Abstract
For a long time, logic programming and rule-based reasoning have been proposed as a basis for policy specification languages. However, the term “policy” has not been given a unique meaning. In fact, it is used in the literature in a broad sense that encompasses the following notions:
-
Security Policies pose constraints on the behaviour of a system. They are typically used to control permissions of users/groups while accessing resources and services.
-
Trust Management policy languages are used to collect user properties in open environments, where the set of potential users spans over the entire web.
-
Action Languages are used in reactive policy specification to execute actions like event logging, notifications, etc. Authorizations that involve actions and side effects are sometimes called provisional.
-
Business Rules are “statements about how a business is done” [25] and are used to formalize and automatize business decisions as well as for efficiency reasons. They can be formulated as reaction rules, derivation rules, and integrity constraints [142],[147].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
A. Adi, Z. Sommer, A. Biger, S. Ross-Talbot, and G. Wagner. Reactive ruleml, http://groups.yahoo.com/group/reactive-ruleml/, 2004.
J. Alferes and L. Pereira. Reasoning with logic programming, volume 1111 of LNAI. Springer-Verlag, 1996.
G. Antoniou. Nonmonotonic Reasoning. The MIT Press, 1997.
G. Antoniou, D. Billington, G. Govematori, and M. Maher. Representation results for defeasible logic. ACM Transactions on Computational Logic, 2:255–287, 2001.
G. Antoniou, D. Billington, and M. Maher. On the analysis of regulations using defeasible rules. In Proc. of HICSS’99, 1999.
K. R. Apt, H. A. Blair, and A. Walker. Towards a theory of declarative knowledge. In Foundations of Deductive Databases and Logic Programming., pages 89–148. Morgan Kaufmann, 1988.
K. Arisha, T. Eiter, S. Kraus, F. Ozcan, R. Ross, and V. Subrahmanian. IMPACT: a platform for collaborating agents. IEEE Intelligent Systems, 14(2):64–72, 1999.
M. Baldoni. Normal Multimodal Logics with Interaction Axioms. In D. Basin, M. D’Agostino, D. M. Gabbay, S. Matthews, and L. Viganò, editors, Labelled Deduction, volume 17 of Applied Logic Series, pages 33–53. Applied Logic Series, Kluwer Academic Publisher, 2000.
M. Baldoni, C. Baroglio, L. Giordano, A. Martelli, and V. Patti. Reasoning about communicating agents in the semantic web. In F. Bry, N. Henze, and J. Maluszynski, editors, Proc. of the 1st International Workshop on Principle and Practice of Semantic Web Reasoning, PPSWR 2003, volume 2901 of LNCS, pages 84–98, Mumbai, India, December 2003. Springer.
M. Baldoni, C. Baroglio, A. Martelli, and V. Patti. Reasoning about self and others: communicating agents in a modal action logic. In Proc. of ICTCS’2003, volume 2841 of LNCS, pages 228–241. Springer, 2003.
M. Baldoni, C. Baroglio, A. Martelli, and V. Patti. Reasoning about interaction protocols for web service composition. In M. Bravetti and G. Zavattaro, editors, Proc. of 1st Int. Workshop on Web Services and Formal Methods, WS-FM 2004, volume 105 of Electronic Notes in Theoretical Computer Science, pages 21–36. Elsevier Science Direct, 2004.
M. Baldoni, C. Baroglio, A. Martelli, and V. Patti. Verification of protocol conformance and agent interoperability. In F. Toni and P. Torroni, editors, Proc. of Sixth International Workshop on Computational Logic in Multi-Agent Systems, CLIMA VI, London, UK, June 2005.
M. Baldoni, C. Baroglio, A. Martelli, V. Patti, and C. Schifanella. Verifying protocol conformance for logic-based communicating agents. In J. Leite and P. Torroni, editors, Post Proc. of Fifth International Workshop on Computational Logic in Multi-Agent Systems, CLIMA V, LNAI. Springer, 2005.
M. Baldoni, C. Baroglio, and V Patti. Web-based adaptive tutoring: an approach based on logic agents and reasoning about actions. Artificial Intelligence Review, 22(1):3–39, 2004.
