Skip to main content

Negotiation of Weighted RTML Credentials on Mobile Devices

  • Conference paper
  • First Online:

Abstract

In this paper we describe an implementation for mobile phones of two important services in logical reasoning, that is deduction and abduction, defined over a set of weighted credentials. The main benefit comes during the process of automated access authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the access. We implement a negotiation of credentials between two mobile devices in order to grant the access to the requestor peer, with the use of deduction/abduction services.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. S. Bistarelli. Semirings for Soft Constraint Solving and Programming, volume 2962 of LNCS. Springer, 2004.

    Google Scholar 

  2. S. Bistarelli, F. Martinelli, and F. Santini. A semantic foundation for trust management languages with weights: An application to the RT family. In Autonomic and Trusted Computing, 5th International Conference, volume 5060 of LNCS, pages 481–495. Springer, 2008.

    Google Scholar 

  3. S. Bistarelli, F. Martinelli, and F. Santini. Weighted datalog and levels of trust. In ARES: Conference on Availability, Reliability and Security, pages 1128–1134. IEEE Computer Society, 2008.

    Google Scholar 

  4. S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based constraint satisfaction and optimization. J. ACM, 44(2):201–236, 1997.

    Article  Google Scholar 

  5. Stefano Bistarelli, Fabio Martinelli, and Francesco Santini. A formal framework for trust policy negotiation in autonomic systems: Abduction with soft constraints. In ATC, pages 268–282, 2010.

    Google Scholar 

  6. H. Christiansen and V. Dahl. Hyprolog: A new logic programming language with assumptions and abduction. In Logic Programming, 21st International Conference, ICLP 2005, volume 3668, pages 159–173. Springer, 2005.

    Google Scholar 

  7. T. W. Fruithwirth. Constraint handling rules. In Selected Papers from Constraint Programming, pages 90–107, London, UK, 1995. Springer-Verlag.

    Google Scholar 

  8. A. C. Kakas. ACLP: Integrating abduction and constraint solving. CoRR, cs.AI/0003020, 2000.

    Google Scholar 

  9. H. Koshutanski and F. Massacci. A negotiation scheme for access rights establishment in autonomic communication. J. Network Syst. Manage., 15(1):117–136, 2007.

    Article  Google Scholar 

  10. N. Li, J. C. Mitchell, and W. H. Winsborough. Design of a role-based trust management framework. In SP’02: Proc. of Security and Privacy, pages 114–130. IEEE Computer Society, 2002.

    Google Scholar 

  11. M. J. Maher. Abduction of linear arithmetic constraints. In In ICLP’05: Conf. on Logic Programming, volume 3668, pages 174–188. Springer, 2005.

    Google Scholar 

  12. M. J. Maher and G. Huang. On computing constraint abduction answers. In Logic for Programming, Artificial Intelligence, and Reasoning, volume 5330 of LNCS, pages 421–435. Springer, 2008.

    Google Scholar 

  13. T. Menzies. Applications of abduction: knowledge-level modelling. Int. J. Hum.-Comput. Stud., 45(3):305–335, 1996.

    Article  Google Scholar 

  14. C. Ribeiro, A. Zuquete, P. Ferreira, and P. Guedes. Security policy consistency. CoRR, cs. LO/0006045, 2000.

    Google Scholar 

Download references

Acknowledgments

We would like to thank the anonymous reviewers for their helpful comments. Work partially supported by the FP7 EU projects CONNECT and NESSoS. Research partially supported also by MIUR PRIN 20089M932N project: “Innovative and multi-disciplinary approaches for constraint and preference reasoning”, by CCOS FLOSS project “Software open source per la gestione dell’epigrafia dei corpus di lingue antiche”, and by INDAM GNCS project “Fairness, Equita` e Linguaggi”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefano Bistarelli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bistarelli, S., Martinelli, F., Roperti, F., Santini, F. (2012). Negotiation of Weighted RTML Credentials on Mobile Devices. In: De Marco, M., Te'eni, D., Albano, V., Za, S. (eds) Information Systems: Crossroads for Organization, Management, Accounting and Engineering. Physica, Heidelberg. https://doi.org/10.1007/978-3-7908-2789-7_47

Download citation

Publish with us

Policies and ethics