Nothing Special   »   [go: up one dir, main page]

Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 33))

Abstract

For a long time, logic programming and rule-based reasoning have been proposed as a basis for policy specification languages. However, the term “policy” has not been given a unique meaning. In fact, it is used in the literature in a broad sense that encompasses the following notions:

  • Security Policies pose constraints on the behaviour of a system. They are typically used to control permissions of users/groups while accessing resources and services.

  • Trust Management policy languages are used to collect user properties in open environments, where the set of potential users spans over the entire web.

  • Action Languages are used in reactive policy specification to execute actions like event logging, notifications, etc. Authorizations that involve actions and side effects are sometimes called provisional.

  • Business Rules are “statements about how a business is done” [25] and are used to formalize and automatize business decisions as well as for efficiency reasons. They can be formulated as reaction rules, derivation rules, and integrity constraints [142],[147].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. A. Adi, Z. Sommer, A. Biger, S. Ross-Talbot, and G. Wagner. Reactive ruleml, http://groups.yahoo.com/group/reactive-ruleml/, 2004.

    Google Scholar 

  2. J. Alferes and L. Pereira. Reasoning with logic programming, volume 1111 of LNAI. Springer-Verlag, 1996.

    Google Scholar 

  3. G. Antoniou. Nonmonotonic Reasoning. The MIT Press, 1997.

    Google Scholar 

  4. G. Antoniou, D. Billington, G. Govematori, and M. Maher. Representation results for defeasible logic. ACM Transactions on Computational Logic, 2:255–287, 2001.

    Article  MathSciNet  Google Scholar 

  5. G. Antoniou, D. Billington, and M. Maher. On the analysis of regulations using defeasible rules. In Proc. of HICSS’99, 1999.

    Google Scholar 

  6. K. R. Apt, H. A. Blair, and A. Walker. Towards a theory of declarative knowledge. In Foundations of Deductive Databases and Logic Programming., pages 89–148. Morgan Kaufmann, 1988.

    Google Scholar 

  7. K. Arisha, T. Eiter, S. Kraus, F. Ozcan, R. Ross, and V. Subrahmanian. IMPACT: a platform for collaborating agents. IEEE Intelligent Systems, 14(2):64–72, 1999.

    Article  Google Scholar 

  8. M. Baldoni. Normal Multimodal Logics with Interaction Axioms. In D. Basin, M. D’Agostino, D. M. Gabbay, S. Matthews, and L. Viganò, editors, Labelled Deduction, volume 17 of Applied Logic Series, pages 33–53. Applied Logic Series, Kluwer Academic Publisher, 2000.

    Google Scholar 

  9. M. Baldoni, C. Baroglio, L. Giordano, A. Martelli, and V. Patti. Reasoning about communicating agents in the semantic web. In F. Bry, N. Henze, and J. Maluszynski, editors, Proc. of the 1st International Workshop on Principle and Practice of Semantic Web Reasoning, PPSWR 2003, volume 2901 of LNCS, pages 84–98, Mumbai, India, December 2003. Springer.

    Google Scholar 

  10. M. Baldoni, C. Baroglio, A. Martelli, and V. Patti. Reasoning about self and others: communicating agents in a modal action logic. In Proc. of ICTCS’2003, volume 2841 of LNCS, pages 228–241. Springer, 2003.

    MathSciNet  Google Scholar 

  11. M. Baldoni, C. Baroglio, A. Martelli, and V. Patti. Reasoning about interaction protocols for web service composition. In M. Bravetti and G. Zavattaro, editors, Proc. of 1st Int. Workshop on Web Services and Formal Methods, WS-FM 2004, volume 105 of Electronic Notes in Theoretical Computer Science, pages 21–36. Elsevier Science Direct, 2004.

    Google Scholar 

  12. M. Baldoni, C. Baroglio, A. Martelli, and V. Patti. Verification of protocol conformance and agent interoperability. In F. Toni and P. Torroni, editors, Proc. of Sixth International Workshop on Computational Logic in Multi-Agent Systems, CLIMA VI, London, UK, June 2005.

    Google Scholar 

  13. M. Baldoni, C. Baroglio, A. Martelli, V. Patti, and C. Schifanella. Verifying protocol conformance for logic-based communicating agents. In J. Leite and P. Torroni, editors, Post Proc. of Fifth International Workshop on Computational Logic in Multi-Agent Systems, CLIMA V, LNAI. Springer, 2005.

