Abstract
Today, individuals, companies, organizations and national agencies are increasingly interconnected, forming complex and decentralized information systems. In some of these systems, the very fact of exchanging information can constitute a safety critical concern in itself. Take for instance the prevention of natural disasters. We have a set of actors who share their observation data and information in order to better manage crises by warning the more competent authorities. The aim of this article is to find a definition to such kind of systems we name Critical Information Diffusion Systems. In addition, we see why Critical Information Diffusion Systems need information exchange policies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Department Of Defense Standard Department Of Defense Trusted Computer System Evaluation Criteria (1985)
Barhamgi, M., Benslimane, D., Oulmakhzoune, S., Cuppens-Boulahia, N., Cuppens, F., Mrissa, M., Taktak, H.: Secure and privacy-preserving execution model for data services. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 35–50. Springer, Heidelberg (2013)
Bieber, P., Cuppens, F.: Expression of confidentiality policies with deontic logic. In: Meyer, J.J.C., Wieringa, R.J. (eds.) Deontic Logic in Computer Science: Normative System Specification, pp. 103–123. John Wiley & Sons, Inc. (1993)
Browne, J., Zhang, J.: Extended and virtual enterprises similarities and differences. International Journal of Agile Management Systems 1(1), 30–36 (1999)
Castaneda, H.N.: Thinking and doing. D. Reidel, Dordrecht (1975)
Dal Bello, B.R.: Managing risk in space. Federation of American Scientists, Public Interest Report, Winter (2011)
Delmas, R., Polacsek, T.: Formal methods for exchange policy specification. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 288–303. Springer, Heidelberg (2013)
Delmas, R., Polacsek, T.: Need-to-share & non-diffusion requirements verification in exchange policies. In: Zdravkovic, J., Kirikova, M., Johannesson, P. (eds.) CAiSE 2015. LNCS, vol. 9097, pp. 151–165. Springer, Heidelberg (2015)
Dyer, J.H., Singh, H.: The Relational View: Cooperative Strategy and Sources of Interorganizational Competitive Advantage. The Academy of Management Review 23(4), 660–679 (1998)
Edmonds, B.: How formal logic can fail to be useful for modelling or designing MAS. In: Lindemann, G., Moldt, D., Paolucci, M. (eds.) RASTA 2002. LNCS (LNAI), vol. 2934, pp. 1–15. Springer, Heidelberg (2004)
Gallier, J.H.: Logic for Computer Science: Foundations of Automatic Theorem Proving, chap. 10, pp. 448–476. Wiley (1987)
Heymann, D.L., Rodier, G.R.: Hot spots in a wired world: \(\{\)WHO\(\}\) surveillance of emerging and re-emerging infectious diseases. The Lancet Infectious Diseases 1(5), 345–353 (2001)
Kalam, A.A.E., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks Proceedings, POLICY 2003. IEEE (2003)
Mandl, K.D., Overhage, J., Wagner, M.M., Lober, W.B., Sebastiani, P., Mostashari, F., Pavlin, J.A., Gesteland, P.H., Treadwell, T., Koski, E., Hutwagner, L., Buckeridge, D.L., Aller, R.D., Grannis, S.: Implementing syndromic surveillance: a practical guide informed by the early experience. Journal of the American Medical Informatics Association 11, 141–150 (2004)
McCarthy, J.: Modality, si! modal logic, no!. Studia Logica 59(1), 29–32 (1997)
Meynard, J., Chaudet, H., Texier, G., Ardillon, V., Ravachol, F., Deparis, X., Jefferson, H., Dussart, P., Morvan, J., Boutin, J.: Value of syndromic surveillance within the armed forces for early warning during a dengue fever outbreak in french guiana in 2006. BMC Med. Inf. & Decision Making 8, 29 (2008)
Parwani, T., Kholoussi, R., Karras, P.: How to hack into facebook without being a hacker. In: Carr, L., Laender, A.H.F., Lóscio, B.F., King, I., Fontoura, M., Vrandecic, D., Aroyo, L., de Oliveira, J.P.M., Lima, F., Wilde, E. (eds.) WWW (Companion Volume), pp. 751–754. International World Wide Web Conferences Steering Committee / ACM (2013)
Sebastiani, R., Vescovi, M.: Automated reasoning in modal and description logics via sat encoding: the case study of k(m)/alc-satisfiability. J. Artif. Intell. Res. (JAIR) 35, 343–389 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Delmas, R., Polacsek, T. (2015). Critical Information Diffusion Systems. In: Morzy, T., Valduriez, P., Bellatreche, L. (eds) New Trends in Databases and Information Systems. ADBIS 2015. Communications in Computer and Information Science, vol 539. Springer, Cham. https://doi.org/10.1007/978-3-319-23201-0_56
Download citation
DOI: https://doi.org/10.1007/978-3-319-23201-0_56
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23200-3
Online ISBN: 978-3-319-23201-0
eBook Packages: Computer ScienceComputer Science (R0)