Abstract
The traditional approaches to building survivable systems assume a framework of absolute trust requiring a provably impenetrable and incorruptible Trusted Computing Base (TCB). Unfortunately, we don’t have TCB’s, and experience suggests that we never will. We must instead concentrate on software systems that can provide useful services even when computational resource are compromised. Such a system will 1) Estimate the degree to which a computational resources may be trusted using models of possible compromises. 2) Recognize that a resource is compromised by relying on a system for long term monitoring and analysis of the computational infrastructure. 3) Engage in self-monitoring, diagnosis and adaptation to best achieve its purposes within the available infrastructure. All this, in turn, depends on the ability of the application, monitoring, and control systems to engage in rational decision making about what resources they should use in order to achieve the best ratio of expected benefit to risk.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
C. Cao, J. Doyle, I. Kohane, W. Long, and P. Szolovits. The MAITA monitoring library and language. In preparation, 1998.
C. Cao, J. Doyle, I. Kohane, W. Long, and P. Szolovits. The MAITA monitoring network architecture. In preparation, 1998.
C. Cao, J. Doyle, I. Kohane, W. Long, and P. Szolovits. The MAITA system: an overview. In preparation, 1998.
R. Davis, H. Shrobe, W. Hamscher, K. Wieckert, M Shirley, S. Polit Diagnosis Based on Descriptions of Structure and Function AAAI, National Conference on Artificial Intelligence Pittsburgh, PA., 1992 pp 137–142.
J. deKleer and B. Williams Reasoning About Multiple Faults AAAI, National Conference on Artificial Intelligence, Philadelphia, Pa., 1986, pp 132–139.
J. Fackler, I. J. Haimowitz, and I. S. Kohane. Knowledge-based data display using trendx. In AAAI Spring Symposium: Interpreting Clinical Data, Palo Alto, 1994. AAAI Press.
I. J. Haimowitz and I. S. Kohane. Automated trend detection with alternate temporal hypotheses. In Proceedings of the Thirteenth International Joint Conference on Artificial Intelligence, pages 146–151, Chambery, France, 1993.
I. J. Haimowitz and I. S. Kohane. An epistemology for clinically significant trends. In Proceedings of the Eleventh National Conference on Artificial Intelligence, pages 176–181, Washington, DC, 1993.
W. Hamscher. Modeling digital circuits for troubleshooting. Artificial Intelligence, 51:223–227, 1991.
I. Kohane and I. Haimowitz. Hypothesis-driven data abstraction. In Symposium on Computer Applications in Medical Care, Washington, DC, 1993.
I. S. Kohane. Temporal reasoning in medical expert systems. In R. Salamon, B. Blum, and M. Jørgensen, editors, MEDINFO 86: Proceedings of the Fifth Conference on Medical Informatics, pages 170–174, Washington, Oct. 1986. North-Hol
I. S. Kohane. Temporal reasoning in medical expert systems. TR 389, Massachusetts Institute of Technology, Laboratory for Computer Science, 545 Technology Square, Cambridge, MA, 02139, Apr. 1987.
I. S. Kohane and I. J. Haimowitz. Encoding patterns of growth to automate detection and diagnosis of abnormal growth patterns. Pediatric Research, 33:119A, 1993.
B. Williams and J. deKleer. Diagnosis with Behavior Modes. In Proceedings of the 11th Joint Conference on Artificial Intelligence, IJCAI-89, pages 1324–1330, Detroit MI, 1989.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shrobe, H., Doyle, J. (2000). Active Trust Management for Autonomous Adaptive Survivable Systems (ATM’s for AAss’s). In: Robertson, P., Shrobe, H., Laddaga, R. (eds) Self-Adaptive Software. IWSAS 2000. Lecture Notes in Computer Science, vol 1936. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44584-6_4
Download citation
DOI: https://doi.org/10.1007/3-540-44584-6_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41655-5
Online ISBN: 978-3-540-44584-5
eBook Packages: Springer Book Archive