M. Baldoni, L. Giordano, A. Martelli, and V. Patti. An Abductive Proof Procedure for Reasoning about Actions in Modal Logic Programming. In J. D. et al., editor, Proc. of NMELP’ 96, volume 1216 of LNAI, pages 132–150. Springer-Verlag, 1997.
M. Baldoni, L. Giordano, A. Martelli, and V. Patti. Programming Rational Agents in a Modal Action Logic. Annals of Mathematics and Artificial Intelligence, Special issue on Logic-Based Agent Implementation, 41(2–4):207–257, 2004.
C. Baral. Reasoning about actions: non-deterministic effects, constraints, and qualification. In Proc of IJCAI’95, pages 2017–2023, 1995.
C. Baral. Knowledge representation, reasoning and declarative problem solving. Cambridge University Press, Cambridge, 2003.
C. Baral and M. Gelfond. Reasoning about effects of concurrent actions. Journal of Logic Programming, 31(1–3):85–117, May 1997.
C. Baral and T. C. Son. Formalizing Sensing Actions-A transition function based approach. Artificial Intelligence, 125(1–2):19–91, January 2001.
J. Basney, W. Nejdl, D. Olmedilla, V. Welch, and M. Winslett. Negotiating trust on the grid. In 2nd WWW Workshop on Semantics in P2P and Grid Computing, New York, USA, may 2004.
N. Bassiliades, G. Antoniou, and I. Vlahavas. DR-DEVICE: A defeasible logic system for the semantic web. In Proc. 2nd International Workshop on Principles and Practice of Semantic Web Reasoning, LNCS. Springer Verlag, 2004.
M. Y. Becker and P. Sewell. Cassandra: distributed access control policies with tunable expressiveness. In 5th IEEE International Workshop on Policies for Distributed Systems and Networks, Yorktown Heights, June 2004.
M. Y. Becker and P. Sewell. Cassandra: flexible trust management, applied to electronic health records. In 17th IEEE Computer Security Foundations Workshop, Pacific Grove, CA, June 2004.
J. Bell, D. Brooks, E. Goldbloom, R. Sarro, and J. Wood. Knowledge representation, reasoning and declarative problem solving. Technical report, US West Information Technologies Group, Bellevue Golden, 1990.
J. Bentahar, B. Moulin, J. J. C. Meyer, and B. Chaib-Draa. A computational model for conversation policies for agent communication. In J. Leite and P. Torroni, editors, Pre-Proc. of CLIMA V, pages 66–81, Lisbon, Portugal, September 2004.
B. Berard, M. Bidoit, A. Finkel, F. Laroussinie, A. Petit, L. Petrucci, and P. Schnoebelen. Systems and Software Verification. Model-Checking Techniques and Tools. Springer, 2001.
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM TODS, 23(3), 1998.
E. Bertino, P. Bonatti, and E. Ferrari. Trbac: A temporal role-based access control model. ACM Trans. on Information and System Security, 4(3): 191–223, 2001.
E. Bertino, P. A. Bonatti, E. Ferrari, and M. L. Sapino. Temporal authorization bases: From specification to integration. Journal of Computer Security, 8(4), 2000.
E. Bertino, E. Ferrari, F. Buccafurri, and P. Rullo. A logical framework for reasoning on data access control policies. In Proc. of the 12th IEEE Computer Security Foundations Workshop (CSFW’99), pages 175–189. IEEE Computer Society, 1999.
D. Billington, K. de Coester, and D. Nute. A modular translation from defeasible nts to defeasible logics. Journal of Experimental and Theoretical Artificial Intelligence, pages 151–177, 1990.
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote Trust Management System Version 2. In Internet Draft RFC 2704, Sept. 1999.
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The role of trust manage-ment in distributed systems security. Lecture Notes in Computer Science, 1603:185–210, 1999.
M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust Management for Public-Key Infrastructures. In Security Protocols Workshop, Cambridge, UK, 1998.
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In IEEE Symposium on Security and Privacy, Oakland, CA, May 1996.
