13,353 research outputs found

    Nonmonotonic Trust Management for P2P Applications

    Get PDF
    Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT). To solve this problem we propose RT-, which adds a restricted form of negation to the standard RT language, thus admitting a controlled form of non-monotonicity. The semantics of RT- is discussed and presented in terms of the well-founded semantics for Logic Programs. Finally we discuss how chain discovery can be accomplished for RT-.Comment: This paper appears in the proceedings of the 1st International Workshop on Security and Trust Management (STM 2005). To appear in ENTC

    Aligning Models of Normative Systems and Artificial Societies: Towards norm-governed behavior in virtual enterprises

    Get PDF
    The purpose is to explore how norm-governed behavior within agent societies can be achieved in the context of Virtual Enterprises. We analyze a number of formal models from the agent research field, of which three models focus on the society aspects and three models focus on norms. A general observation is that the models reviewed are not concordant with each other and therefore require further alignment. A number of additions that may enrich the norm-focused models are suggested. It is also concluded that the introduction of different types of norms on different levels can be applied to ensure sound collaboration in agent-supported virtual enterprises. Moreover, the deployment of norm defender and promoter functionality is suggested to ensure norm compliance and punishments of norm violations

    A survey of security issue in multi-agent systems

    Get PDF
    Multi-agent systems have attracted the attention of researchers because of agents' automatic, pro-active, and dynamic problem solving behaviors. Consequently, there has been a rapid development in agent technology which has enabled us to provide or receive useful and convenient services in a variety of areas such as banking, transportation, e-business, and healthcare. In many of these services, it is, however, necessary that security is guaranteed. Unless we guarantee the security services based on agent-based systems, these services will face significant deployment problems. In this paper, we survey existing work related to security in multi-agent systems, especially focused on access control and trust/reputation, and then present our analyses. We also present existing problems and discuss future research challenges. © Springer Science+Business Media B.V 2011

    A Middleware for the Internet of Things

    Full text link
    The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as things to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things, or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.Comment: 20 pages, International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 201

    Security in Pervasive Computing: Current Status and Open Issues

    Get PDF
    Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few. Security for mobile devices, though still in its infancy, has drawn the attention of various researchers. As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users - - though for most it will be an afterthought, like many other computing functions. The usability and expansion of pervasive computing applications depends greatly on the security and reliability provided by the applications. At this critical juncture, security research is growing. This paper examines the recent trends and forward thinking investigation in several fields of security, along with a brief history of previous accomplishments in the corresponding areas. Some open issues have been discussed for further investigation

    Trust Management within Virtual Communities: Adaptive and Socially-Compliant Trust Model

    Get PDF
    21 pagesRecent years have witnessed increasing interest of people in sharing, collaborating and interacting in many different ways among new social structures called Virtual Communities (VC). They represent aggrega- tions of entities with common interests, goals, practices or values. VCs are particularly complex environments wherein trust became, rapidly, a prerequisite for the decision-making process, and where traditional trust establishment techniques are regularly challenged. In our work we are considering how individual and collective trust policies can be managed, adapted and combined. To this aim, we propose an Adaptive and Socially-Compliant Trust Management System (ASC-TMS) based on multi-agent technologies. In this framework, policies are used as concrete implementations of trust models in order to specify both (i) user-centred (i.e. personal) and community-centred (i.e. collective) trust requirements. Agents are used to manage and combine these different policies in a decentralized and flexible way. We describe the functionalities and the architecture that supports them and discuss also a prototype implementation
    • …
    corecore