4,513 research outputs found

    Obligations of trust for privacy and confidentiality in distributed transactions

    Get PDF
    Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the concept of the obligation of trust (OoT) protocol as a privacy assurance and authorization mechanism that is built upon the XACML standard. The OoT allows two communicating parties to dynamically exchange their privacy and authorization requirements and capabilities, which the authors term a notification of obligation (NoB), as well as their commitments to fulfilling each other's requirements, which the authors term signed acceptance of obligations (SAO). The authors seek to describe some applicability of these concepts and to show how they can be integrated into distributed authorization systems for stricter privacy and confidentiality control. Design/methodology/approach – Existing access control and privacy protection systems are typically unilateral and provider-centric, in that the enterprise service provider assigns the access rights, makes the access control decisions, and determines the privacy policy. There is no negotiation between the client and the service provider about which access control or privacy policy to use. The authors adopt a symmetric, more user-centric approach to privacy protection and authorization, which treats the client and service provider as peers, in which both can stipulate their requirements and capabilities, and hence negotiate terms which are equally acceptable to both parties. Findings – The authors demonstrate how the obligation of trust protocol can be used in a number of different scenarios to improve upon the mechanisms that are currently available today. Practical implications – This approach will serve to increase trust in distributed transactions since each communicating party receives a difficult to repudiate digitally signed acceptance of obligations, in a standard language (XACML), which can be automatically enforced by their respective computing machinery. Originality/value – The paper adds to current research in trust negotiation, privacy protection and authorization by combining all three together into one set of standardized protocols. Furthermore, by providing hard to repudiate signed acceptance of obligations messages, this strengthens the legal case of the injured party should a dispute arise

    Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements

    Get PDF
    Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)

    Review of the environmental and organisational implications of cloud computing: final report.

    Get PDF
    Cloud computing – where elastic computing resources are delivered over the Internet by external service providers – is generating significant interest within HE and FE. In the cloud computing business model, organisations or individuals contract with a cloud computing service provider on a pay-per-use basis to access data centres, application software or web services from any location. This provides an elasticity of provision which the customer can scale up or down to meet demand. This form of utility computing potentially opens up a new paradigm in the provision of IT to support administrative and educational functions within HE and FE. Further, the economies of scale and increasingly energy efficient data centre technologies which underpin cloud services means that cloud solutions may also have a positive impact on carbon footprints. In response to the growing interest in cloud computing within UK HE and FE, JISC commissioned the University of Strathclyde to undertake a Review of the Environmental and Organisational Implications of Cloud Computing in Higher and Further Education [19]

    Personalised privacy in pervasive and ubiquitous systems

    Get PDF
    Our world is edging closer to the realisation of pervasive systems and their integration in our everyday life. While pervasive systems are capable of offering many benefits for everyone, the amount and quality of personal information that becomes available raise concerns about maintaining user privacy and create a real need to reform existing privacy practices and provide appropriate safeguards for the user of pervasive environments. This thesis presents the PERSOnalised Negotiation, Identity Selection and Management (PersoNISM) system; a comprehensive approach to privacy protection in pervasive environments using context aware dynamic personalisation and behaviour learning. The aim of the PersoNISM system is twofold: to provide the user with a comprehensive set of privacy protecting tools and to help them make the best use of these tools according to their privacy needs. The PersoNISM system allows users to: a) configure the terms and conditions of data disclosure through the process of privacy policy negotiation, which addresses the current “take it or leave it” approach; b) use multiple identities to interact with pervasive services to avoid the accumulation of vast amounts of personal information in a single user profile; and c) selectively disclose information based on the type of information, who requests it, under what context, for what purpose and how the information will be treated. The PersoNISM system learns user privacy preferences by monitoring the behaviour of the user and uses them to personalise and/or automate the decision making processes in order to unburden the user from manually controlling these complex mechanisms. The PersoNISM system has been designed, implemented, demonstrated and evaluated during three EU funded projects

