Argumentation Schemes for Data Access Control

被引:5
|
作者
Panisson, Alison R. [1 ]
Ali, Asad [2 ]
Mcburney, Peter [2 ]
Bordini, Rafael H. [1 ]
机构
[1] PUCRS Porto Alegre, Sch Technol, Porto Alegre, RS, Brazil
[2] KCL London, Dept Informat, London, England
关键词
Data Access Control; Argumentation Schemes; Multi-Agent Systems; FRAMEWORK;
D O I
10.3233/978-1-61499-906-5-361
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One of the main challenges in integrating different smart applications is security. Among the problems related to security, data access control is one of the most important, given that it involves end-users' privacy. In this paper, we propose an approach to the modelling of data access control interfaces using argumentation-based agents. In particular, we introduce argumentation schemes for data access control, which are based on some of the most relevant models for data access control currently available. Our approach considers not only the usual access control policies, describing which category of agents has access to which category of information, but also emergency policies, describing situations where special emergency access control rules apply. Using argumentation-based agents as access control interfaces allows us to deal with the uncertainty about external information, allowing a correct categorisation of agents that request access to information, as well as allowing agents to expose emergency situations in which emergency access control rules may apply.
引用
收藏
页码:361 / 368
页数:8
相关论文
共 50 条
  • [41] Layered Access Control Schemes on Watermarked Scalable Media
    Feng-Cheng Chang
    Hsiang-Cheh Huang
    Hsueh-Ming Hang
    [J]. The Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology, 2007, 49 : 443 - 455
  • [42] Analyzing split channel medium access control schemes
    IEEE
    不详
    不详
    不详
    [J]. IEEE Trans. Wireless Commun, 2006, 5 (967-971):
  • [43] A survey on privacy and access control schemes in fog computing
    Khalid, Tauqeer
    Abbasi, Muhammad Abbas Khan
    Zuraiz, Maria
    Khan, Abdul Nasir
    Ali, Mazhar
    Ahmad, Raja Wasim
    Rodrigues, Joel J. P. C.
    Aslam, Mudassar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (02)
  • [44] A study of multiple access schemes in satellite control network
    Mo, Zijian
    Wang, Zhonghai
    Xiang, Xingyu
    Wang, Gang
    Chen, Genshe
    Nguyen, Tien
    Pham, Khanh
    Blasch, Erik
    [J]. SENSORS AND SYSTEMS FOR SPACE APPLICATIONS IX, 2016, 9838
  • [45] Access control schemes for DS-CDMA cellular system supporting an integrated voice/data traffic
    Um, HY
    [J]. ITS '98 PROCEEDINGS - SBT/IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 1998, : 72 - 77
  • [46] Data Access Control on Clouds
    Zang, Yanjiao
    Wang, Yongbin
    Wang, Qi
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6275 - 6280
  • [47] Meta-level Argumentation with Argument Schemes
    Mueller, Jann
    Hunter, Anthony
    Taylor, Philip
    [J]. SCALABLE UNCERTAINTY MANAGEMENT, SUM 2013, 2013, 8078 : 92 - 105
  • [48] Argumentation Schemes for Reasoning about Factors with Dimensions
    Atkinson, Katie
    Bench-Capon, Trevor
    Prakken, Henry
    Wyner, Adam
    [J]. LEGAL KNOWLEDGE AND INFORMATION SYSTEMS, 2013, 259 : 39 - 48
  • [49] Analysis of Clinical Discussions Based on Argumentation Schemes
    Al Qassas, Malik
    Fogli, Daniela
    Giacomin, Massimiliano
    Guida, Giovanni
    [J]. CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERIS/PROJMAN / HCIST 2015, 2015, 64 : 282 - 289
  • [50] Towards Argumentation Schemes for Open Systems Dependability
    Kido, Hiroyuki
    Ohsawa, Yukio
    Hirai, Makoto
    Yuasa, Yoshifumi
    Takai, Toshinori
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 32 - +