Abstract
Discussed is an Intelligent Information Agent (I 2 A) architecture for real-time, adaptive, need-to-know, authorization of access to confidential/classified information. The “Need-to-know” paradigm for information content access and access to application and service execution is desperately needed for the ubiquitous non-traditional physical computing systems (e.g. refrigerators, wearable computers, engine sub-systems etc.), beginning to connect into the cyber mesh. The multi-agent system is based on the ELYSE cognitive neural, intelligent agent framework and provides “need-to-know” context-based authorization of requests for access to confidential/classified information. “Need-to-know” authorization is that which grants access to confidential/classified information only if that information is necessary for the requestor’s task, based on their roles and credentials. In this system, authorization is treated as a text classification problem utilizing fuzzy-neural, self-organizing semantic maps which learn a learn decision criteria based on label information and are capable of generalizing this learned behavior to other information with a zero, or near-zero, false alarm rate. Since “need-to-know” authorizations must be determined for multiple tasks, multiple users, and multiple collections of information, with quick turn-around from request to delivery, the authorization agents must be adaptive and capable of learning new profiles rapidly and with little impact on the overall system performance. We define five different classification methods and provide an architectural framework for the agent system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Crowder, J. A. “Adaptive Learning Algorithms for Functional Constraints on an Evolving Neural Network System.” NSA Technical Paper CON_0013_2002_003 (2002).
Crowder, J. A., “Integrating an Expert System into a Neural Network with Genetic Programming for Process Planning.” NSA Technical Paper TIT_01_01_013_2001_001 (2001).
Crowder, J. A., “Machine Learning: Intuition (Concept) Learning in Hybrid Genetic/Fuzzy/Neural Systems.” NSA Technical Paper CON_0013_2003_009 (2003).
Crowder, J., Barth, T., and Rouch, R., “Evolutionary Neural Infrastructure with Genetic Memory Algorithms: ENIGMA Theory Development.” NSA Technical Paper, Denver (1999) ENIGMA_1999_004.
Crowder, J., Barth, T., and Rouch, R., “Learning Algorithms for Stochastically Driven Fuzzy, Genetic Neural Networks.” NSA Technical Paper, Denver (1999) ENIGMA_1999_002.
Crowder, J., Barth, T., and Rouch, R., “Neural Associative Memory for Storing Complex Memory Patterns.” NSA Technical Paper, Denver (1999) ENIGMA_1999_003.
Jacobs, R., Jordan, M., Nowlan, S, and Hinton, G., “Adaptive Mixtures of Local Experts.” Neural Computation, Vol. 3 (1991).
Young-Woo, S., Giampapa, J., and Sycara, K., “A Multi-Agent System for Enforcing “Need-to-Know” Security Policies.” International Journal of Cooperative Information Systems (2004).
K. Sycara. Negotiation planning: An AI approach. European Journal of Operational Research, 46:216–234, 1990.
Y. Arens, C. Y. Chee, C.-N. Hsu, and C. A. Knoblock. Retrieving and integrating data from multiple information sources. International Journal of Intelligent and Cooperative Information Systems, 2(2):127–158, June 1993.
F. Brazier, B. D. Keplicz, N. R. Jennings, and J. Treur. Formal specification of multi-agent systems: a real-world case. In First International Conference on Multi-Agent Systems (ICMAS’95), pages 25–32, San Francisco, CA., June 12–14 1995.
Chandramouli, R. and Sandhu, R., “Role based access control features in commercial database management systems.” Proceedings of 21st National Information Systems Security (1998).
Giuri, L. and Iglio, P., “Role Templates for Content-Based Access Control.” Proceedings of ACM Workship on Role Based Access Control, pp. 153–159 (1997).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this paper
Cite this paper
Crowder, J.A., Carbone, J.N. (2014). Cyber-Physical System Architectures for Dynamic, Real-Time “Need-to-Know” Authorization. In: Suh, S., Tanik, U., Carbone, J., Eroglu, A. (eds) Applied Cyber-Physical Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7336-7_6
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7336-7_6
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7335-0
Online ISBN: 978-1-4614-7336-7
eBook Packages: Computer ScienceComputer Science (R0)