    Google Scholar 

  14. M. Baldoni, C. Baroglio, and V Patti. Web-based adaptive tutoring: an approach based on logic agents and reasoning about actions. Artificial Intelligence Review, 22(1):3–39, 2004.

    Article  MATH  Google Scholar 

  15. M. Baldoni, L. Giordano, A. Martelli, and V. Patti. An Abductive Proof Procedure for Reasoning about Actions in Modal Logic Programming. In J. D. et al., editor, Proc. of NMELP’ 96, volume 1216 of LNAI, pages 132–150. Springer-Verlag, 1997.

    MathSciNet  Google Scholar 

  16. M. Baldoni, L. Giordano, A. Martelli, and V. Patti. Programming Rational Agents in a Modal Action Logic. Annals of Mathematics and Artificial Intelligence, Special issue on Logic-Based Agent Implementation, 41(2–4):207–257, 2004.

    MATH  MathSciNet  Google Scholar 

  17. C. Baral. Reasoning about actions: non-deterministic effects, constraints, and qualification. In Proc of IJCAI’95, pages 2017–2023, 1995.

    Google Scholar 

  18. C. Baral. Knowledge representation, reasoning and declarative problem solving. Cambridge University Press, Cambridge, 2003.

    MATH  Google Scholar 

  19. C. Baral and M. Gelfond. Reasoning about effects of concurrent actions. Journal of Logic Programming, 31(1–3):85–117, May 1997.

    Article  MATH  MathSciNet  Google Scholar 

  20. C. Baral and T. C. Son. Formalizing Sensing Actions-A transition function based approach. Artificial Intelligence, 125(1–2):19–91, January 2001.

    MATH  MathSciNet  Google Scholar 

  21. J. Basney, W. Nejdl, D. Olmedilla, V. Welch, and M. Winslett. Negotiating trust on the grid. In 2nd WWW Workshop on Semantics in P2P and Grid Computing, New York, USA, may 2004.

    Google Scholar 

  22. N. Bassiliades, G. Antoniou, and I. Vlahavas. DR-DEVICE: A defeasible logic system for the semantic web. In Proc. 2nd International Workshop on Principles and Practice of Semantic Web Reasoning, LNCS. Springer Verlag, 2004.

    Google Scholar 

  23. M. Y. Becker and P. Sewell. Cassandra: distributed access control policies with tunable expressiveness. In 5th IEEE International Workshop on Policies for Distributed Systems and Networks, Yorktown Heights, June 2004.

    Google Scholar 

  24. M. Y. Becker and P. Sewell. Cassandra: flexible trust management, applied to electronic health records. In 17th IEEE Computer Security Foundations Workshop, Pacific Grove, CA, June 2004.

    Google Scholar 

  25. J. Bell, D. Brooks, E. Goldbloom, R. Sarro, and J. Wood. Knowledge representation, reasoning and declarative problem solving. Technical report, US West Information Technologies Group, Bellevue Golden, 1990.

    Google Scholar 

  26. J. Bentahar, B. Moulin, J. J. C. Meyer, and B. Chaib-Draa. A computational model for conversation policies for agent communication. In J. Leite and P. Torroni, editors, Pre-Proc. of CLIMA V, pages 66–81, Lisbon, Portugal, September 2004.

    Google Scholar 

  27. B. Berard, M. Bidoit, A. Finkel, F. Laroussinie, A. Petit, L. Petrucci, and P. Schnoebelen. Systems and Software Verification. Model-Checking Techniques and Tools. Springer, 2001.

    Google Scholar 

  28. E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM TODS, 23(3), 1998.

    Google Scholar 

  29. E. Bertino, P. Bonatti, and E. Ferrari. Trbac: A temporal role-based access control model. ACM Trans. on Information and System Security, 4(3): 191–223, 2001.

    Article  Google Scholar 

  30. E. Bertino, P. A. Bonatti, E. Ferrari, and M. L. Sapino. Temporal authorization bases: From specification to integration. Journal of Computer Security, 8(4), 2000.

