Conflict Management with an Authority/Deniability Model
نویسندگان
چکیده
When a reasoning system encounters a contradiction like p&q=>false, it may try to eliminate it by retracting some belief that supports either p or q. This paper addresses the issue of how to determine which of the possible supporting beliefs to retract. The problem is studied in the context of a heterogenous distributed environment in which we can not make assumptions about how agents derive their beliefs. The presented model considers two properties of beliefs: the authority of the agents that provided the belief in the first place and the costs incurred upon other agents that already used the belief (directly or indirectly) for their own decision making or action, if the belief is to be retracted. The model is implemented in an information infrastructure we have created for enterprise integration.
منابع مشابه
The persistence of cliques in the post-communist state. The case of deniability in drug reimbursement policy in Poland.
This article explores a key question in political sociology: Can post-communist policy-making be described with classical theories of the Western state or do we need a theory of the specificity of the post-communist state? In so doing, we consider Janine Wedel's clique theory, concerned with informal social actors and processes in post-communist transition. We conducted a case study of drug rei...
متن کاملDeniable Functional Encryption
Deniable encryption, first introduced by Canetti et al. (CRYPTO 1997), allows a sender and/or receiver of encrypted communication to produce fake but authentic-looking coins and/or secret keys that “open” the communication to a different message. Here we initiate its study for the more general case of functional encryption (FE), as introduced by Boneh et al. (TCC 2011), wherein a receiver in po...
متن کاملAuthority management in human-robot systems
In the context of missions accomplished jointly by an artifical agent and a human agent, we focus on a controller of the authority dynamics based on a dependence graph of resources that can be controlled by both agents. The controller is designed to adapt the behaviours of the artificial agent or of the human agent in case of an authority conflict occurring on these resources. The relative auth...
متن کاملA Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem
Recently, many non-interactive deniable authentication (NIDA) protocols have been proposed. They are mainly composed of two types, signature-based and shared-secrecy based. After reviewing these schemes, we found that the signature-based approach can not deny the source of the message and thus can not achieve full deniability; and that, the shared-secrecy based approach suffers KCI attack altho...
متن کاملFuzzy Complexity Analysis with Conflict Resolution for Educational Projects
Evaluative and comparative analysis among educational projects remains an issue for administration, program directors, instructors, and educational institutes. This study reports a fuzzy complexity model for educational projects, which has two primary aspects (technical aspects and transparency aspects). These aspects may not be measured precisely due to uncertain situations. Therefore, a fuzzy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002