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance Checking in the PolicyMaker Trust Management System. In Financial Cryptography, British West Indies, Feb. 1998.
H. Boley, B. Grosof, M. Sintek, S. Tabet, and G. Wagner. Object-Oriented RuleML, version 0.85 of 15 march 2004, http://www.ruleml.org/indoo, 2004.
H. Boley, S. Tabet, and G. Wagner. Design rationale of RuleML: A markup language for semantic web rules. In International Semantic Web Working Symposium (SWWS), 2001.
P. Bonatti and P. Samarati. Regulating service access and information release on the web. In CCS’00: Proceedings of the 7th ACM conference on computer and communications security, pages 134–143. ACM Press, 2000.
P. A. Bonatti, C. Duma, D. Olmedilla, and N. Shahmehri. An integration of reputation-based and policy-based trust management. In Semantic Web Policy Workshop in con-junction with 4th International Semantic Web Conference, Galway, Ireland, nov 2005.
P. A. Bonatti and D. Olmedilla. Driving and monitoring provisional trust negotiation with metapolicies. In 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), pages 14–23, Stockholm, Sweden, jun 2005. IEEE Computer Society.
P. A. Bonatti, D. Olmedilla, and J. Peer. Advanced policy queries. Project Deliverable D4, Working Group I2, EU NoE REWERSE, Sept. 2005.
P. Bretier and D. Sadek. A rational agent as the kernel of a cooperative spoken dialogue system: implementing a logical theory of interaction. In J. Müller, M. Wooldridge, and N. Jennings, editors, Intelligent Agents III, proc. of ECAI-96 Workshop on Agent Theories, Architectures, and Languages (ATAL-96), volume 1193 of LNAI. Springer-Verlag, 1997.
D. F. C. Brewer and M. J. Nash. The Chinese wall security policy. In IEEE Symposium on Security and Privacy, pages 206–214, 1989.
L. Brownston, R. Farrell, E. Kant, and N. Martin. Programming expert systems in OPS5: an introduction to rule-based programming. Addison-Wesley Series In Artificial Intelligence. Addison-Wesley, 1985.
J. Bubenko, D. Brash, and J. Stirna. Ekd-enterprise knowledge development user guide, 1998.
M. Castilho, O. Gasquet, and A. Herzig. Modal tableaux for reasoning about actions and plans. In S. Steel, editor, Proc. ECP’97, LNAI, pages 119–130, 1997.
S. Ceri, G. Gottlob, and L. Tanca. Logic programming and databases. In Surveys in Computer Science, Berlin, Heidelberg, New York, 1990. Springer-Verlag.
S. Chakravarthy, E. Anwar, L. Maugis, and D. Mishra. Design of Sentinel: An object-oriented DBMS with event-based rules. Information and Software Technology, 9:559–568, 1994.
J. Chomicki, J. Lobo, and S. Naqvi. A logic programming approach to conflict resolution in policy management. In Proc. of the Seventh International Conference on Principles of Knowledge Representation and Reasoning (KR 2000), pages 121–132. Morgan Kaufmann, 2000.
Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. REFEREE: Trust management for Web applications. World Wide Web Journal, 2:127–139, 1997.
A. Ciampolini, E. Lamma, P. Mello, and P. Torroni. Expressing collaboration and com-petition among abductive logic agents. In K. Satoh and F. Sadri, editors, CL-2000 Workshop on Computational Logic in Multi-Agent Systems (CLIMA-00), 2000.
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in spki/sdsi. Journal of Computer Security, 9(4):285–322, 2001.
E. Clarke, O. Grumberg, and D. Peled. Model Checking. MIT Press, 2000.
P. Cohen and H. Levesque. Intention is choice with commitment. Artificial Intelligence, 42:213–261, 1990.
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. Ponder: A language for specifying security and management policies for distributed systems. Technical report, Imperial College, October 2000.
C. Date. An Introduction to Database Systems. Addison-Wesley, 1995.
U. Dayal, B. Blaustein, A. Buchmann, and S. Chakravarthy. The HiPAC project: Combining active databases and timing constraints. In ACM SIGMOD, pages 51–70, 1988.