    Google Scholar 

  31. E. Bertino, E. Ferrari, F. Buccafurri, and P. Rullo. A logical framework for reasoning on data access control policies. In Proc. of the 12th IEEE Computer Security Foundations Workshop (CSFW’99), pages 175–189. IEEE Computer Society, 1999.

    Google Scholar 

  32. D. Billington, K. de Coester, and D. Nute. A modular translation from defeasible nts to defeasible logics. Journal of Experimental and Theoretical Artificial Intelligence, pages 151–177, 1990.

    Google Scholar 

  33. M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote Trust Management System Version 2. In Internet Draft RFC 2704, Sept. 1999.

    Google Scholar 

  34. M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The role of trust manage-ment in distributed systems security. Lecture Notes in Computer Science, 1603:185–210, 1999.

    Article  Google Scholar 

  35. M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust Management for Public-Key Infrastructures. In Security Protocols Workshop, Cambridge, UK, 1998.

    Google Scholar 

  36. M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In IEEE Symposium on Security and Privacy, Oakland, CA, May 1996.

    Google Scholar 

  37. M. Blaze, J. Feigenbaum, and M. Strauss. Compliance Checking in the PolicyMaker Trust Management System. In Financial Cryptography, British West Indies, Feb. 1998.

    Google Scholar 

  38. H. Boley, B. Grosof, M. Sintek, S. Tabet, and G. Wagner. Object-Oriented RuleML, version 0.85 of 15 march 2004, http://www.ruleml.org/indoo, 2004.

    Google Scholar 

  39. H. Boley, S. Tabet, and G. Wagner. Design rationale of RuleML: A markup language for semantic web rules. In International Semantic Web Working Symposium (SWWS), 2001.

    Google Scholar 

  40. P. Bonatti and P. Samarati. Regulating service access and information release on the web. In CCS’00: Proceedings of the 7th ACM conference on computer and communications security, pages 134–143. ACM Press, 2000.

    Google Scholar 

  41. P. A. Bonatti, C. Duma, D. Olmedilla, and N. Shahmehri. An integration of reputation-based and policy-based trust management. In Semantic Web Policy Workshop in con-junction with 4th International Semantic Web Conference, Galway, Ireland, nov 2005.

    Google Scholar 

  42. P. A. Bonatti and D. Olmedilla. Driving and monitoring provisional trust negotiation with metapolicies. In 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), pages 14–23, Stockholm, Sweden, jun 2005. IEEE Computer Society.

    Google Scholar 

  43. P. A. Bonatti, D. Olmedilla, and J. Peer. Advanced policy queries. Project Deliverable D4, Working Group I2, EU NoE REWERSE, Sept. 2005.

    Google Scholar 

  44. P. Bretier and D. Sadek. A rational agent as the kernel of a cooperative spoken dialogue system: implementing a logical theory of interaction. In J. Müller, M. Wooldridge, and N. Jennings, editors, Intelligent Agents III, proc. of ECAI-96 Workshop on Agent Theories, Architectures, and Languages (ATAL-96), volume 1193 of LNAI. Springer-Verlag, 1997.

    Google Scholar 

  45. D. F. C. Brewer and M. J. Nash. The Chinese wall security policy. In IEEE Symposium on Security and Privacy, pages 206–214, 1989.

    Google Scholar 

  46. L. Brownston, R. Farrell, E. Kant, and N. Martin. Programming expert systems in OPS5: an introduction to rule-based programming. Addison-Wesley Series In Artificial Intelligence. Addison-Wesley, 1985.

    Google Scholar 

  47. J. Bubenko, D. Brash, and J. Stirna. Ekd-enterprise knowledge development user guide, 1998.

    Google Scholar 

  48. M. Castilho, O. Gasquet, and A. Herzig. Modal tableaux for reasoning about actions and plans. In S. Steel, editor, Proc. ECP’97, LNAI, pages 119–130, 1997.

    Google Scholar 

  49. S. Ceri, G. Gottlob, and L. Tanca. Logic programming and databases. In Surveys in Computer Science, Berlin, Heidelberg, New York, 1990. Springer-Verlag.

    Google Scholar 

  50. S. Chakravarthy, E. Anwar, L. Maugis, and D. Mishra. Design of Sentinel: An object-oriented DBMS with event-based rules. Information and Software Technology, 9:559–568, 1994.

