IIT Home Page CNR Home Page

A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints

We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In particular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with access control policies and credentials. In this way, we can associate the level of preference defined by the ?softness? of the constraint with a ?level? of trust. The main benefit comes during the process of automated access authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.


LECTURE NOTES IN COMPUTER SCIENCE, 2010

Autori IIT:

Stefano Bistarelli

Foto di Stefano Bistarelli

Francesco Santini

Foto di Francesco Santini

Tipo: Articoli su riviste non ISI con referee internazionali
Area di disciplina: Information Technology and Communication Systems
In: ATC 2010 - 7th International Conference on Autonomic and Trusted Computing (China, 26-29 October 2010). Proceedings, pp. 268 - 282. (Lecture Notes in Computer Science, vol. 6407). Springer, 2010. Da pagina 268 a pagina 282

Attività: Sicurezza di dispositivi mobili