28 research outputs found
Proceedings of the 11th Workshop on Nonmonotonic Reasoning
These are the proceedings of the 11th Nonmonotonic Reasoning Workshop. The aim of this series is to bring together active researchers in the broad area of nonmonotonic reasoning, including belief revision, reasoning about actions, planning, logic programming, argumentation, causality, probabilistic and possibilistic approaches to KR, and other related topics. As part of the program of the 11th workshop, we have assessed the status of the field and discussed issues such as: Significant recent achievements in the theory and automation of NMR; Critical short and long term goals for NMR; Emerging new research directions in NMR; Practical applications of NMR; Significance of NMR to knowledge representation and AI in general
A Taxonomy for and Analysis of Anonymous Communications Networks
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama’s Cybersecurity Chief-elect recognizes the challenge of increasingly sophisticated cyber attacks. Now through April 2009, the White House is reviewing federal cyber initiatives to protect US citizen privacy rights. Indeed, the rising quantity and ubiquity of new surveillance technologies in cyberspace enables instant, undetectable, and unsolicited information collection about entities. Hence, anonymity and privacy are becoming increasingly important issues. Anonymization enables entities to protect their data and systems from a diverse set of cyber attacks and preserves privacy. This research provides a systematic analysis of anonymity degradation, preservation and elimination in cyberspace to enhance the security of information assets. This includes discovery/obfuscation of identities and actions of/from potential adversaries. First, novel taxonomies are developed for classifying and comparing well-established anonymous networking protocols. These expand the classical definition of anonymity and capture the peer-to-peer and mobile ad hoc anonymous protocol family relationships. Second, a unique synthesis of state-of-the-art anonymity metrics is provided. This significantly aids an entity’s ability to reliably measure changing anonymity levels; thereby, increasing their ability to defend against cyber attacks. Finally, a novel epistemic-based mathematical model is created to characterize how an adversary reasons with knowledge to degrade anonymity. This offers multiple anonymity property representations and well-defined logical proofs to ensure the accuracy and correctness of current and future anonymous network protocol design
An Effective and Efficient Inference Control System for Relational Database Queries
Protecting confidential information in relational databases while ensuring availability of
public information at the same time is a demanding task. Unwanted information flows
due to the reasoning capabilities of database users require sophisticated inference control
mechanisms, since access control is in general not sufficient to guarantee the preservation
of confidentiality. The policy-driven approach of Controlled Query Evaluation (CQE)
turned out to be an effective means for controlling inferences in databases that can be
modeled in a logical framework. It uses a censor function to determine whether or not
the honest answer to a user query enables the user to disclose confidential information
which is declared in form of a confidentiality policy. In doing so, CQE also takes answers
to previous queries and the user’s background knowledge about the inner workings of the
mechanism into account.
Relational databases are usually modeled using first-order logic. In this context, the
decision problem to be solved by the CQE censor becomes undecidable in general because
the censor basically performs theorem proving over an ever growing user log. In this
thesis, we develop a stateless CQE mechanism that does not need to maintain such a user
log but still reaches the declarative goals of inference control. This feature comes at the
price of several restrictions for the database administrator who declares the schema of the
database, the security administrator who declares the information to be kept confidential,
and the database user who sends queries to the database.
We first investigate a scenario with quite restricted possibilities for expressing queries
and confidentiality policies and propose an efficient stateless CQE mechanism. Due to the
assumed restrictions, the censor function of this mechanism reduces to a simple pattern
matching. Based on this case, we systematically enhance the proposed query and policy
languages and investigate the respective effects on confidentiality. We suitably adapt the
stateless CQE mechanism to these enhancements and formally prove the preservation
of confidentiality. Finally, we develop efficient algorithmic implementations of stateless
CQE, thereby showing that inference control in relational databases is feasible for actual
relational database management systems under suitable restrictions
Recommended from our members
A Rational Scheme for Conflict Detection and Resolution in Distributed Collaborative Environments for Enterprise Integration
A typical enterprise may have large numbers of information sources such as data stores, expert systems, knowledge-based systems, or standard software systems. These may need to be integrated so that, for example, an application program or a decision maker can access information from all these sources. Such architectures are generally called 'Distributed Collaborative Environments for Enterprise Integration'.
A general problem in these enterprise integration architectures is that information from heterogeneous, pre-existing sources may be obsolete, incomplete, incorrect or, for many other reasons, contradictory. Thus, conflicting results may occur when the same information is requested from semantically related sources. A mechanism is required to detect and resolve these conflicts in a way that is rational to any potential client of the integration environment.
This thesis lays open the design of a general mechanism for conflict detection and resolution that enables intelligent information agents to reason about contradictory information from pre-existing, heterogeneous and autonomous sources. The mechanism's theoretical basis is a framework that is drawn from evidence law, which shares some fundamental commonalities with conflict detection and resolution in enterprise integration environments.
Conflict detection opens with gathering the results collected by the information retrieval process. These results may have justifications or certainty assessments attached to them. Furthermore, it identifies whether and how these results are conflicting.
The design of a conflict resolution mechanism is based on a rational scheme for judging the weight of conflicting results. First, the agents assess the reliability or credibility of an information source. Judgement based on the weight of conflicting results is first applied to any available, domain-specific, resolution strategies. Second, the agent applies any 'general scientific' resolution strategies that are not specific to one domain. When no domain-related expertise can solve the conflict then the agent can only judge on domain independent evaluation criteria such as the results' reliability. A scheme is sketched out for judgement based on the reliability of conflicting results, involving three steps: Ranking the conflicting results according to their reliability; Ways to redefine conflicting results; and Heuristic decision-making.
The evaluation includes a computational implementation of an enterprise integration environment incorporating a model of an information agent. An example is realised in this environment. The conflict detection and resolution mechanism, and interfaces to each integrated source, are implemented in Visual C++. A case study is conducted on this scenario to evaluate each conflict detection and resolution step. Furthermore, this illustrates both the advantages over existing approaches and the limitations