G. De Giacomo and M. Lenzerini. PDL-based framework for reasoning about actions. In Proc. of AI*IA’ 95, volume 992 of LNAI, pages 103–114, 1995.
G. De Giacomo, Y. Lespérance, and H. J. Levesque. Reasoning about concurrent execution, prioritized interrupts, and exogenous actions in the situation calculus. In Proceed-ings of IJCAI’97, pages 1221–1226, Nagoya, August 1997.
G. De Giacomo and H. J. Levesque. An Incremental Interpreter for High-Level Programs with Sensing. In Proceedings of the AAAI 1998 Fall Symposium on Cognitive Robotics, Orlando, Florida, USA, October 1998.
O. Diaz, N. Paton, and P. Gray. Rule management in object oriented databases: A uniform approach. In Seventeenth International Conference on Very Large Data Bases, Barcelona, Spain, 1991.
J. Dietrich. The mandarax manual, http://mandarax.sourceforge.net/docs/mandarax.pdf, 2003.
T. Eiter, N. Leone, C. Mateis, G. Pfeifer, and F. Scarcello. A deductive system for non-monotonic reasoning. In Logic Programming and Nonmonotonic Reasoning, 4th Inter-national Conference, LPNMR’97, volume 1265 of Lecture Notes in Computer Science, pages 364–375. Springer, 1997.
U. Endriss, N. Maudet, F. Sadri, and F. Toni. Logic-based agent communication protocols. In F. Dignum, editor, Advances in agent communication languages, volume 2922 of Lecture Notes in Artificial Intelligence (LNAI), pages 91–107. Springer-Verlag, 2004.
FIPA. FIPA 2000. Technical report, FIPA (Foundation for Intelligent Physical Agents), November 2000.
M. Fisher. A survey of concurrent metatem-the language and its applications. In D. Gabbay and H. Ohlbach, editors, Proc. of the First International Conference on Temporal Logic, ICTL’94, volume 827 of LNAI, pages 480–505. Springer-Verlag, July 1994.
C. L. Forgy. RETE: A fast algorithm for the many pattern/many object pattern matching problem. Artificial Intelligence, 19:17–37, 1982.
E. Friedman-Hill. Jess in Action. Manning Publications Co., 2003.
J. Galbraith. Organization Design. Addison-Wesley, 1997.
R. Gavriloaie, W. Nejdl, D. Olmedilla, K. E. Seamons, and M. Winslett. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In 1st European Semantic Web Symposium (ESWS 2004), volume 3053 of Lecture Notes in Computer Science, pages 342–356, Heraklion, Crete, Greece, may 2004. Springer.
M. Gelfond and V. Lifschitz. The stable model semantics for logic programming. In Proc. of the 5th ICLP, pages 1070–1080. MIT Press, 1988.
M. Gelfond and V. Lifschitz. Representing action and change by logic programs. Journal of Logic Programming, 17:301–321, 1993.
G. D. Giacomo, Y. Lespérance, H. J. Levesque, and S. Sardina. On the semantic of deliberation in Indigolog: from theory to implementation. In Proc. of KR 2002, pages 603–614. Academic Press, 2002.
J. Giarratano and G. Riley. Expert Systems: Principles and Programming, 3rd Edition. PWS Publishing Co., Boston, MA, USA, 1998.
L. Giordano, A. Martelli, and C. Schwind. Dealing with concurrent actions in modal action logic. In Proc. ECAI-98, pages 537–541, 1998.
L. Giordano, A. Martelli, and C. Schwind. Verifying communicating agents by model checking in a temporal action logic. In JELIA’ 04, volume 3229 of LNAI, pages 57–69, Lisbon, Portugal, 2004. Springer-Verlag.
E. Giunchiglia, G. N. Kartha, and V. Lifschitz. Representing actions: indeterminacy and ramifications. Artificial Intelligence, 95:409–443, 1997.
D. Gollman. Analysing security protocols. In A. E. Abdallah, P. Ryan,, and S. Schneider, editors, Proc. of FASec 2002, volume 2629 of LNCS, pages 71–80. Springer-Verlag, 2003.
