kasa
Uploaded by
13 SLIDES
268 VUES
130LIKES

Understanding Normative Behavior in Multi-Agent Systems: Privacy and Trust Management

DESCRIPTION

This paper explores emergent and normative behavior in Multi-Agent Systems (MAS), focusing on controlled access via gatekeepers and the negotiation of norms within communities. It addresses issues of privacy protection, including principles established by the EU’s Data Protection Directive. Additionally, it examines the taxonomy of agents, interactions, and the implications of trust and reputation over time, especially in relation to malicious agents and institutions that enforce norms. The interplay of privacy ontology and norms in MAS is critically analyzed for effective electronic intelligence implementations.

1 / 13

Télécharger la présentation

Understanding Normative Behavior in Multi-Agent Systems: Privacy and Trust Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. enMAS emergent and normative behaviour in Multi-Agent Systems André Meyer, TNO TPD meyer@tpd.tno.nl

  2. Brains Electronic Intelligence (Police) Railinspection the next generation Pipe Inspection Smart Card Evaluation Wash Disc Multimedia Retrieval ASML Level Sensor TNO TPD

  3. Reference Model • Open systems • Gatekeepers • Communities • Institutions • Ontologies • Norms

  4. Open Systems • Agents can move among distributed MAS • Controlled access via gatekeepers • Negotiation about norms and reputation • Mobile Agents • Malicious agents • Malicious hosts • Trust • Reputation

  5. Communities • Trust as a result of reputation over time • Peer2peer model (eBay) • Problem: mafia communities

  6. Institutions • Trusted agents in a MAS society • Keep record of positive and negative reports • Control communication (SCC) • May apply sanctions to malicious agents • Is this legal?

  7. Norms • Restrict autonomy • On social and individual level • Institutions • Deliberation, Communities • Norms vs. Ontologies • prescriptive • descriptive

  8. Privacy Protection in MAS • Privacy principles (EU directive) • Agent taxonomy • Privacy ontology • Transfer rules • Interaction protocols • Agent Practices Statement (APS, cf. P3P) • www.pet-pisa.nl

  9. Privacy Principles V 1. Intention and Notification - The processing of personal data must be reported in advance to the Data Protection Authority or a personal data protection official, unless processing has been exempted from notification. V 2. Transparency - The person involved must be able to see who is processing his personal data and for what purpose. V 3. Finality - Personal data may only be collected for specific, explicit and legitimate purposes and not further processed in a way incompatible with those purposes. V 4. Legitimate ground for Processing - The processing of personal data must be based on a foundation referred to in national legislation, such as permission, agreement, legal obligation, justified interest and such like. For special data, such as health, stricter limits prevail. V 5. Quality - The personal data must be as correct and as accurate as possible, sufficient, to the point and not excessive. V 6. Data subject’s rights - The data subjects involved have the right to take cognisance of and to improve their data as well as the right to raise objections. V 7. Security - Providing appropriate security for personal data held within IT-systems is one of the cornerstones of the DPD. Measures of technical and organisational nature suitable and proportional to the sensitivity of the personal data and the nature of possible risks have to be taken potential harm should the PII be misused or disclosed in an unauthorised matter. V 8. Processing by a processor - If processing is outsourced to a processor, it must be ensured that he will observe the instructions of the person responsible. V 9. Transfer of personal data outside the EU - In principle, the traffic of personal data to a country outside the EU is permitted only if that country offers adequate protection.

  10. Privacy Ontology

  11. Privacy-normative Behaviour

  12. End.

More Related