Skip to main content
Top

2014 | OriginalPaper | Chapter

6. Cyber-Physical System Architectures for Dynamic, Real-Time “Need-to-Know” Authorization

Authors : James A. Crowder, John N. Carbone

Published in: Applied Cyber-Physical Systems

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Discussed is an Intelligent Information Agent (I 2 A) architecture for real-time, adaptive, need-to-know, authorization of access to confidential/classified information. The “Need-to-know” paradigm for information content access and access to application and service execution is desperately needed for the ubiquitous non-traditional physical computing systems (e.g. refrigerators, wearable computers, engine sub-systems etc.), beginning to connect into the cyber mesh. The multi-agent system is based on the ELYSE cognitive neural, intelligent agent framework and provides “need-to-know” context-based authorization of requests for access to confidential/classified information. “Need-to-know” authorization is that which grants access to confidential/classified information only if that information is necessary for the requestor’s task, based on their roles and credentials. In this system, authorization is treated as a text classification problem utilizing fuzzy-neural, self-organizing semantic maps which learn a learn decision criteria based on label information and are capable of generalizing this learned behavior to other information with a zero, or near-zero, false alarm rate. Since “need-to-know” authorizations must be determined for multiple tasks, multiple users, and multiple collections of information, with quick turn-around from request to delivery, the authorization agents must be adaptive and capable of learning new profiles rapidly and with little impact on the overall system performance. We define five different classification methods and provide an architectural framework for the agent system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Crowder, J. A. “Adaptive Learning Algorithms for Functional Constraints on an Evolving Neural Network System.” NSA Technical Paper CON_0013_2002_003 (2002). Crowder, J. A. “Adaptive Learning Algorithms for Functional Constraints on an Evolving Neural Network System.” NSA Technical Paper CON_0013_2002_003 (2002).
2.
go back to reference Crowder, J. A., “Integrating an Expert System into a Neural Network with Genetic Programming for Process Planning.” NSA Technical Paper TIT_01_01_013_2001_001 (2001). Crowder, J. A., “Integrating an Expert System into a Neural Network with Genetic Programming for Process Planning.” NSA Technical Paper TIT_01_01_013_2001_001 (2001).
3.
go back to reference Crowder, J. A., “Machine Learning: Intuition (Concept) Learning in Hybrid Genetic/Fuzzy/Neural Systems.” NSA Technical Paper CON_0013_2003_009 (2003). Crowder, J. A., “Machine Learning: Intuition (Concept) Learning in Hybrid Genetic/Fuzzy/Neural Systems.” NSA Technical Paper CON_0013_2003_009 (2003).
4.
go back to reference Crowder, J., Barth, T., and Rouch, R., “Evolutionary Neural Infrastructure with Genetic Memory Algorithms: ENIGMA Theory Development.” NSA Technical Paper, Denver (1999) ENIGMA_1999_004. Crowder, J., Barth, T., and Rouch, R., “Evolutionary Neural Infrastructure with Genetic Memory Algorithms: ENIGMA Theory Development.” NSA Technical Paper, Denver (1999) ENIGMA_1999_004.
5.
go back to reference Crowder, J., Barth, T., and Rouch, R., “Learning Algorithms for Stochastically Driven Fuzzy, Genetic Neural Networks.” NSA Technical Paper, Denver (1999) ENIGMA_1999_002. Crowder, J., Barth, T., and Rouch, R., “Learning Algorithms for Stochastically Driven Fuzzy, Genetic Neural Networks.” NSA Technical Paper, Denver (1999) ENIGMA_1999_002.
6.
go back to reference Crowder, J., Barth, T., and Rouch, R., “Neural Associative Memory for Storing Complex Memory Patterns.” NSA Technical Paper, Denver (1999) ENIGMA_1999_003. Crowder, J., Barth, T., and Rouch, R., “Neural Associative Memory for Storing Complex Memory Patterns.” NSA Technical Paper, Denver (1999) ENIGMA_1999_003.
7.
go back to reference Jacobs, R., Jordan, M., Nowlan, S, and Hinton, G., “Adaptive Mixtures of Local Experts.” Neural Computation, Vol. 3 (1991). Jacobs, R., Jordan, M., Nowlan, S, and Hinton, G., “Adaptive Mixtures of Local Experts.” Neural Computation, Vol. 3 (1991).
8.
go back to reference Young-Woo, S., Giampapa, J., and Sycara, K., “A Multi-Agent System for Enforcing “Need-to-Know” Security Policies.” International Journal of Cooperative Information Systems (2004). Young-Woo, S., Giampapa, J., and Sycara, K., “A Multi-Agent System for Enforcing “Need-to-Know” Security Policies.” International Journal of Cooperative Information Systems (2004).
9.
go back to reference K. Sycara. Negotiation planning: An AI approach. European Journal of Operational Research, 46:216–234, 1990. K. Sycara. Negotiation planning: An AI approach. European Journal of Operational Research, 46:216–234, 1990.
10.
go back to reference Y. Arens, C. Y. Chee, C.-N. Hsu, and C. A. Knoblock. Retrieving and integrating data from multiple information sources. International Journal of Intelligent and Cooperative Information Systems, 2(2):127–158, June 1993. Y. Arens, C. Y. Chee, C.-N. Hsu, and C. A. Knoblock. Retrieving and integrating data from multiple information sources. International Journal of Intelligent and Cooperative Information Systems, 2(2):127–158, June 1993.
11.
go back to reference F. Brazier, B. D. Keplicz, N. R. Jennings, and J. Treur. Formal specification of multi-agent systems: a real-world case. In First International Conference on Multi-Agent Systems (ICMAS’95), pages 25–32, San Francisco, CA., June 12–14 1995. F. Brazier, B. D. Keplicz, N. R. Jennings, and J. Treur. Formal specification of multi-agent systems: a real-world case. In First International Conference on Multi-Agent Systems (ICMAS’95), pages 25–32, San Francisco, CA., June 12–14 1995.
12.
go back to reference Chandramouli, R. and Sandhu, R., “Role based access control features in commercial database management systems.” Proceedings of 21st National Information Systems Security (1998). Chandramouli, R. and Sandhu, R., “Role based access control features in commercial database management systems.” Proceedings of 21st National Information Systems Security (1998).
13.
go back to reference Giuri, L. and Iglio, P., “Role Templates for Content-Based Access Control.” Proceedings of ACM Workship on Role Based Access Control, pp. 153–159 (1997). Giuri, L. and Iglio, P., “Role Templates for Content-Based Access Control.” Proceedings of ACM Workship on Role Based Access Control, pp. 153–159 (1997).
Metadata
Title
Cyber-Physical System Architectures for Dynamic, Real-Time “Need-to-Know” Authorization
Authors
James A. Crowder
John N. Carbone
Copyright Year
2014
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-7336-7_6

Premium Partner