Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 1435))

Included in the following conference series:

Abstract

In this paper, we describe: (i) how agents can protect information from other agents and (ii) how servers that support agent cooperation can help in this process. We show that agents' data security policies can be encoded through three structures called metaknowledge, history and agent security tables. We develop a framework that allows arbitrary metalanguages and history maintenance policies to be “plugged in”, and develop complexity results, including polynomial (efficiently computable) approximations.

Partially supported by the Army Research Office under grant DAAH-04-95-10174, by the Air Force Office of Scientific Research under grant F49620-93-1-0065, by ARPA/Rome Labs contract Nr. F30602-93-C-0241 (Order Nr. A716), and by an NSF Young Investigator award IRI-93-57756.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Adali, K.S. Candan, Y. Papakonstantinou and V.S. Subrahmanian. (1996) Query Processing in Distributed Mediated Systems, in: Proc. 1996 ACM SIGMOD Conf. on Management of Data, Montreal, Canada, June 1996.

    Google Scholar 

  2. K.Apt, H. Blair and9 A. Walker. (1988) Towards a theory of declarative knowledge, in J. Minker (ed.) “Foundations of Deductive Databases and Logic Programming”, pps 89–148, Morgan Kaufman.

    Google Scholar 

  3. K. Arisha, S. Kraus, F. Ozcan, R. Ross and V.S. Subrahmanian (1998). IMPACT: The Interactive Maryland Platform for Agents Collaborating Together (submitted).

    Google Scholar 

  4. E. Bertino, C. Bettini, E. Ferrari and P. Samarati. (1996) A Temporal Access Control Mechanism for Database Systems, IEEE Trans. on Knowledge and Data Engineering, Vol. 8, Nr. 1, pps 67–80

    Article  Google Scholar 

  5. E. Bertino, P. Samarati and S. Jajodia. Authorizations in relational database management systems, Proc. 1st ACM Conf. on Computer and Comm. Security, Fairfax, VA, Nov. 1993.

    Google Scholar 

  6. P. Bonatti, S. Kraus and V.S. Subrahmanian. Foundations of Secure Deductive Databases, IEEE Transactions on Knowledge and Data Engineering, 7,3, June 1995.

    Article  Google Scholar 

  7. A. Brink, S. Marcus and V.S. Subrahmanian. Heterogeneous Multimedia Reasoning. IEEE Computer, 28(9):33–39, Sep. 1995.

    Google Scholar 

  8. K.S. Candan, S. Jajodia and V.S. Subrahmanian. (1996) Secure Mediated Databases, in: Proc. 1996 Intl. Conf. on Data Engineering, Feb. 1996, New Orleans, LA.

    Google Scholar 

  9. S. Castano, M.G. Fugini, G. Martella, and P. Samarati, Database Security, Addison-Wesley, 1995.

    Google Scholar 

  10. R.G.G. Cattell. (ed.) (1993) The Object Database Standard: ODMG-93, Morgan Kaufmann.

    Google Scholar 

  11. D. M. Chess (1996). Security in Agents Systems,http://www.av.ibm.com/InsideTheLab/Bookshelf/ScientificPapers/.

    Google Scholar 

  12. The CORBAservices Specifications, 1997. http://www.omg.org/library/corbserv.htm

    Google Scholar 

  13. M. Crosbie and E. Spafford (1995). Applying genetic programming to intrusion detection. In Proceedings of the AAAI 1995 Fall Symposium series, November 1995.

    Google Scholar 

  14. T. Eiter, V.S.Subrahmanian and G. Pick. (1998) Heterogeneous Active Agents, draft manuscript, 115 pages.

    Google Scholar 

  15. L. N. Foner (1996). A Security Architecture for Multi-Agent Matchmaking, Second International Conference on Multi-Agent Systems (ICMAS96), Japan.

    Google Scholar 

  16. M. Gelfond and V. Lifschitz. (1988) The Stable Model Semantics for Logic Programming, in: Proc. 5th International Conference and Symposium on Logic Programming, ed R. A. Kowalski and K. A. Bowen, pp 1070–1080.

