IIT Home Page CNR Home Page

Privacy-Preserving Mobility-Casting in Opportunistic Networks

In this paper we show how deductive and abductive reasoning in distributed authorisation can be efficiently ported to Android. Such logical-inference processes prove to be important tools due to the intrinsic autonomic-nature of these mobile devices. Both deduction and abduction are represented by using CHR, a high-level declarative constraint programming-language, and implemented in JCHR (CHR hosted in Java). To represent credentials we elaborate on RT W , a weighted Role-based Trust- management family of languages: CHR programs are developed after such languages. In general, having weights associated with credentials leads to a more informative reasoning; for instance, access can be granted only if the total uncertainty is less than 20%, or we can optimise between 20% and 80% when two (or more) access-paths are selectable using the same set of credentials. 


PST 2014, Toronto, 2014

Autori IIT:

Tipo: Articolo in Atti di convegno internazionale con referee
Area di disciplina: Computer Science & Engineering

Attività: Wireless Network Security