    Google Scholar 

  51. J. Chomicki, J. Lobo, and S. Naqvi. A logic programming approach to conflict resolution in policy management. In Proc. of the Seventh International Conference on Principles of Knowledge Representation and Reasoning (KR 2000), pages 121–132. Morgan Kaufmann, 2000.

    Google Scholar 

  52. Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. REFEREE: Trust management for Web applications. World Wide Web Journal, 2:127–139, 1997.

    Google Scholar 

  53. A. Ciampolini, E. Lamma, P. Mello, and P. Torroni. Expressing collaboration and com-petition among abductive logic agents. In K. Satoh and F. Sadri, editors, CL-2000 Workshop on Computational Logic in Multi-Agent Systems (CLIMA-00), 2000.

    Google Scholar 

  54. D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in spki/sdsi. Journal of Computer Security, 9(4):285–322, 2001.

    Google Scholar 

  55. E. Clarke, O. Grumberg, and D. Peled. Model Checking. MIT Press, 2000.

    Google Scholar 

  56. P. Cohen and H. Levesque. Intention is choice with commitment. Artificial Intelligence, 42:213–261, 1990.

    Article  MathSciNet  MATH  Google Scholar 

  57. N. Damianou, N. Dulay, E. Lupu, and M. Sloman. Ponder: A language for specifying security and management policies for distributed systems. Technical report, Imperial College, October 2000.

    Google Scholar 

  58. C. Date. An Introduction to Database Systems. Addison-Wesley, 1995.

    Google Scholar 

  59. U. Dayal, B. Blaustein, A. Buchmann, and S. Chakravarthy. The HiPAC project: Combining active databases and timing constraints. In ACM SIGMOD, pages 51–70, 1988.

    Google Scholar 

  60. G. De Giacomo and M. Lenzerini. PDL-based framework for reasoning about actions. In Proc. of AI*IA’ 95, volume 992 of LNAI, pages 103–114, 1995.

    Google Scholar 

  61. G. De Giacomo, Y. Lespérance, and H. J. Levesque. Reasoning about concurrent execution, prioritized interrupts, and exogenous actions in the situation calculus. In Proceed-ings of IJCAI’97, pages 1221–1226, Nagoya, August 1997.

    Google Scholar 

  62. G. De Giacomo and H. J. Levesque. An Incremental Interpreter for High-Level Programs with Sensing. In Proceedings of the AAAI 1998 Fall Symposium on Cognitive Robotics, Orlando, Florida, USA, October 1998.

    Google Scholar 

  63. O. Diaz, N. Paton, and P. Gray. Rule management in object oriented databases: A uniform approach. In Seventeenth International Conference on Very Large Data Bases, Barcelona, Spain, 1991.

    Google Scholar 

  64. J. Dietrich. The mandarax manual, http://mandarax.sourceforge.net/docs/mandarax.pdf, 2003.

    Google Scholar 

  65. T. Eiter, N. Leone, C. Mateis, G. Pfeifer, and F. Scarcello. A deductive system for non-monotonic reasoning. In Logic Programming and Nonmonotonic Reasoning, 4th Inter-national Conference, LPNMR’97, volume 1265 of Lecture Notes in Computer Science, pages 364–375. Springer, 1997.

    Google Scholar 

  66. U. Endriss, N. Maudet, F. Sadri, and F. Toni. Logic-based agent communication protocols. In F. Dignum, editor, Advances in agent communication languages, volume 2922 of Lecture Notes in Artificial Intelligence (LNAI), pages 91–107. Springer-Verlag, 2004.

    Google Scholar 

  67. FIPA. FIPA 2000. Technical report, FIPA (Foundation for Intelligent Physical Agents), November 2000.

    Google Scholar 

  68. M. Fisher. A survey of concurrent metatem-the language and its applications. In D. Gabbay and H. Ohlbach, editors, Proc. of the First International Conference on Temporal Logic, ICTL’94, volume 827 of LNAI, pages 480–505. Springer-Verlag, July 1994.

    Google Scholar 

  69. C. L. Forgy. RETE: A fast algorithm for the many pattern/many object pattern matching problem. Artificial Intelligence, 19:17–37, 1982.

