enMAS - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

enMAS

Description:

Trusted agents in a MAS society. Keep record of positive and negative reports ... potential harm should the PII be misused or disclosed in an unauthorised matter. ... – PowerPoint PPT presentation

Number of Views:26
Avg rating:3.0/5.0
Slides: 14
Provided by: andrem150
Category:

less

Transcript and Presenter's Notes

Title: enMAS


1
enMAS
  • emergent and normative behaviour in Multi-Agent
    Systems
  • André Meyer, TNO TPD
  • meyer_at_tpd.tno.nl

2
TNO TPD
3
Reference Model
  • Open systems
  • Gatekeepers
  • Communities
  • Institutions
  • Ontologies
  • Norms

4
Open Systems
  • Agents can move among distributed MAS
  • Controlled access via gatekeepers
  • Negotiation about norms and reputation
  • Mobile Agents
  • Malicious agents
  • Malicious hosts
  • Trust
  • Reputation

5
Communities
  • Trust as a result of reputation over time
  • Peer2peer model (eBay)
  • Problem mafia communities

6
Institutions
  • Trusted agents in a MAS society
  • Keep record of positive and negative reports
  • Control communication (SCC)
  • May apply sanctions to malicious agents
  • Is this legal?

7
Norms
  • Restrict autonomy
  • On social and individual level
  • Institutions
  • Deliberation, Communities
  • Norms vs. Ontologies
  • prescriptive
  • descriptive

8
Privacy Protection in MAS
  • Privacy principles (EU directive)
  • Agent taxonomy
  • Privacy ontology
  • Transfer rules
  • Interaction protocols
  • Agent Practices Statement (APS, cf. P3P)
  • www.pet-pisa.nl

9
Privacy Principles
  • V 1. Intention and Notification - The processing
    of personal data must be reported in advance to
    the Data Protection Authority or a personal data
    protection official, unless processing has been
    exempted from notification.
  • V 2. Transparency - The person involved must be
    able to see who is processing his personal data
    and for what purpose.
  • V 3. Finality - Personal data may only be
    collected for specific, explicit and legitimate
    purposes and not further processed in a way
    incompatible with those purposes.
  • V 4. Legitimate ground for Processing - The
    processing of personal data must be based on a
    foundation referred to in national legislation,
    such as permission, agreement, legal obligation,
    justified interest and such like. For special
    data, such as health, stricter limits prevail.
  • V 5. Quality - The personal data must be as
    correct and as accurate as possible, sufficient,
    to the point and not excessive.
  • V 6. Data subjects rights - The data subjects
    involved have the right to take cognisance of and
    to improve their data as well as the right to
    raise objections.
  • V 7. Security - Providing appropriate security
    for personal data held within IT-systems is one
    of the cornerstones of the DPD. Measures of
    technical and organisational nature suitable and
    proportional to the sensitivity of the personal
    data and the nature of possible risks have to be
    taken potential harm should the PII be misused or
    disclosed in an unauthorised matter.
  • V 8. Processing by a processor - If processing is
    outsourced to a processor, it must be ensured
    that he will observe the instructions of the
    person responsible.
  • V 9. Transfer of personal data outside the EU -
    In principle, the traffic of personal data to a
    country outside the EU is permitted only if that
    country offers adequate protection.

10
(No Transcript)
11
Privacy Ontology
12
Privacy-normative Behaviour
13
End.
Write a Comment
User Comments (0)
About PowerShow.com