availability and Confidentiality Requirements in MultiAgent Systems
- Prof. Dr. Gabriele Kern-Isberner
- Prof. Dr. Joachim Biskup
Achieving both availability and confidentiality of information implies the development and employment of concepts and algorithms that handle conflicting security issues of actors and
persons concerned in general. This should be possible even in situations with limited technical infrastructure in terms of time, space, and communication. To achieve these goals,
this project aims at extending data base techniques for multi-agent systems, in particular, for the purpose of data mining in embedded systems.
Publications
- [1] Biskup, J.:
Security in Computing Systems – Challenges, Approaches and
Solutions. Springer, 2009.
- [2] Biskup, J.:
Usability confinement of server reactions maintaining
inference-proof client views by controlled interaction execution. In: Databases
in Networked Information Systems, DNIS 2010 , Bd. 5999 d. Reihe
Lecture Notes in Computer Science, S. 80–106. Springer, 2010.
- [3] Biskup, J. und P. Bonatti:
Controlled query evaluation with open queries
for a decidable relational submodel. Annals of Mathematics and Artificial
Intelligence, 50:39–77, 2007.
- [4] Biskup, J., C. Gogolin, J. Seiler und T. Weibert:
Requirements
and Protocols for Inference-Proof Interactions in Information Systems.
In: European Symposium on Research in Computer Security, ESORICS
2009 , Bd. 5789 d. Reihe Lecture Notes in Computer Science, S. 285–302.
Springer, 2009.
- [5] Biskup, J., G. Kern-Isberner und M. Thimm:
Towards Enforcement
of Confidentiality in Agent Interactions. In: Pagnucco, M. und
M. Thielscher (Hrsg.): Proceedings of the 12th International Workshop
on Non-Monotonic Reasoning (NMR’08), S. 104–112, Sydney, Australia,
September 2008. University of New South Wales, Technical Report No.
UNSW-CSE-TR-0819.
- [6] Biskup, J. und T. Weibert:
Keeping Secrets in Incomplete Databases.
Int. Journal of Information Security, 7:199–217, 2008.
- [7] Biskup, J. und L. Wiese:
Preprocessing for controlled query evaluation
with availability policy. Journal of Computer Security, 16:477–494, 2008.
- [8] Falappa, M. A., G. Kern-Isberner und G. R. Simari:
Belief Revision
and Argumentation Theory. In: Argumentation in Artificial Intelligence,
S. 341–360. Springer, 2009.
- [9] Kern-Isberner, G.:
Linking iterated belief change operations to nonmonotonic
reasoning. In: Proceedings 11th International Conference on
Knowledge Representation and Reasoning, KR-2008 , S. 166–176, 2008.
- [10] Kern-Isberner, G. und J. Fisseler:
Knowledge discovery by reversing
inductive knowledge representation. In: Proceedings of the Ninth International
Conference on the Principles of Knowledge Representation and
Reasoning, KR-2004 , S. 34–44. AAAI Press, 2004.
- [11] Krümpelmann, P., M. Thimm, M. Ritterskamp und G. Kern-
Isberner:
Belief Operations for Motivated BDI Agents. In: Padgham,
L., D. C. Parkes, J. P. Müller und S. Parsons (Hrsg.): Proceedings of
the 7th International Conference on Autonomous Agents and Multiagent
Systems (AAMAS 2008), S. 421–428, Estoril, Portugal, May 2008.
- [12] Thimm, M. und G. Kern-Isberner:
A Distributed Argumentation Framework
using Defeasible Logic Programming. In: Besnard, P., S. Doutre
und A. Hunter (Hrsg.): Proceedings of the 2nd International Conference
on Computational Models of Argument (COMMA’08), Nr. 172 in
Frontiers in Artificial Intelligence and Applications, S. 381–392, Toulouse,
France, May 2008. IOS Press.
Publications (State of the art)
- [60] Thimm, M., A. J. Garcia, G. Kern-Isberner und G. R. Simari:
Using Collaborations for Distributed Argumentation with Defeasible Logic Programming. In: Pagnucco, M. und M. Thielscher (Hrsg.): Proceedings of the 12th International Workshop on Non-Monotonic Reasoning (NMR’08), S. 179–188, Sydney, Australia, September 2008. University of New South Wales, Technical Report No. UNSW-CSE-TR-0819.