TY - JOUR
T1 - Secure agents
AU - Bonatti, Piero A.
AU - Kraus, Sarit
AU - Subrahmanian, V. S.
N1 - Funding Information:
This work was supported by the Army Research Laboratory under Contract Number DAAL01-97-K0135, by the Army Research Office under Contract DAAD190010484, by DARPA/RL Contract Number F306029910552, by an NSF Young Investigator Award IRI-93-57756, and by NSF Grants IIS-9820657 and IIS-9907482.
PY - 2003/1
Y1 - 2003/1
N2 - With the rapid proliferation of software agents, there comes an increased need for agents to ensure that they do not provide data and/or services to unauthorized users. We first develop an abstract definition of what it means for an agent to preserve data/action security. Most often, this requires an agent to have knowledge that is impossible to acquire - hence, we then develop approximate security checks that take into account, the fact that an agent usually has incomplete/approximate beliefs about other agents. We develop two types of security checks - static ones that can be checked prior to deploying the agent, and dynamic ones that are executed at run time. We prove that a number of these problems are undecidable, but under certain conditions, they are decidable and (our definition of) security can be guaranteed. Finally, we propose a language within which the developer of an agent can specify her security needs, and present provably correct algorithms for static/dynamic security verification.
AB - With the rapid proliferation of software agents, there comes an increased need for agents to ensure that they do not provide data and/or services to unauthorized users. We first develop an abstract definition of what it means for an agent to preserve data/action security. Most often, this requires an agent to have knowledge that is impossible to acquire - hence, we then develop approximate security checks that take into account, the fact that an agent usually has incomplete/approximate beliefs about other agents. We develop two types of security checks - static ones that can be checked prior to deploying the agent, and dynamic ones that are executed at run time. We prove that a number of these problems are undecidable, but under certain conditions, they are decidable and (our definition of) security can be guaranteed. Finally, we propose a language within which the developer of an agent can specify her security needs, and present provably correct algorithms for static/dynamic security verification.
UR - http://www.scopus.com/inward/record.url?scp=0037209529&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0037209529&partnerID=8YFLogxK
U2 - 10.1023/A:1020233522878
DO - 10.1023/A:1020233522878
M3 - Article
AN - SCOPUS:0037209529
SN - 1012-2443
VL - 37
SP - 169
EP - 235
JO - Annals of Mathematics and Artificial Intelligence
JF - Annals of Mathematics and Artificial Intelligence
IS - 1-2
ER -