    Article  Google Scholar 

  70. E. Friedman-Hill. Jess in Action. Manning Publications Co., 2003.

    Google Scholar 

  71. J. Galbraith. Organization Design. Addison-Wesley, 1997.

    Google Scholar 

  72. R. Gavriloaie, W. Nejdl, D. Olmedilla, K. E. Seamons, and M. Winslett. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In 1st European Semantic Web Symposium (ESWS 2004), volume 3053 of Lecture Notes in Computer Science, pages 342–356, Heraklion, Crete, Greece, may 2004. Springer.

    Google Scholar 

  73. M. Gelfond and V. Lifschitz. The stable model semantics for logic programming. In Proc. of the 5th ICLP, pages 1070–1080. MIT Press, 1988.

    Google Scholar 

  74. M. Gelfond and V. Lifschitz. Representing action and change by logic programs. Journal of Logic Programming, 17:301–321, 1993.

    Article  MATH  MathSciNet  Google Scholar 

  75. G. D. Giacomo, Y. Lespérance, H. J. Levesque, and S. Sardina. On the semantic of deliberation in Indigolog: from theory to implementation. In Proc. of KR 2002, pages 603–614. Academic Press, 2002.

    Google Scholar 

  76. J. Giarratano and G. Riley. Expert Systems: Principles and Programming, 3rd Edition. PWS Publishing Co., Boston, MA, USA, 1998.

    Google Scholar 

  77. L. Giordano, A. Martelli, and C. Schwind. Dealing with concurrent actions in modal action logic. In Proc. ECAI-98, pages 537–541, 1998.

    Google Scholar 

  78. L. Giordano, A. Martelli, and C. Schwind. Verifying communicating agents by model checking in a temporal action logic. In JELIA’ 04, volume 3229 of LNAI, pages 57–69, Lisbon, Portugal, 2004. Springer-Verlag.

    MathSciNet  Google Scholar 

  79. E. Giunchiglia, G. N. Kartha, and V. Lifschitz. Representing actions: indeterminacy and ramifications. Artificial Intelligence, 95:409–443, 1997.

    Article  MATH  MathSciNet  Google Scholar 

  80. D. Gollman. Analysing security protocols. In A. E. Abdallah, P. Ryan,, and S. Schneider, editors, Proc. of FASec 2002, volume 2629 of LNCS, pages 71–80. Springer-Verlag, 2003.

    Google Scholar 

  81. L. Gong. Inside Java 2 Platform Security: Architecture, API Design, and Implementation. Addison-Wesley, 1999.

    Google Scholar 

  82. B. Grosof. Prioritized conflict handling for logic programs. In International Symposium on Logic Programming (ILPS-97, 1997.

    Google Scholar 

  83. B. Grosof. Representing e-business rules for the semantic web: Situated courteous logic programs in RuleML. In Proceedings of the Workshop on Information Technologies and Systems (WITS), New Orleans, LA, USA, Dec. 2001.

    Google Scholar 

  84. B. Grosof, M. Gandhe, and T. Finin. Sweetjess: Translating damlruleml to jess. In International Workshop on Rule Markup Languages for Business Rules on the Semantic Web, held in conjunction with the First International Semantic Web Conference (ISWC-2002), 2002.

    Google Scholar 

  85. B. Grosof and T. Poon. SweetDeal: Representing agent contracts with exceptions using XML rules, ontologies, and process descriptions. In Proceedings of the 12th World Wide Web Conference, Budapest, Hungary, May 2003.

    Google Scholar 

  86. A. Gupta, I. S. Mumick, and V. S. Subrahmanian. Maintaining views incrementally. In S1GMOD Conference, pages 157–166, 1993.

    Google Scholar 

  87. E. Hanson. Rule condition testing and action execution in ariel, 1992.

    Google Scholar 

  88. D. Hay and K. Healy. Defining business rules — what are they really?, 2000.

    Google Scholar 

  89. G. Holzmann. Description and Validation of Computer Protocols. Prentice Hall, 1992.

    Google Scholar 

  90. G. J. Holzmann. The model checker spin. IEEE Trans. Software Eng., 23(5):279–295, 1997.

    Article  MathSciNet  Google Scholar 

  91. I. Horrocks and P. Patel-Schneider. A proposal for an owl rules language. http://www.cs.man.ac.uk/horrocks/DAML/Rules/, Oct. 2003.