L. Gong. Inside Java 2 Platform Security: Architecture, API Design, and Implementation. Addison-Wesley, 1999.
B. Grosof. Prioritized conflict handling for logic programs. In International Symposium on Logic Programming (ILPS-97, 1997.
B. Grosof. Representing e-business rules for the semantic web: Situated courteous logic programs in RuleML. In Proceedings of the Workshop on Information Technologies and Systems (WITS), New Orleans, LA, USA, Dec. 2001.
B. Grosof, M. Gandhe, and T. Finin. Sweetjess: Translating damlruleml to jess. In International Workshop on Rule Markup Languages for Business Rules on the Semantic Web, held in conjunction with the First International Semantic Web Conference (ISWC-2002), 2002.
B. Grosof and T. Poon. SweetDeal: Representing agent contracts with exceptions using XML rules, ontologies, and process descriptions. In Proceedings of the 12th World Wide Web Conference, Budapest, Hungary, May 2003.
A. Gupta, I. S. Mumick, and V. S. Subrahmanian. Maintaining views incrementally. In S1GMOD Conference, pages 157–166, 1993.
E. Hanson. Rule condition testing and action execution in ariel, 1992.
D. Hay and K. Healy. Defining business rules — what are they really?, 2000.
G. Holzmann. Description and Validation of Computer Protocols. Prentice Hall, 1992.
G. J. Holzmann. The model checker spin. IEEE Trans. Software Eng., 23(5):279–295, 1997.
I. Horrocks and P. Patel-Schneider. A proposal for an owl rules language. http://www.cs.man.ac.uk/horrocks/DAML/Rules/, Oct. 2003.
I. Horrocks, P. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and M. Dean. A semantic web rule language combining OWL and RuleML, version 0.5 of 19 november 2003, http://www.daml.org/2003/11/swrl/, 2003.
H. Huget, editor. Communication in Multiagent Systems, volume 2650 of LNAI. Springer, 2003.
ILOG web site, http://www.ilog.com, 2004.
R. Initiative. The Rule Markup Initiative Web Site, http://ruleml.org/, 2004.
International Telecommunication Union. Rec. X.509-Information Technology-Open Systems Interconnection-The Directory: Authentication Framework, Aug. 1997.
S. Jajodia, P. Samarati, M. Sapino, and V Subrahmanian. Flexible supporting for multiple access control policies. ACM Transactions on Database Systems, 26(2):214–260, 2001.
T. Jim. SD3: A Trust Management System With Certified Evaluation. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2001.
G. Karjoth, M. Schunter, and M. Waidner. The platform for enterprise privacy practices-privacyenabled management of customer data, 2002.
G. N. Kartha and V. Lifschitz. Actions with Indirect Effects (Preliminary Report). In Proc. of the KR’94, 1994.
R. Kowalski and M. Sergot. A Logic-based Calculus of Events. New Generation of Computing, 4:67–95, 1986.
N. Leone and P. Rullo. Ordered logic programming with sets. J. Log. Comput., 3(6):621–642, 1993.
H. J. Levesque, R. Reiter, Y. Lespérance, F. Lin, and R. B. Scherl. GOLOG: A Logic Programming Language for Dynamic Domains. J. of Logic Programming, 31:59–83, 1997.
N. Li and J. Mitchell. RT: A Role-based Trust-management Framework. In DARPA Information Survivability Conference and Exposition (DISCEX), Washington, D.C., Apr. 2003.
N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust-management framework. In SP’ 02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, page 114. IEEE Computer Society, 2002.
N. Li, W. Winsborough, and J. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35–86, Feb. 2003.
J. Lloyd. Logic Programming. Springer Verlag, 1984.
J. Lobo, R. Bhatia, and S. Naqvi. A policy description language. In Proc. of the 16th National Conference on Artificial Intelligence (AAAI’99), pages 291–298. AAAI Press, 1999.
J. Lobo, G. Mendez, and S. R. Taylor. Adding Knowledge to the Action Description Language A. In Proc. of AAAI’97/IAAI’97, pages 454–459, Menlo Park, 1997.