    Advances in Negotiation Theory: Bargaining, Coalitions and Fairness

    Get PDF
    Bargaining is ubiquitous in real-life. It is a major dimension of political and business activities. It appears at the international level, when governments negotiate on matters ranging from economic issues (such as the removal of trade barriers), to global security (such as fighting against terrorism) to environmental and related issues (e.g. climate change control). What factors determine the outcome of negotiations such as those mentioned above? What strategies can help reach an agreement? How should the parties involved divide the gains from cooperation? With whom will one make alliances? This paper addresses these questions by focusing on a non-cooperative approach to negotiations, which is particularly relevant for the study of international negotiations. By reviewing non-cooperative bargaining theory, non-cooperative coalition theory, and the theory of fair division, this paper will try to identify the connection among these different facets of the same problem in an attempt to facilitate the progress towards a unified framework.Negotiation theory, Bargaining, Coalitions, Fairness, Agreements

    Security for Grid Services

    Full text link
    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations." The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches. In particular, one must deal with diverse local mechanisms, support dynamic creation of services, and enable dynamic creation of trust domains. We describe how these issues are addressed in two generations of the Globus Toolkit. First, we review the Globus Toolkit version 2 (GT2) approach; then, we describe new approaches developed to support the Globus Toolkit version 3 (GT3) implementation of the Open Grid Services Architecture, an initiative that is recasting Grid concepts within a service oriented framework based on Web services. GT3's security implementation uses Web services security mechanisms for credential exchange and other purposes, and introduces a tight least-privilege model that avoids the need for any privileged network service.Comment: 10 pages; 4 figure

    Theoretical and Computational Basis for CATNETS - Annual Report Year 2

    Get PDF
    In this work the self-organising potential of the CATNETS allocation mechanism is described to provide a more comprehensive view on the research done in this project. The formal description of either the centralised and decentralised approach is presented. Furthermore the agents' bidding model is described and a comprehensive overview on how the catallactic mechanism is incorporated into the middleware and simulator environments is given. --Decentralized Market Mechanisms,Centralized Market Mechanisms,Catallaxy,Market Engineering,Simulator Integration,Prototype Integration

    A MAS-based infrastructure for negotiation and its application to a water-right market

