Skip to main content

Critical Information Diffusion Systems

  • Conference paper
  • First Online:
Book cover New Trends in Databases and Information Systems (ADBIS 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 539))

Included in the following conference series:

  • East European Conference on Advances in Databases and Information Systems
  • 1253 Accesses

Abstract

Today, individuals, companies, organizations and national agencies are increasingly interconnected, forming complex and decentralized information systems. In some of these systems, the very fact of exchanging information can constitute a safety critical concern in itself. Take for instance the prevention of natural disasters. We have a set of actors who share their observation data and information in order to better manage crises by warning the more competent authorities. The aim of this article is to find a definition to such kind of systems we name Critical Information Diffusion Systems. In addition, we see why Critical Information Diffusion Systems need information exchange policies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Department Of Defense Standard Department Of Defense Trusted Computer System Evaluation Criteria (1985)

    Google Scholar 

  2. Barhamgi, M., Benslimane, D., Oulmakhzoune, S., Cuppens-Boulahia, N., Cuppens, F., Mrissa, M., Taktak, H.: Secure and privacy-preserving execution model for data services. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 35–50. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  3. Bieber, P., Cuppens, F.: Expression of confidentiality policies with deontic logic. In: Meyer, J.J.C., Wieringa, R.J. (eds.) Deontic Logic in Computer Science: Normative System Specification, pp. 103–123. John Wiley & Sons, Inc. (1993)

    Google Scholar 

  4. Browne, J., Zhang, J.: Extended and virtual enterprises similarities and differences. International Journal of Agile Management Systems 1(1), 30–36 (1999)

    Article  Google Scholar 

  5. Castaneda, H.N.: Thinking and doing. D. Reidel, Dordrecht (1975)

    Google Scholar 

  6. Dal Bello, B.R.: Managing risk in space. Federation of American Scientists, Public Interest Report, Winter (2011)

    Google Scholar 

  7. Delmas, R., Polacsek, T.: Formal methods for exchange policy specification. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 288–303. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  8. Delmas, R., Polacsek, T.: Need-to-share & non-diffusion requirements verification in exchange policies. In: Zdravkovic, J., Kirikova, M., Johannesson, P. (eds.) CAiSE 2015. LNCS, vol. 9097, pp. 151–165. Springer, Heidelberg (2015)

    Google Scholar 

  9. Dyer, J.H., Singh, H.: The Relational View: Cooperative Strategy and Sources of Interorganizational Competitive Advantage. The Academy of Management Review 23(4), 660–679 (1998)

    Google Scholar 

  10. Edmonds, B.: How formal logic can fail to be useful for modelling or designing MAS. In: Lindemann, G., Moldt, D., Paolucci, M. (eds.) RASTA 2002. LNCS (LNAI), vol. 2934, pp. 1–15. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Gallier, J.H.: Logic for Computer Science: Foundations of Automatic Theorem Proving, chap. 10, pp. 448–476. Wiley (1987)

    Google Scholar 

  12. Heymann, D.L., Rodier, G.R.: Hot spots in a wired world: \(\{\)WHO\(\}\) surveillance of emerging and re-emerging infectious diseases. The Lancet Infectious Diseases 1(5), 345–353 (2001)

    Article  Google Scholar 

  13. Kalam, A.A.E., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks Proceedings, POLICY 2003. IEEE (2003)

    Google Scholar 

  14. Mandl, K.D., Overhage, J., Wagner, M.M., Lober, W.B., Sebastiani, P., Mostashari, F., Pavlin, J.A., Gesteland, P.H., Treadwell, T., Koski, E., Hutwagner, L., Buckeridge, D.L., Aller, R.D., Grannis, S.: Implementing syndromic surveillance: a practical guide informed by the early experience. Journal of the American Medical Informatics Association 11, 141–150 (2004)

    Article  Google Scholar 

  15. McCarthy, J.: Modality, si! modal logic, no!. Studia Logica 59(1), 29–32 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  16. Meynard, J., Chaudet, H., Texier, G., Ardillon, V., Ravachol, F., Deparis, X., Jefferson, H., Dussart, P., Morvan, J., Boutin, J.: Value of syndromic surveillance within the armed forces for early warning during a dengue fever outbreak in french guiana in 2006. BMC Med. Inf. & Decision Making 8, 29 (2008)

    Article  Google Scholar 

  17. Parwani, T., Kholoussi, R., Karras, P.: How to hack into facebook without being a hacker. In: Carr, L., Laender, A.H.F., Lóscio, B.F., King, I., Fontoura, M., Vrandecic, D., Aroyo, L., de Oliveira, J.P.M., Lima, F., Wilde, E. (eds.) WWW (Companion Volume), pp. 751–754. International World Wide Web Conferences Steering Committee / ACM (2013)

    Google Scholar 

  18. Sebastiani, R., Vescovi, M.: Automated reasoning in modal and description logics via sat encoding: the case study of k(m)/alc-satisfiability. J. Artif. Intell. Res. (JAIR) 35, 343–389 (2009)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rémi Delmas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Delmas, R., Polacsek, T. (2015). Critical Information Diffusion Systems. In: Morzy, T., Valduriez, P., Bellatreche, L. (eds) New Trends in Databases and Information Systems. ADBIS 2015. Communications in Computer and Information Science, vol 539. Springer, Cham. https://doi.org/10.1007/978-3-319-23201-0_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23201-0_56

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23200-3

  • Online ISBN: 978-3-319-23201-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics