A Secure Coordination of Agents with Nonmonotonic Soft Concurrent Constraint Programming. Bistarelli, S., Paola, C., & Santini, F. 2012.
doi  abstract   bibtex   
We present a fine-grained security model to enforce the access control on the constraint store in Concurrent Constraint Programming (CCP) languages. We show the model for a nonmonotonic version of Soft CCP (SCCP), that is an extension of CCP which deals with soft constraints, which are constraints that have a preference level associated to them. In the considered nomonotonic version (NMSCCP), the language is equipped with actions that can also remove constraints from the store. The language can be used for coordinating the agents on a common store of information. Clearly, in such scenario, is important to enhance the operations that the agents may perform with security and privacy, in order to limit their behavior, e.g., to hide some information or to prevent an agent to consume too many resources
@conference{
	11391_313896,
	author = {Bistarelli, S. and Paola, Campli and Santini, F.},
	title = {A Secure Coordination of Agents with Nonmonotonic Soft Concurrent Constraint Programming},
	year = {2012},
	publisher = {ACM Special Interest Group on Applied Computing (SIGAPP),Provincia Autonoma di Trento,Riva del Garda Congressi,COSBI},
	booktitle = {Proceedings of the ACM Symposium on Applied Computing, SAC 2012},
	abstract = {We present a fine-grained security model to enforce the access control on the constraint store in Concurrent Constraint Programming (CCP) languages. We show the model for a nonmonotonic version of Soft CCP (SCCP), that is an extension of CCP which deals with soft constraints, which are constraints that have a preference level associated to them. In the considered nomonotonic version (NMSCCP), the language is equipped with actions that can also remove constraints from the store. The language can be used for coordinating the agents on a common store of information. Clearly, in such scenario, is important to enhance the operations that the agents may perform with security and privacy, in order to limit their behavior, e.g., to hide some information or to prevent an agent to consume too many resources},
	doi = {10.1145/2245276.2232023},	
	pages = {1551--1553}
}

Downloads: 0