1 / 13

enMAS

enMAS. emergent and normative behaviour in Multi-Agent Systems André Meyer, TNO TPD meyer@tpd.tno.nl. Brains. Electronic Intelligence (Police). Railinspection. the next generation. Pipe Inspection. Smart Card Evaluation. Wash Disc. Multimedia Retrieval. ASML Level Sensor. TNO TPD.

kasa
Download Presentation

enMAS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. enMAS emergent and normative behaviour in Multi-Agent Systems André Meyer, TNO TPD meyer@tpd.tno.nl

  2. Brains Electronic Intelligence (Police) Railinspection the next generation Pipe Inspection Smart Card Evaluation Wash Disc Multimedia Retrieval ASML Level Sensor TNO TPD

  3. Reference Model • Open systems • Gatekeepers • Communities • Institutions • Ontologies • Norms

  4. Open Systems • Agents can move among distributed MAS • Controlled access via gatekeepers • Negotiation about norms and reputation • Mobile Agents • Malicious agents • Malicious hosts • Trust • Reputation

  5. Communities • Trust as a result of reputation over time • Peer2peer model (eBay) • Problem: mafia communities

  6. Institutions • Trusted agents in a MAS society • Keep record of positive and negative reports • Control communication (SCC) • May apply sanctions to malicious agents • Is this legal?

  7. Norms • Restrict autonomy • On social and individual level • Institutions • Deliberation, Communities • Norms vs. Ontologies • prescriptive • descriptive

  8. Privacy Protection in MAS • Privacy principles (EU directive) • Agent taxonomy • Privacy ontology • Transfer rules • Interaction protocols • Agent Practices Statement (APS, cf. P3P) • www.pet-pisa.nl

  9. Privacy Principles V 1. Intention and Notification - The processing of personal data must be reported in advance to the Data Protection Authority or a personal data protection official, unless processing has been exempted from notification. V 2. Transparency - The person involved must be able to see who is processing his personal data and for what purpose. V 3. Finality - Personal data may only be collected for specific, explicit and legitimate purposes and not further processed in a way incompatible with those purposes. V 4. Legitimate ground for Processing - The processing of personal data must be based on a foundation referred to in national legislation, such as permission, agreement, legal obligation, justified interest and such like. For special data, such as health, stricter limits prevail. V 5. Quality - The personal data must be as correct and as accurate as possible, sufficient, to the point and not excessive. V 6. Data subject’s rights - The data subjects involved have the right to take cognisance of and to improve their data as well as the right to raise objections. V 7. Security - Providing appropriate security for personal data held within IT-systems is one of the cornerstones of the DPD. Measures of technical and organisational nature suitable and proportional to the sensitivity of the personal data and the nature of possible risks have to be taken potential harm should the PII be misused or disclosed in an unauthorised matter. V 8. Processing by a processor - If processing is outsourced to a processor, it must be ensured that he will observe the instructions of the person responsible. V 9. Transfer of personal data outside the EU - In principle, the traffic of personal data to a country outside the EU is permitted only if that country offers adequate protection.

  10. Privacy Ontology

  11. Privacy-normative Behaviour

  12. End.

More Related