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/s10796-013-9443-8This paper presents a MAS-based infrastructure for the specification of a negotiation framework that handles multiple negotiation protocols in a coherent and flexible way. Although it may be used to implement one single type of agreement mechanism, it has been designed in such a way that multiple mechanisms may be available at any given time, to be activated and tailored on demand (on-line) by participating agents. The framework is also generic enough so that new protocols may be easily added. This infrastructure has been successfully used in a case study to implement a simulation tool as a component of a larger framework based on an electronic market of water rights.This paper was partially funded by the Consolider AT project CSD2007-0022 INGENIO 2010 of the Spanish Ministry of Science and Innovation; the MICINN projects TIN2011-27652-C03-01 and TIN2009-13839-C03-01; and the Valencian Prometeo project 2008/051.Alfonso Espinosa, B.; Botti Navarro, VJ.; Garrido Tejero, A.; Giret Boggino, AS. (2014). A MAS-based infrastructure for negotiation and its application to a water-right market. Information Systems Frontiers. 16(2):183-199. https://doi.org/10.1007/s10796-013-9443-8S183199162Alberola, J.M., Such, J.M., Espinosa, A., Botti, V., García-Fornes, A. (2008). Magentix: a multiagent platform integrated in linux. In EUMAS (pp. 1–10).Alfonso, B., Vivancos, E., Botti, V., García-Fornes, A. (2011). Integrating jason in a multi-agent platform with support for interaction protocols. In Proceedings of the compilation of the co-located workshops on AGERE!’11, SPLASH ’11 workshop (pp. 221–226). New York: ACM.Andreu, J., Capilla, J., Sanchis, E. (1996). AQUATOOL, a generalized decision-support system for water-resources planning and operational management. Journal of Hydrology, 177(3–4), 269–291.Bellifemine, F., Caire, G., Greenwood, D. (2007). Developing multi-agent systems with JADE. Wiley.Bordini, R.H., Hübner, J.F., Wooldridge, M. (2007). Programming multi-agent systems in agent speak usign Jason. Wiley.Botti, V., Garrido, A., Gimeno, J.A., Giret, A., Noriega, P. (2011). The role of MAS as a decision support tool in a water-rights market. In AAMAS 2011 workshops, LNAI 7068 (pp. 35–49). Springer.Braubach, L., Pokahr, A., Lamersdorf, W. (2005). Software agent-based applications, platforms and development kits In C.M.K.R. Unland (Ed.), Jadex: a BDI agent system combining middleware and reasoning (Vol. 9, pp. 143–168): Birkhäuser-Verlag.DeSanctis, G.B., & Gallupe, B. (1987). A foundation for the study of group decision support systems. Knowledge based systems, 33(5), 589–609.Eckersley, P. (2003). Virtual markets for virtual goods. Available at http://www.ipria.com/publications/wp/2003/IPRIAWP02.2003.pdf (Accessed April 2012).Fjermestad, J., & Hiltz, S. (2001). Group support systems: a descriptive evaluation of case and field studies. Journal of Management Information Systems, 17(3), 115–161.Fogués, R.L., Alberola, J.M., Such, J.M., Espinosa, A., García-Fornes, A. (2010). Towards dynamic agent interaction support in open multiagent systems. In Proceedings of the 13th international conference of the catalan association for artificial intelligence (Vol. 220, pp. 89–98). IOS Press.Foundation for Intelligent Physical Agents. (2001). FIPA interaction protocol library specification XC00025E. FIPA Consortium.Garrido, A., Arangu, M., Onaindia, E. (2009). A constraint programming formulation for planning: from plan scheduling to plan generatio. Journal of Scheduling, 12(3), 227–256.Giret, A., Garrido, A., Gimeno, J.A., Botti, V., Noriega, P. (2011). A MAS decision support tool for water-right markets. In Proceedings of the tenth international conference on autonomous agents and multiagent systems (Demonstrations@AAMAS) (pp. 1305–1306).Gomez-Limon, J., & Martinez, Y. (2006). Multi-criteria modelling of irrigation water market at basin level: a Spanish case study. European Journal of Operational Research, 173, 313–336.Janjua, N.K., Hussain, F.K., Hussain, O.K. (2013). Semantic information and knowledge integration through argumentative reasoning to support intelligent decision making. Information Systems Frontiers, 15(2), 167–192.jen Hsu, J.Y., Lin, K.-J., Chang, T.-H., ju Ho, C., Huang, H.-S., rong Jih, W. (2006). Parameter learning of personalized trust models in broker-based distributed trust management. Information Systems Frontiers, 8(4), 321–333.Kersten, G., & Lai, H. (2007). European Journal of Operational Research, 180(2), 922–937.Lee, N., Bae, J.K., Koo, C. (2012). A case-based reasoning based multi-agent cognitive map inference mechanism: an application to sales opportunity assessment. Information Systems Frontiers, 14(3), 653–668.Luck, M., & AgentLink. (2005). Agent technology: computing as interaction: a roadmap for agent-based computing. Compiled, written and edited by Michael Luck et al. AgentLink, Southampton.Ma, J., & Orgun, M.A. (2008). Formalizing theories of trust for authentication protocols. Information Systems Frontiers, 10(1), 19–32.Pokahr, A., Braubach, L., Walczak, A., Lamersdorf, W. (2007). Developing multi-agent systems with JADE. Jadex-Engineering Goal-Oriented Agents (pp. 254258). Wiley.Ramos, C., Cordeiro, M., Praça, I., Vale, Z. (2005). Intelligent agents for negotiation and game-based decision support in electricity market. Engineering Intelligent Systems for Electrical Engineering and Communications, 13(2), 147–154.Sierra, C., Botti, V., Ossowski, S. (2011). Agreement computing. KI - Künstliche Intelligenz, 25(1), 57–61.Thobani, M. (1997). Formal water markets: why, when and how to introduce tradable water rights. The World Bank Research Observer, 12(2), 161–179
    • …
    corecore