    Google Scholar 

  92. I. Horrocks, P. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and M. Dean. A semantic web rule language combining OWL and RuleML, version 0.5 of 19 november 2003, http://www.daml.org/2003/11/swrl/, 2003.

    Google Scholar 

  93. H. Huget, editor. Communication in Multiagent Systems, volume 2650 of LNAI. Springer, 2003.

    Google Scholar 

  94. ILOG web site, http://www.ilog.com, 2004.

    Google Scholar 

  95. R. Initiative. The Rule Markup Initiative Web Site, http://ruleml.org/, 2004.

    Google Scholar 

  96. International Telecommunication Union. Rec. X.509-Information Technology-Open Systems Interconnection-The Directory: Authentication Framework, Aug. 1997.

    Google Scholar 

  97. S. Jajodia, P. Samarati, M. Sapino, and V Subrahmanian. Flexible supporting for multiple access control policies. ACM Transactions on Database Systems, 26(2):214–260, 2001.

    Article  MATH  Google Scholar 

  98. T. Jim. SD3: A Trust Management System With Certified Evaluation. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2001.

    Google Scholar 

  99. G. Karjoth, M. Schunter, and M. Waidner. The platform for enterprise privacy practices-privacyenabled management of customer data, 2002.

    Google Scholar 

  100. G. N. Kartha and V. Lifschitz. Actions with Indirect Effects (Preliminary Report). In Proc. of the KR’94, 1994.

    Google Scholar 

  101. R. Kowalski and M. Sergot. A Logic-based Calculus of Events. New Generation of Computing, 4:67–95, 1986.

    Google Scholar 

  102. N. Leone and P. Rullo. Ordered logic programming with sets. J. Log. Comput., 3(6):621–642, 1993.

    Article  MATH  MathSciNet  Google Scholar 

  103. H. J. Levesque, R. Reiter, Y. Lespérance, F. Lin, and R. B. Scherl. GOLOG: A Logic Programming Language for Dynamic Domains. J. of Logic Programming, 31:59–83, 1997.

    Article  MATH  Google Scholar 

  104. N. Li and J. Mitchell. RT: A Role-based Trust-management Framework. In DARPA Information Survivability Conference and Exposition (DISCEX), Washington, D.C., Apr. 2003.

    Google Scholar 

  105. N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust-management framework. In SP’ 02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, page 114. IEEE Computer Society, 2002.

    Google Scholar 

  106. N. Li, W. Winsborough, and J. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35–86, Feb. 2003.

    Google Scholar 

  107. J. Lloyd. Logic Programming. Springer Verlag, 1984.

    Google Scholar 

  108. J. Lobo, R. Bhatia, and S. Naqvi. A policy description language. In Proc. of the 16th National Conference on Artificial Intelligence (AAAI’99), pages 291–298. AAAI Press, 1999.

    Google Scholar 

  109. J. Lobo, G. Mendez, and S. R. Taylor. Adding Knowledge to the Action Description Language A. In Proc. of AAAI’97/IAAI’97, pages 454–459, Menlo Park, 1997.

    Google Scholar 

  110. J. J. Lu, G. Moerkotte, J. Schü, and V. S. Subrahmanian. Efficient maintenance of materialized mediated views. In SIGMOD Conference, pages 340–351, 1995.

    Google Scholar 

  111. A. Mamdani and J. Pitt. Communication protocols in multi-agent systems: A development method and reference architecture. In Issues in Agent Communication, volume 1916 of LNCS, pages 160–177. Springer, 2000.

    Article  Google Scholar 

  112. V. Marek and M. Truszczynski. Nonmonotonic Reasoning. Springer Verlag, 1993.

    Google Scholar 

  113. J. McCarthy and P. Hayes. Some, Philosophical Problems from the Standpoint of Artificial Intelligence. Machine Intelligence, 4:463–502, 1963.

    Google Scholar 

  114. S. McIlraith and T. Son. Adapting Golog for composition of semantic web services. In Proceedings of the Eighth International Conference on Knowledge Representation and Reasoning (KR2002), pages 482–493, Trento, Italy, 2002.

    Google Scholar 

  115. S. McIlraith, T. Son, and H. Zeng. Semantic web services. IEEE Intelligent Systems. Special Issue on the Semantic Web, 16(2):46–53, 2001.

