Skip to main content

Cyber-Physical System Architectures for Dynamic, Real-Time “Need-to-Know” Authorization

  • Conference paper
  • First Online:
Applied Cyber-Physical Systems

Abstract

Discussed is an Intelligent Information Agent (I 2 A) architecture for real-time, adaptive, need-to-know, authorization of access to confidential/classified information. The “Need-to-know” paradigm for information content access and access to application and service execution is desperately needed for the ubiquitous non-traditional physical computing systems (e.g. refrigerators, wearable computers, engine sub-systems etc.), beginning to connect into the cyber mesh. The multi-agent system is based on the ELYSE cognitive neural, intelligent agent framework and provides “need-to-know” context-based authorization of requests for access to confidential/classified information. “Need-to-know” authorization is that which grants access to confidential/classified information only if that information is necessary for the requestor’s task, based on their roles and credentials. In this system, authorization is treated as a text classification problem utilizing fuzzy-neural, self-organizing semantic maps which learn a learn decision criteria based on label information and are capable of generalizing this learned behavior to other information with a zero, or near-zero, false alarm rate. Since “need-to-know” authorizations must be determined for multiple tasks, multiple users, and multiple collections of information, with quick turn-around from request to delivery, the authorization agents must be adaptive and capable of learning new profiles rapidly and with little impact on the overall system performance. We define five different classification methods and provide an architectural framework for the agent system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Crowder, J. A. “Adaptive Learning Algorithms for Functional Constraints on an Evolving Neural Network System.” NSA Technical Paper CON_0013_2002_003 (2002).

    Google Scholar 

  2. Crowder, J. A., “Integrating an Expert System into a Neural Network with Genetic Programming for Process Planning.” NSA Technical Paper TIT_01_01_013_2001_001 (2001).

    Google Scholar 

  3. Crowder, J. A., “Machine Learning: Intuition (Concept) Learning in Hybrid Genetic/Fuzzy/Neural Systems.” NSA Technical Paper CON_0013_2003_009 (2003).

    Google Scholar 

  4. Crowder, J., Barth, T., and Rouch, R., “Evolutionary Neural Infrastructure with Genetic Memory Algorithms: ENIGMA Theory Development.” NSA Technical Paper, Denver (1999) ENIGMA_1999_004.

    Google Scholar 

  5. Crowder, J., Barth, T., and Rouch, R., “Learning Algorithms for Stochastically Driven Fuzzy, Genetic Neural Networks.” NSA Technical Paper, Denver (1999) ENIGMA_1999_002.

    Google Scholar 

  6. Crowder, J., Barth, T., and Rouch, R., “Neural Associative Memory for Storing Complex Memory Patterns.” NSA Technical Paper, Denver (1999) ENIGMA_1999_003.

    Google Scholar 

  7. Jacobs, R., Jordan, M., Nowlan, S, and Hinton, G., “Adaptive Mixtures of Local Experts.” Neural Computation, Vol. 3 (1991).

    Google Scholar 

  8. Young-Woo, S., Giampapa, J., and Sycara, K., “A Multi-Agent System for Enforcing “Need-to-Know” Security Policies.” International Journal of Cooperative Information Systems (2004).

    Google Scholar 

  9. K. Sycara. Negotiation planning: An AI approach. European Journal of Operational Research, 46:216–234, 1990.

    Google Scholar 

  10. Y. Arens, C. Y. Chee, C.-N. Hsu, and C. A. Knoblock. Retrieving and integrating data from multiple information sources. International Journal of Intelligent and Cooperative Information Systems, 2(2):127–158, June 1993.

    Google Scholar 

  11. F. Brazier, B. D. Keplicz, N. R. Jennings, and J. Treur. Formal specification of multi-agent systems: a real-world case. In First International Conference on Multi-Agent Systems (ICMAS’95), pages 25–32, San Francisco, CA., June 12–14 1995.

    Google Scholar 

  12. Chandramouli, R. and Sandhu, R., “Role based access control features in commercial database management systems.” Proceedings of 21st National Information Systems Security (1998).

    Google Scholar 

  13. Giuri, L. and Iglio, P., “Role Templates for Content-Based Access Control.” Proceedings of ACM Workship on Role Based Access Control, pp. 153–159 (1997).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James A. Crowder .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this paper

Cite this paper

Crowder, J.A., Carbone, J.N. (2014). Cyber-Physical System Architectures for Dynamic, Real-Time “Need-to-Know” Authorization. In: Suh, S., Tanik, U., Carbone, J., Eroglu, A. (eds) Applied Cyber-Physical Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7336-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7336-7_6

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7335-0

  • Online ISBN: 978-1-4614-7336-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics