ABSTRACT
The ability to incorporate intelligence in even small devices and to make use of contextual information from widely deployed sensors has already begun to change management paradigms. As edge computing and IoT become more prevalent, systems will increasingly consist of cooperating, heterogeneous, distributed, autonomous elements. Architectures for cognitive, collaborative systems are evolving to deal with such complex environments. Concepts from multi-agent systems and autonomic computing are being applied to cope with the scope and breadth of large collections of interacting devices and services. Technologies for security and access control must evolve as well. Policy-based mechanisms are widely used and have been very successful in protecting information and controlling access to systems and services. They tend to rely, however, on a centralized infrastructure and on the automated enforcement of directives. Newer paradigms are being investigated that allow policy structures to be more dynamic and contextual, while still preserving the desired levels of control. We will present trends in the evolution of architectures for distributed, federated systems, and the technologies for managing them.
- Y Shoham, K Leyton-Brown, Multiagent systems: Algorithmic, gametheoretic, and logical foundations, Cambridge University Press, 2008. Google ScholarDigital Library
- W. Han, and C. Le, A survey on policy languages in network and security management. Computer Networks, 56(1), pp.477--489, 2012. Google ScholarDigital Library
- Dulay N., Lupu E., Sloman M., Sventek J., Badr N., Heeps S., Selfmanaged Cells for Ubiquitous Systems. In: Gorodetsky V., Kotenko I., Skormin V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. Google ScholarDigital Library
- J. O. Kephart, D. M. Chess, The vision of autonomic computing, Computer, Volume 36, Issue 1, 2003. Google ScholarDigital Library
- F. Ye, R. Ganti, S. Calo, R. Dimaghani, K. Grueneberg, Meca: mobile edge capture and analysis middleware for social sensing applications, Proceedings of the 21st International Conference on World Wide Web, Pages 699--702, Lyon, France, April 16 - 20, 2012. Google ScholarDigital Library
- B. Moore, Ed., RFC 3460, Policy Core Information Model (PCIM) Extensions, http://www.rfc-editor.org/rfc/rfc3460.txt Google ScholarDigital Library
- Ian Molloy, Youngja Park, Suresh Chari, Generative models for access control policies: applications to role mining over logs with attribution, SACMAT '12 Proceedings of the 17th ACM symposium on Access Control Models and Technologies, Pages 45--56. Google ScholarDigital Library
- Maroun Touma, Elisa Bertino, Seraphin Calo, Brian Rivera, Dinesh Verma, Framework for behavioral analytics in anomaly identification, SPIE DS 2017 (to appear).Google Scholar
- Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil Lupu, Seraphin B. Calo, Morris Sloman, Refinement of History-Based Policies, In Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning, Springer-Verlag, Berlin, Heidelberg 280--299 (2011). Google ScholarDigital Library
- S. Jajodia et. al., eds., Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security, Springer, 2011. Google ScholarDigital Library
- E. Asmare, N. Dulay, E. Lupu, M. Sloman, S. Calo, J. Lobo, Secure Dynamic Community Establishment in Coalitions, IEEE Military Communications Conference, (MILCOM 2007), Orlando FL, Oct 2007, Pages 1--7.Google Scholar
- V. Mishra, D. Verma, C. Williams and K. Marcus, Comparing Software Defined Architectures for Coalition Operations, submitted to International Conference on Military Communications and Information Systems, 2017.Google Scholar
Index Terms
- Distributed Intelligence: Trends in the Management of Complex Systems
Recommendations
Autonomic configuration and recovery in a mobile agent-based distributed event monitoring system: Research Articles
In this paper we present a framework for building policy-based autonomic distributed agent systems. The autonomic mechanisms of configuration and recovery are supported through a distributed event processing model and a set of policy enforcement ...
Contemporary cybernetics and its facets of cognitive informatics and computational intelligence
Special issue on cybernetics and cognitive informaticsThis paper explores the architecture, theoretical foundations, and paradigms of contemporary cybernetics from perspectives of cognitive informatics (CI) and computational intelligence. The modern domain and the hierarchical behavioral model of ...
Why Computer-Based Systems Should Be Autonomic
ECBS '05: Proceedings of the 12th IEEE International Conference and Workshops on Engineering of Computer-Based SystemsThe objective of this paper is to discuss why computer-based systems should be autonomic, where autonomicity implies self-managing, often conceptualized in terms of being self-configuring, self-healing, self-optimising, self-protecting and self-aware. ...
Comments