    Google Scholar 

  116. N. Minsky and D. Rozenshtein. A software development environment for law-governed systems. In ACM SIGSOFT/SIGPLAN Software Engineering Symposium on Practical Software Development Environments (SDE’88). P.B. Henderson (ed.), 1988.

    Google Scholar 

  117. N. Minsky and V. Ungureanu. A mechanism for establishing policies for electronic commerce. In Proc. of the 18th International Conference on Distributed Computing Systems (ICDCS 1998), pages 322–331. IEEE Computer Society, 1998.

    Google Scholar 

  118. D. Miranker. Treat: A better match algorithm for ai production systems. In Proceedings of the National Conference on Artificial Intelligence, American Association for Artificial Intelligence, pages 42–47, 1987.

    Google Scholar 

  119. W. Nejdl, D. Olmedilla, and M. Winslett. Peertrust: Automated trust negotiation for peers on the semantic web. In VLDB Workshop on Secure Data Management (SDM), volume 3178 of Lecture Notes in Computer Science, pages 118–132, Toronto, Canada, aug 2004. Springer.

    Google Scholar 

  120. I. Niemelä and P. Simons. Smodels-an implementation of the stable model and well-founded semantics for normal 1p. In Logic Programming and Nonmonotonic Reasoning, 4th International Conference, LPNMR’97, volume 1265 of Lecture Notes in Computer Science, pages 421–430. Springer, 1997.

    Google Scholar 

  121. D. Nute. Handbook of Logic for Artificial Intelligence and Logic Programming, Vol. III, chapter Defeasible logic, pages 353–395. Oxford University Press, 1994.

    MathSciNet  Google Scholar 

  122. extensible access control markup language (XACML) version 2.0. oasis standard, feb 2005.

    Google Scholar 

  123. D. Olmedilla, R. Lara, A. Polleres, and H. Lausen. Trust negotiation for semantic web services. In 1st International Workshop on Semantic Web Services and Web Process Composition (SWSWPC), volume 3387 of Lecture Notes in Computer Science, pages 81–95, San Diego, CA, USA, jul 2004. Springer.

    Google Scholar 

  124. L. Palopoli and C. Zaniolo. Polynomial-time computable stable models. Ann. Math. Artif. Inteli., 17(3–4):261–290, 1996.

    Article  MATH  MathSciNet  Google Scholar 

  125. L. R. Pokorny and C. R. Ramakrishnan. Modeling and verification of distributed autonomous agents using logic programming. In Pre-Proceedings of the Workshop on Declarative Agent Languages and Technologies (DALT’04), pages 172–187, 2004.

    Google Scholar 

  126. A. Rao and M. Georgeff. Modeling rational agents whithin a bdi-architecture. In Proceedings of KR’91, pages 473–484, 1991.

    Google Scholar 

  127. R. Reiter. A logic for default reasoning. Artificial Intelligence, 13:81–132, 1980.

    Article  MATH  MathSciNet  Google Scholar 

  128. P. Resnick and J. Miller. PICS: Internet access controls without censorship. Communications of the ACM, 39(10):87–93, Oct. 1996.

    Article  Google Scholar 

  129. G. Riley. Clips-a tool for building expert systems, web site, http://www.ghg.net/clips/clips.html, 2004.

    Google Scholar 

  130. T. Ryutov and C. Neuman. The Specification and Enforcement of Advanced Security Policies. In Proc. of the Conference on Policies for Distributed Systems and Networks, POLICY 2002, Monterey, California, June 5–7 2002.

    Google Scholar 

  131. T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons. Adaptive trust negotiation and access control. In SACMAT’ 05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 139–146, New York, NY, USA, 2005. ACM Press.

    Google Scholar 

  132. D. Saccà and C. Zaniolo. Stable models and non-determinism in logic programs with negation. In Proc. of the Ninth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS’90), pages 205–217, 1990.

    Google Scholar 

  133. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38–47, 1996.

    Google Scholar 

  134. T. Schaub and K. Wang. A semantic framework for preference handling in answer set programming. Logic Programming Theory and Practice, 3:569–607, 2003.

    Article  MATH  MathSciNet  Google Scholar 

  135. J. Schmidt. Planvolle steuerung gesellschaftlichen handelns. Verlag für Sozialwissenschaften, 1983.

    Google Scholar 

  136. C. B. Schwind. A logic based framework for action theories. In J. Ginzburg et al., editor, Language, Logic and Computation, pages 275–291. CSLI, 1997.

    Google Scholar 

  137. K. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu. Requirements for policy languages for trust negotiation. In Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY’02), Monterey, CA, June 2002. IEEE Computer Society.

    Google Scholar 

  138. K. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu. Requirements for policy languages for trust negotiation, 2002.

    Google Scholar 

  139. M. P. Singh. A social semantics for agent communication languages. In Proc. of IJCAI-98 Workshop on Agent Communication Languages, Berlin, 2000. Springer.

    Google Scholar 

  140. S. Staab, B. K. Bhargava, L. Lilien, A. Rosenthal, M. Winslett, M. Sloman, T. S. Dillon, E. Chang, F. K. Hussain, W. Nejdl, D. Olmedilla, and V. Kashyap. The pudding of trust. IEEE Intelligent Systems, 19(5):74–88, 2004.

    Article  Google Scholar 

  141. M. Stonebraker, E. Hanson, and C. Hong. The design of the postgres rule system. In 3rd International IEEE Conference on Data Science, 1987.

    Google Scholar 

  142. K. Taveter and G. Wagner. Agent-oriented enterprise modeling based on business rules. In ER’ 01: Proceedings of the 20th International Conference on Conceptual Modeling, pages 527–540. Springer-Verlag, 2001.

    Google Scholar 

  143. D. Toman, J. Chomicki, and D. S. Rogers. Datalog with integer periodicity constraints. In SLP, pages 189–203, 1994.

    Google Scholar 

  144. A. Uszok, J. M. Bradshaw, and R. Jeffers. Kaos: A policy and domain services frame-work for grid computing and semantic web services. In Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29–April 1, 2004, Proceedings, volume 2995 of Lecture Notes in Computer Science, pages 16–26. Springer, 2004.

    Google Scholar 

  145. F. van Assche. Information systems developement: a rule-based approach. Knowledge-based Systems, 4:227–234, 1988.

    Article  Google Scholar 

  146. M. van Emden and R. A. Kowalski. The semantics of predicate logic as a programming language. Journal of the ACM, 23(4), 1976.

    Google Scholar 

  147. G. Wagner. How to design a general rule markup language? In XML Technologien für das Semantic Web-XSW 2002, Proceedings zum Workshop, pages 19–37. GI, 2002.

    Google Scholar 

  148. G. Wagner, S. Tabet, and H. Boley. MOF-RuleML: The abstract syntax of RuleML as a MOF model. In Integrate 2003, 2003.

    Google Scholar 

  149. C. Walton. Model checking agent dialogues. In Proceedings of the Workshop on Declarative Agent Languages and Technologies (DALT’04), volume 3476 of LNA1. Springer-Verlag, 2005.

    Google Scholar 

  150. J. Widom and S. Ceri. Active Database Systems: triggers and rules for advanced database processing. Morgan Kaufmann Publishers Inc., 1996.

    Google Scholar 

  151. T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2–3):107–136, 1993.

    Google Scholar 

  152. M. Wooldridge and N. R. Jennings. Agent Theories, Architectures, and Languages: A survey. In Proc. of the ECAI-94 Workshop on Agent Theories, volume 890 of LNA1, pages 1–39. Springer-Verlag, 1995.

    Google Scholar 

  153. C. Zhang, M. Winslett, and P. A. Bonatti. Peeraccess: A logic for distributed authorization. In 12th ACM Conference on Computer and Communication Security (CCS 2005), Alexandria, VA, USA, nov 2005. ACM Press.

    Google Scholar 

  154. P. Zimmerman. PGP User’s Guide. MIT Press, 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Antoniou, G., Baldoni, M., Bonatti, P.A., Nejdl, W., Olmedilla, D. (2007). Rule-based Policy Specification. In: Yu, T., Jajodia, S. (eds) Secure Data Management in Decentralized Systems. Advances in Information Security, vol 33. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-27696-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-27696-0_6

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-27694-6

  • Online ISBN: 978-0-387-27696-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics