![]() van der Torre, Leon ![]() in Dagstuhl Reports (2016) This report documents the program and the outcomes of Dagstuhl Perspectives Workshop 15362 “Present and Future of Formal Argumentation”. The goal of this Dagstuhl Perspectives Workshop was to gather the ... [more ▼] This report documents the program and the outcomes of Dagstuhl Perspectives Workshop 15362 “Present and Future of Formal Argumentation”. The goal of this Dagstuhl Perspectives Workshop was to gather the world leading experts in formal argumentation in order to develop a SWOT (Strength, Weaknesses, Opportunities, Threats) analysis of the current state of the research in this field and to draw accordingly some strategic lines to ensure its successful development in the future. A critical survey of the field has been carried out through individual presentations and collective discussions. Moreover, working group activity lead to identify several open problems in argumentation. [less ▲] Detailed reference viewed: 133 (11 UL)![]() ; ; Botev, Jean ![]() in Dagstuhl Reports (2016), 5(11), 142-147 Detailed reference viewed: 87 (0 UL)![]() ; Koenig, Vincent ![]() in Dagstuhl Reports (2015), 4(12), 28 Detailed reference viewed: 112 (3 UL)![]() ; ; Koenig, Vincent ![]() in Dagstuhl Reports (2015), 4(12), 28 This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the ... [more ▼] This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the design of nuclear plants. We can state, for example, that the dikes should be high enough to guarantee that a particular area will flood at most once every 1000 years. Even when considering the limitations of such numbers, they are useful in guiding policy. Metrics for the security of information systems have not reached the same maturity level. This is partly due to the nature of security risk, in which an adaptive attacker rather than nature causes the threat events. Moreover, whereas the human factor may complicate safety and security procedures alike, in security this "weakest link" may be actively exploited by an attacker, such as in phishing or social engineering. In order to measure security at the level of socio-technical systems, one therefore needs to compare online hacking against such social manipulations, since the attacker may simply take the easiest path. In this seminar, we searched for suitable metrics that allow us to estimate information security risk in a socio-technical context, as well as the costs and effectiveness of countermeasures. Working groups addressed different topics, including security as a science, testing and evaluation, social dynamics, models and economics. The working groups focused on three main questions: what are we interested in, how to measure it, and what to do with the metrics. [less ▲] Detailed reference viewed: 288 (11 UL)![]() ; ; et al in Dagstuhl Reports (2014), 4(9), 106-123 The Snowden revelations have demonstrated that the US and other nations are amassing data about people's lives at an unprecedented scale. Furthermore, these revelations have shown that intelligence ... [more ▼] The Snowden revelations have demonstrated that the US and other nations are amassing data about people's lives at an unprecedented scale. Furthermore, these revelations have shown that intelligence agencies are not only pursuing passive surveillance over the world's communication systems, but are also seeking to facilitate such surveillance by undermining the security of the internet and communications technologies. Thus the activities of these agencies threatens not only the rights of individual citizens but also the fabric of democratic society. Intelligence services do have a useful role to play in protecting society and for this need the capabilities and authority to perform targeted surveillance. But the scope of such surveillance must be strictly limited by an understanding of its costs as well as benefits, and it should not impinge on the privacy rights of citizens any more than necessary. Here we report on a recent Dagstuhl Perspectives Workshop addressing these issues - a four-day gathering of experts from multiple disciplines connected with privacy and security. The meeting explored the scope of mass-surveillance and the deliberate undermining of the security of the internet, defined basic principles that should underlie needed reforms, and discussed the potential for technical, legal and regulatory means to help restore the security of the internet and stem infringement of human-rights by ubiquitous electronic surveillance. [less ▲] Detailed reference viewed: 424 (3 UL)![]() ; ; et al in Dagstuhl Reports (2012), 2(3), 23-49 Normative systems are systems in the behavior of which norms play a role and which need normative concepts in order to be described or specified. A normative multi-agent system combines models for ... [more ▼] Normative systems are systems in the behavior of which norms play a role and which need normative concepts in order to be described or specified. A normative multi-agent system combines models for normative systems (dealing for example with obligations, permissions and prohibitions) with models for multi-agent systems. Norms have been proposed in multi-agent systems and computer science to deal with issues of coordination, security, electronic commerce and institutions, agent organization. However, due to the lack of a unified theory, many multi-agent system researchers are presently developing their own ad hoc concepts and applications. The aim of this Dagstuhl Seminar was to formulate a collective appraisal of the current perspectives in the field and the most promising venues for future activity. In particular, the seminar has been conceived for the writing of a volume titled "A Prospective view of Normative Multi Agent Systems" aimed to become a standard reference in the field and to provide guidelines for future research in normative multi-agent systems. [less ▲] Detailed reference viewed: 111 (1 UL) |
||