Déléguer la protection des données personnelles à des agents cognitifs

@article{Piolle2010DlguerLP,
  title={D{\'e}l{\'e}guer la protection des donn{\'e}es personnelles {\`a} des agents cognitifs},
  author={Guillaume Piolle and Yves Demazeau},
  journal={Rev. d'Intelligence Artif.},
  year={2010},
  volume={24},
  pages={357-390}
}
Integrating regulations regarding personal data protection can be a complex task for users. Unfortunately, technical privacy-enhancing proposals lack both an efficient bond with regulations and the actual ability to help human users dealing with their interactions. This is why we propose the model of the PAw agent, a cognitive autonomous agent whose aim is to assist its human owner and to protect her data. It is capable of perceiving and reasoning on a composite normative context, and to build… 
2 Citations

Figures from this paper

The Coprelobri project: the logical approach to privacy

TLDR
The backbone of the Coprelobri project is the design of a logical language that can be used to represent and reason on privacy policies, primarily based on epistemic and deontic logics.

Enhancing privacy protection in social network systems through decentralization and policy conflict management

TLDR
An algorithm to maintain equity between users in SNSs is introduced to solve conflicts that may arise between the privacy policies of several users, avoiding that some users take advantage over others.

References

SHOWING 1-10 OF 47 REFERENCES

Une Logique pour Raisonner sur la Protection des Données Personnelles

TLDR
The DLP logic is presented, designed to allow a cognitive agent to represent norms, to reason about them, to take into account their composite nature and to adapt their behaviour to them in a consistent way.

Des systèmes normatifs comme outils de protection de la vie privée

TLDR
The potential of normative systems, which are mainly used today for modeling and managing organizations and regulations, to become one of the representation and management tools of this privacy management is considered.

Obligations with Deadlines and Maintained Interdictions in Privacy Regulation Frameworks

  • G. PiolleY. Demazeau
  • Computer Science
    2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
  • 2008
TLDR
It is shown the need for specific operators to express obligations with deadlines and maintained interdictions, and a deontic and temporal logic based on predicates dealing with personal data management is proposed.

Privacy Management in User-Centred Multi-agent Systems

TLDR
This work examines different technical works that seem to be as many interesting ways of dealing with privacy policies, and proposes directions of research based on the most interesting aspects of the underlined approaches.

Analyzing consistency of security policies

  • L. CholvyF. Cuppens
  • Computer Science
    Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
  • 1997
TLDR
The problem of checking policy consistency and a method for solving it is addressed, and how to query a policy to know the actual norms which apply to a given situation is described.

A logical analysis of authorized and prohibited information flows

  • F. Cuppens
  • Computer Science
    Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy
  • 1993
TLDR
It is argued that the prohibitions enforced by non-interference or non-deducibility are generally too rigid and lead to too strong security properties and the consistency problem is discussed.

Directed Deadline Obligations in Agent-Based Business Contracts

TLDR
This work argues in favor of a directed deadline obligation approach, taking inspiration on international legislation over trade procedures, based on authorizations granted in specific states of an obligation lifecycle model, which is formalized using temporal logic and implemented in a rule-based system.

Conflict Resolution in Norm-Regulated Environments Via Unification and Constraints

TLDR
This work uses first-order unification and constraint satisfaction to detect and resolve conflicts in virtual environments and introduces a concept of norm curtailment, an algorithm for norm adoption which preserves conflict-freedom.

A logic for reasoning about security

TLDR
A formal framework for specifying and reasoning about security policies, and for verifying that system designs adhere to such policies, is developed and the combination of policies is addressed.

Nomad: a security model with non atomic actions and deadlines

TLDR
A formal security model called Nomad is defined to express privileges on non atomic actions that combines deontic and temporal logics and formally analyze how privileges onNon atomic actions can be decomposed into more basic privileges on elementary actions.