    Google Scholar 

  17. G. Gottlob (1992). Complexity results for nonmonotonic logics, Journal of Logic and Computation, 2(3):397–425, June 1992.

    MATH  MathSciNet  Google Scholar 

  18. G. Gottlob. (1995) The complexity of default reasoning under the stationary fixed point semantics, Information and Computation, 121(1):81–92, 15 August 1995.

    Article  MATH  MathSciNet  Google Scholar 

  19. S. Jajodia and R. Sandhu, Toward a Multilevel Relational Data Model, in Proc. ACM-SIGMOD Conf., Denver, May 1991.

    Google Scholar 

  20. J.W. Lloyd. (1987) Foundations of Logic Programming, Springer.

    Google Scholar 

  21. J. Lu, G. Moerkotte, J. Schue, and V.S. Subrahmanian. Efficient Maintenance of Materialized Mediated Views, in: Proc. 1995 ACM SIGMOD Conf. on Management of Data, San Jose, CA, May 1995.

    Google Scholar 

  22. J. Lu, A. Nerode and V.S. Subrahmanian. Hybrid Knowledge Bases, IEEE Transactions on Knowledge and Data Engineering, 8, 5, pp 773–785, Oct. 1996. Released as a University of Maryland Technical Report, Summer 1993.

    Article  Google Scholar 

  23. T. F. Lunt. Access control policies for database systems. In C. E. Landwehr,editor, Database Security II: Status and Prospects, pages 41–52. North-Holland,Amsterdam, 1989.

    Google Scholar 

  24. S. Marcus and V.S. Subrahmanian. Foundations of Multimedia Database Systems, Journal of the ACM, Vol. 43, 3, pp 474–523, 1996.

    Article  MATH  MathSciNet  Google Scholar 

  25. W. Marek, A. Nerode and J.B. Remmel. (1990) Non-Monotonic Rule Systems 1, 2, Annals of Mathematics and Artificial Intelligence, pps 241–273.

    Google Scholar 

  26. A. Martelli and U. Montanari. (1982) An Efficient Unification Algorithm, ACM Trans. on Prog. Lang. and Systems, 4, 2, pps 258–282.

    Article  MATH  Google Scholar 

  27. J. Millen and T. Lunt, Security for Object-Oriented Database Systems, in Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland, California, May 1992.

    Google Scholar 

  28. R. Moore. Semantical Considerations on Nonmonotonic Logics. Artificial Intelligence, 25:75–94, 1985.

    Article  MATH  MathSciNet  Google Scholar 

  29. T. Przymusinski. (1988) On the declarative semantics of deductive databases and logic programs, in J. Minker (ed.) “Foundations of Deductive Databases and Logic Programming”, pps 193–216, Morgan Kaufman.

    Google Scholar 

  30. C. Thirunavukkarasu, T. Finin and J. Mayfield (1995). Secret Agents — A Security Architecture for the KQML Agent Communication Language, Intelligent Information Agents Workshop held in conjunction with Fourth International Conference on Information and Knowledge Management CIKM'95.

    Google Scholar 

  31. T. Sander, C. Tschudin. Protecting mobile agents against malicious hosts. In G. Vigna (ed.) Mobile Agents and Security, LNCS, to appear.

    Google Scholar 

  32. M. Winslett, K. Smith, and X. Qian, Formal Query Languages for Secure Relational Databases, ACM-TODS, 19, 4, pp. 626–662, December 1994.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Matthias Klusch Gerhard Weiß

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bonatti, P.A., Kraus, S., Salinas, J., Subrahmanian, V.S. (1998). Data-security in heterogeneous agent systems. In: Klusch, M., Weiß, G. (eds) Cooperative Information Agents II Learning, Mobility and Electronic Commerce for Information Discovery on the Internet. CIA 1998. Lecture Notes in Computer Science, vol 1435. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053692

Download citation

  • DOI: https://doi.org/10.1007/BFb0053692

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64676-1

  • Online ISBN: 978-3-540-69109-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics