Skip to main content

Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services

  • Conference paper
Engineering Secure Software and Systems (ESSoS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8364))

Included in the following conference series:

Abstract

To protect an agent’s own knowledge or belief against unwanted information inferences by cooperating agents, Controlled Interaction Execution offers a variety of control methods to confine the information content of outgoing interaction data according to agent-specific confidentiality policies, assumptions and reaction specifications. Based on preliminary experiences with a prototype implementation as a frontend to a relational DBMS, in this article we outline the architectural design and the parameterized construction of specific tasks to uniformly shield all information services in need of confinement, potentially comprising query answering, update processing with refreshments, belief revision, data publishing and data mining. Refraining from any intervention at the cooperating agents, which are also seen as intelligently attacking the defending agent’s own interest in preserving confidentiality, the engineering solely aims at self-confinement when releasing information.

This work has been supported by the Deutsche Forschungsgemeinschaft (German Research Council) under grant SFB 876/A5 within the framework of the Collaborative Research Center “Providing Information by Resource-Constrained Data Analysis”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Andrighetto, G., Governatori, G., Noriega, P., van der Torre, L.W.N. (eds.): Normative Multi-Agent Systems. Dagstuhl Follow-Ups, vol. 4. Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)

    Google Scholar 

  2. Biskup, J.: Dynamic policy adaption for inference control of queries to a propositional information system. Journal of Computer Security 20, 509–546 (2012)

    Google Scholar 

  3. Biskup, J.: Inference-usability confinement by maintaining inference-proof views of an information system. International Journal of Computational Science and Engineering 7(1), 17–37 (2012)

    Article  Google Scholar 

  4. Biskup, J.: Logic-oriented confidentiality policies for controlled interaction execution. In: Madaan, A., Kikuchi, S., Bhalla, S. (eds.) DNIS 2013. LNCS, vol. 7813, pp. 1–22. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  5. Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14–27 (2004)

    Article  MathSciNet  Google Scholar 

  6. Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40(1-2), 37–62 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  7. Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1-2), 39–77 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  8. Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Inference-proof view update transactions with forwarded refreshments. Journal of Computer Security 19, 487–529 (2011)

    Google Scholar 

  9. Biskup, J., Li, L.: On inference-proof view processing of XML documents. IEEE Trans. Dependable Sec. Comput. 10(2), 99–113 (2013)

    Article  Google Scholar 

  10. Biskup, J., Tadros, C.: Preserving confidentiality while reacting on iterated queries and belief revisions. Ann. Math. Artif. Intell. (2013), doi:10.1007/s10472-013-9374-6

    Google Scholar 

  11. Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7(3), 199–217 (2008)

    Article  Google Scholar 

  12. Biskup, J., Wiese, L.: A sound and complete model-generation procedure for consistent and confidentiality-preserving databases. Theoretical Computer Science 412, 4044–4072 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  13. Brewka, G.: Multi-context systems: Specifying the interaction of knowledge bases declaratively. In: Krötzsch, M., Straccia, U. (eds.) RR 2012. LNCS, vol. 7497, pp. 1–4. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. Calvanese, D., Giacomo, G.D., Lenzerini, M., Rosati, R.: View-based query answering in description logics: Semantics and complexity. J. Comput. Syst. Sci. 78(1), 26–46 (2012)

    Article  MATH  Google Scholar 

  15. Halpern, J.Y., O’Neill, K.R.: Secrecy in multiagent systems. ACM Trans. Inf. Syst. Secur. 12(1), 5.1–5.47 (2008)

    Google Scholar 

  16. Huget, M.-P., Poslad, S.: The Foundation of Intelligent Physical Agents, http://www.fipa.org

  17. Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design. Journal of Computer Security 21(2), 283–315 (2013)

    Google Scholar 

  18. Kott, A., McEneaney, W.M. (eds.): Adversarial Reasoning: Computational Approaches to Reading the Opponent’s Mind. Chapman & Hall/CRC, Boca Raton (2007)

    Google Scholar 

  19. Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3) (2009)

    Google Scholar 

  20. Pretschner, A., Hilty, M., Basin, D.A.: Distributed usage control. Commun. ACM 49(9), 39–44 (2006)

    Article  Google Scholar 

  21. Sarawagi, S.: Information extraction. Foundations and Trends in Databases 1(3), 261–377 (2008)

    Article  Google Scholar 

  22. Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1), 41–59 (1983)

    Article  MATH  Google Scholar 

  23. Wooldridge, M.J.: An Introduction to MultiAgent Systems, 2nd edn. Wiley, Hoboken (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Biskup, J., Tadros, C. (2014). Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services. In: Jürjens, J., Piessens, F., Bielova, N. (eds) Engineering Secure Software and Systems. ESSoS 2014. Lecture Notes in Computer Science, vol 8364. Springer, Cham. https://doi.org/10.1007/978-3-319-04897-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04897-0_3

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04896-3

  • Online ISBN: 978-3-319-04897-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics