Abstract
In this paper we describe an implementation for mobile phones of two important services in logical reasoning, that is deduction and abduction, defined over a set of weighted credentials. The main benefit comes during the process of automated access authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the access. We implement a negotiation of credentials between two mobile devices in order to grant the access to the requestor peer, with the use of deduction/abduction services.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
S. Bistarelli. Semirings for Soft Constraint Solving and Programming, volume 2962 of LNCS. Springer, 2004.
S. Bistarelli, F. Martinelli, and F. Santini. A semantic foundation for trust management languages with weights: An application to the RT family. In Autonomic and Trusted Computing, 5th International Conference, volume 5060 of LNCS, pages 481–495. Springer, 2008.
S. Bistarelli, F. Martinelli, and F. Santini. Weighted datalog and levels of trust. In ARES: Conference on Availability, Reliability and Security, pages 1128–1134. IEEE Computer Society, 2008.
S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based constraint satisfaction and optimization. J. ACM, 44(2):201–236, 1997.
Stefano Bistarelli, Fabio Martinelli, and Francesco Santini. A formal framework for trust policy negotiation in autonomic systems: Abduction with soft constraints. In ATC, pages 268–282, 2010.
H. Christiansen and V. Dahl. Hyprolog: A new logic programming language with assumptions and abduction. In Logic Programming, 21st International Conference, ICLP 2005, volume 3668, pages 159–173. Springer, 2005.
T. W. Fruithwirth. Constraint handling rules. In Selected Papers from Constraint Programming, pages 90–107, London, UK, 1995. Springer-Verlag.
A. C. Kakas. ACLP: Integrating abduction and constraint solving. CoRR, cs.AI/0003020, 2000.
H. Koshutanski and F. Massacci. A negotiation scheme for access rights establishment in autonomic communication. J. Network Syst. Manage., 15(1):117–136, 2007.
N. Li, J. C. Mitchell, and W. H. Winsborough. Design of a role-based trust management framework. In SP’02: Proc. of Security and Privacy, pages 114–130. IEEE Computer Society, 2002.
M. J. Maher. Abduction of linear arithmetic constraints. In In ICLP’05: Conf. on Logic Programming, volume 3668, pages 174–188. Springer, 2005.
M. J. Maher and G. Huang. On computing constraint abduction answers. In Logic for Programming, Artificial Intelligence, and Reasoning, volume 5330 of LNCS, pages 421–435. Springer, 2008.
T. Menzies. Applications of abduction: knowledge-level modelling. Int. J. Hum.-Comput. Stud., 45(3):305–335, 1996.
C. Ribeiro, A. Zuquete, P. Ferreira, and P. Guedes. Security policy consistency. CoRR, cs. LO/0006045, 2000.
Acknowledgments
We would like to thank the anonymous reviewers for their helpful comments. Work partially supported by the FP7 EU projects CONNECT and NESSoS. Research partially supported also by MIUR PRIN 20089M932N project: “Innovative and multi-disciplinary approaches for constraint and preference reasoning”, by CCOS FLOSS project “Software open source per la gestione dell’epigrafia dei corpus di lingue antiche”, and by INDAM GNCS project “Fairness, Equita` e Linguaggi”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bistarelli, S., Martinelli, F., Roperti, F., Santini, F. (2012). Negotiation of Weighted RTML Credentials on Mobile Devices. In: De Marco, M., Te'eni, D., Albano, V., Za, S. (eds) Information Systems: Crossroads for Organization, Management, Accounting and Engineering. Physica, Heidelberg. https://doi.org/10.1007/978-3-7908-2789-7_47
Download citation
DOI: https://doi.org/10.1007/978-3-7908-2789-7_47
Published:
Publisher Name: Physica, Heidelberg
Print ISBN: 978-3-7908-2788-0
Online ISBN: 978-3-7908-2789-7
eBook Packages: Business and EconomicsBusiness and Management (R0)