J. J. Lu, G. Moerkotte, J. Schü, and V. S. Subrahmanian. Efficient maintenance of materialized mediated views. In SIGMOD Conference, pages 340–351, 1995.
A. Mamdani and J. Pitt. Communication protocols in multi-agent systems: A development method and reference architecture. In Issues in Agent Communication, volume 1916 of LNCS, pages 160–177. Springer, 2000.
V. Marek and M. Truszczynski. Nonmonotonic Reasoning. Springer Verlag, 1993.
J. McCarthy and P. Hayes. Some, Philosophical Problems from the Standpoint of Artificial Intelligence. Machine Intelligence, 4:463–502, 1963.
S. McIlraith and T. Son. Adapting Golog for composition of semantic web services. In Proceedings of the Eighth International Conference on Knowledge Representation and Reasoning (KR2002), pages 482–493, Trento, Italy, 2002.
S. McIlraith, T. Son, and H. Zeng. Semantic web services. IEEE Intelligent Systems. Special Issue on the Semantic Web, 16(2):46–53, 2001.
N. Minsky and D. Rozenshtein. A software development environment for law-governed systems. In ACM SIGSOFT/SIGPLAN Software Engineering Symposium on Practical Software Development Environments (SDE’88). P.B. Henderson (ed.), 1988.
N. Minsky and V. Ungureanu. A mechanism for establishing policies for electronic commerce. In Proc. of the 18th International Conference on Distributed Computing Systems (ICDCS 1998), pages 322–331. IEEE Computer Society, 1998.
D. Miranker. Treat: A better match algorithm for ai production systems. In Proceedings of the National Conference on Artificial Intelligence, American Association for Artificial Intelligence, pages 42–47, 1987.
W. Nejdl, D. Olmedilla, and M. Winslett. Peertrust: Automated trust negotiation for peers on the semantic web. In VLDB Workshop on Secure Data Management (SDM), volume 3178 of Lecture Notes in Computer Science, pages 118–132, Toronto, Canada, aug 2004. Springer.
I. Niemelä and P. Simons. Smodels-an implementation of the stable model and well-founded semantics for normal 1p. In Logic Programming and Nonmonotonic Reasoning, 4th International Conference, LPNMR’97, volume 1265 of Lecture Notes in Computer Science, pages 421–430. Springer, 1997.
D. Nute. Handbook of Logic for Artificial Intelligence and Logic Programming, Vol. III, chapter Defeasible logic, pages 353–395. Oxford University Press, 1994.
extensible access control markup language (XACML) version 2.0. oasis standard, feb 2005.
D. Olmedilla, R. Lara, A. Polleres, and H. Lausen. Trust negotiation for semantic web services. In 1st International Workshop on Semantic Web Services and Web Process Composition (SWSWPC), volume 3387 of Lecture Notes in Computer Science, pages 81–95, San Diego, CA, USA, jul 2004. Springer.
L. Palopoli and C. Zaniolo. Polynomial-time computable stable models. Ann. Math. Artif. Inteli., 17(3–4):261–290, 1996.
L. R. Pokorny and C. R. Ramakrishnan. Modeling and verification of distributed autonomous agents using logic programming. In Pre-Proceedings of the Workshop on Declarative Agent Languages and Technologies (DALT’04), pages 172–187, 2004.
A. Rao and M. Georgeff. Modeling rational agents whithin a bdi-architecture. In Proceedings of KR’91, pages 473–484, 1991.
R. Reiter. A logic for default reasoning. Artificial Intelligence, 13:81–132, 1980.
P. Resnick and J. Miller. PICS: Internet access controls without censorship. Communications of the ACM, 39(10):87–93, Oct. 1996.
G. Riley. Clips-a tool for building expert systems, web site, http://www.ghg.net/clips/clips.html, 2004.
T. Ryutov and C. Neuman. The Specification and Enforcement of Advanced Security Policies. In Proc. of the Conference on Policies for Distributed Systems and Networks, POLICY 2002, Monterey, California, June 5–7 2002.
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons. Adaptive trust negotiation and access control. In SACMAT’ 05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 139–146, New York, NY, USA, 2005. ACM Press.
D. Saccà and C. Zaniolo. Stable models and non-determinism in logic programs with negation. In Proc. of the Ninth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS’90), pages 205–217, 1990.
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38–47, 1996.
T. Schaub and K. Wang. A semantic framework for preference handling in answer set programming. Logic Programming Theory and Practice, 3:569–607, 2003.
J. Schmidt. Planvolle steuerung gesellschaftlichen handelns. Verlag für Sozialwissenschaften, 1983.
C. B. Schwind. A logic based framework for action theories. In J. Ginzburg et al., editor, Language, Logic and Computation, pages 275–291. CSLI, 1997.
K. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu. Requirements for policy languages for trust negotiation. In Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY’02), Monterey, CA, June 2002. IEEE Computer Society.
K. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu. Requirements for policy languages for trust negotiation, 2002.
M. P. Singh. A social semantics for agent communication languages. In Proc. of IJCAI-98 Workshop on Agent Communication Languages, Berlin, 2000. Springer.
S. Staab, B. K. Bhargava, L. Lilien, A. Rosenthal, M. Winslett, M. Sloman, T. S. Dillon, E. Chang, F. K. Hussain, W. Nejdl, D. Olmedilla, and V. Kashyap. The pudding of trust. IEEE Intelligent Systems, 19(5):74–88, 2004.
M. Stonebraker, E. Hanson, and C. Hong. The design of the postgres rule system. In 3rd International IEEE Conference on Data Science, 1987.
K. Taveter and G. Wagner. Agent-oriented enterprise modeling based on business rules. In ER’ 01: Proceedings of the 20th International Conference on Conceptual Modeling, pages 527–540. Springer-Verlag, 2001.
D. Toman, J. Chomicki, and D. S. Rogers. Datalog with integer periodicity constraints. In SLP, pages 189–203, 1994.
A. Uszok, J. M. Bradshaw, and R. Jeffers. Kaos: A policy and domain services frame-work for grid computing and semantic web services. In Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29–April 1, 2004, Proceedings, volume 2995 of Lecture Notes in Computer Science, pages 16–26. Springer, 2004.
F. van Assche. Information systems developement: a rule-based approach. Knowledge-based Systems, 4:227–234, 1988.
M. van Emden and R. A. Kowalski. The semantics of predicate logic as a programming language. Journal of the ACM, 23(4), 1976.
G. Wagner. How to design a general rule markup language? In XML Technologien für das Semantic Web-XSW 2002, Proceedings zum Workshop, pages 19–37. GI, 2002.
G. Wagner, S. Tabet, and H. Boley. MOF-RuleML: The abstract syntax of RuleML as a MOF model. In Integrate 2003, 2003.
C. Walton. Model checking agent dialogues. In Proceedings of the Workshop on Declarative Agent Languages and Technologies (DALT’04), volume 3476 of LNA1. Springer-Verlag, 2005.
J. Widom and S. Ceri. Active Database Systems: triggers and rules for advanced database processing. Morgan Kaufmann Publishers Inc., 1996.
T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2–3):107–136, 1993.
M. Wooldridge and N. R. Jennings. Agent Theories, Architectures, and Languages: A survey. In Proc. of the ECAI-94 Workshop on Agent Theories, volume 890 of LNA1, pages 1–39. Springer-Verlag, 1995.
C. Zhang, M. Winslett, and P. A. Bonatti. Peeraccess: A logic for distributed authorization. In 12th ACM Conference on Computer and Communication Security (CCS 2005), Alexandria, VA, USA, nov 2005. ACM Press.
P. Zimmerman. PGP User’s Guide. MIT Press, 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Antoniou, G., Baldoni, M., Bonatti, P.A., Nejdl, W., Olmedilla, D. (2007). Rule-based Policy Specification. In: Yu, T., Jajodia, S. (eds) Secure Data Management in Decentralized Systems. Advances in Information Security, vol 33. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-27696-0_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-27696-0_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-27694-6
Online ISBN: 978-0-387-27696-0
eBook Packages: Computer ScienceComputer Science (R0)