Generative Policies for Coalition Systems - A Symbolic Learning Framework

Policy systems are critical for managing missions and collaborative activities carried out by coalitions involving different organizations. Conventional policy-based management approaches are not suitable for next-generation coalitions that will involve not only humans, but also autonomous computing devices and systems. It is critical that those parties be able to generate and customize policies based on contexts and activities. This paper introduces a novel approach for the autonomic generation of policies by autonomous parties. The framework combines context free grammars, answer set programs, and inductionbased learning. It allows a party to generate its own policies, based on a grammar and some semantic constraints, by learning from examples. The paper also outlines initial experiments in the use of such a symbolic approach and outlines relevant research challenges, ranging from explainability to quality assessment of policies.

[1]  Robert Givan,et al.  Learning Control Knowledge for Forward Search Planning , 2008, J. Mach. Learn. Res..

[2]  Krysia Broda,et al.  The complexity and generality of learning answer set programs , 2018, Artif. Intell..

[3]  Krysia Broda,et al.  Inductive Learning of Answer Set Programs , 2014, JELIA.

[4]  Elisa Bertino,et al.  How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management) , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).

[5]  Jorge Lobo,et al.  Representing and Learning Grammars in Answer Set Programming , 2019, AAAI.

[6]  Sayandeep Sen,et al.  Demultiplexing activities of daily living in IoT enabled smarthomes , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[7]  Rafael H. Bordini,et al.  Multi-Agent Programming: Languages, Platforms and Applications , 2005, Multi-Agent Programming.

[8]  Brian Rivera,et al.  DAIS-ITA scenario , 2019, Defense + Commercial Sensing.

[9]  Cristina Nita-Rotaru,et al.  Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols , 2019, AAAI.

[10]  Elisa Bertino,et al.  ProFact: A Provenance-based Analytics Framework for Access Control Policies , 2019 .

[11]  Dinesh C. Verma,et al.  Federated AI for building AI Solutions across Multiple Agencies , 2018, ArXiv.

[12]  Hui-Min Huang,et al.  Autonomy levels for unmanned systems (ALFUS) framework: safety and application issues , 2007, PerMIS.

[13]  Tao Xie,et al.  Conformance Checking of Access Control Policies Specified in XACML , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[14]  Chris Russell,et al.  Counterfactual Explanations Without Opening the Black Box: Automated Decisions and the GDPR , 2017, ArXiv.

[15]  Elisa Bertino,et al.  Generative policy model for autonomic management , 2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[16]  Franco Turini,et al.  A Survey of Methods for Explaining Black Box Models , 2018, ACM Comput. Surv..

[17]  Manoj A. Thomas,et al.  Federated Machine Learning for Translational Research , 2018, AMCIS.

[18]  Elisa Bertino,et al.  A Generative Policy Model for Connected and Autonomous Vehicles , 2019, 2019 IEEE Intelligent Transportation Systems Conference (ITSC).

[19]  Robert W. Reeder,et al.  Improving user-interface dependability through mitigation of human error , 2005, Int. J. Hum. Comput. Stud..

[20]  Carlos Guestrin,et al.  "Why Should I Trust You?": Explaining the Predictions of Any Classifier , 2016, ArXiv.

[21]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[22]  Benjamin Kuipers,et al.  How can we trust a robot? , 2018, Commun. ACM.

[23]  Adnan Darwiche,et al.  Human-level intelligence or animal-like abilities? , 2017, Commun. ACM.

[24]  Jorge Lobo,et al.  Automating role-based provisioning by learning from examples , 2009, SACMAT '09.

[25]  Thomas Eiter,et al.  Answer Set Programming: A Primer , 2009, Reasoning Web.

[26]  Elisa Bertino,et al.  The Challenge of Access Control Policies Quality , 2018, ACM J. Data Inf. Qual..

[27]  Judea Pearl,et al.  Theoretical Impediments to Machine Learning With Seven Sparks from the Causal Revolution , 2018, WSDM.

[28]  Elisa Bertino,et al.  Methods and Tools for Policy Analysis , 2019, ACM Comput. Surv..

[29]  Tao Xie,et al.  Automated extraction of security policies from natural-language software documents , 2012, SIGSOFT FSE.

[30]  Ron Kohavi,et al.  Feature Subset Selection Using the Wrapper Method: Overfitting and Dynamic Search Space Topology , 1995, KDD.

[31]  Elisa Bertino,et al.  Provenance-Based Analytics Services for Access Control Policies , 2017, 2017 IEEE World Congress on Services (SERVICES).

[32]  Elisa Bertino,et al.  Access Control for Databases: Concepts and Systems , 2011, Found. Trends Databases.

[33]  Elisa Bertino,et al.  A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[34]  Stephen Muggleton,et al.  Inductive Logic Programming , 2011, Lecture Notes in Computer Science.

[35]  Michael Sipser,et al.  Introduction to the Theory of Computation , 1996, SIGA.

[36]  Amit Dhurandhar,et al.  Explanations based on the Missing: Towards Contrastive Explanations with Pertinent Negatives , 2018, NeurIPS.

[37]  James Bret Michael,et al.  Natural-language processing support for developing policy-governed software systems , 2001, Proceedings 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems. TOOLS 39.

[38]  Lorrie Faith Cranor,et al.  Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.

[39]  Mehdi Bennis,et al.  Wireless Network Intelligence at the Edge , 2018, Proceedings of the IEEE.

[40]  Wei Shi,et al.  Federated learning of predictive models from federated Electronic Health Records , 2018, Int. J. Medical Informatics.

[41]  Jürgen Dix,et al.  Multi-Agent Programming: Languages, Tools and Applications , 2009 .

[42]  Elisa Bertino,et al.  Community-based self generation of policies and processes for assets: Concepts and research directions , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[43]  Taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles , 2022 .