2010
DOI: 10.1007/978-3-642-16576-4_20
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints

Abstract: Abstract. We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In particular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with access control policies and credentials. In this way, we can associate the level of preference defined by the "softness" of the constraint with a "level" of trust. The main benefit comes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…We will draw upon work from trust access control [27], cost associated trust access control [4], and utility [18] in order to build a formal framework for specifying clear controls that prevent wrongful adaptation. Further research into SAAF will also focus on the marriage of SAAF with other technologies that aid in identifying misuse, such as intrusion detection technologies that are capable of analyzing misuse at the resource level.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We will draw upon work from trust access control [27], cost associated trust access control [4], and utility [18] in order to build a formal framework for specifying clear controls that prevent wrongful adaptation. Further research into SAAF will also focus on the marriage of SAAF with other technologies that aid in identifying misuse, such as intrusion detection technologies that are capable of analyzing misuse at the resource level.…”
Section: Resultsmentioning
confidence: 99%
“…Trust PDPs [26] and trust policies [27] also can improve upon traditional authorization. The use of trust policies is a method in which either a group of users or an individual's trust is calculated, for example, based on the attributes they own.…”
Section: Related Workmentioning
confidence: 99%
“…The overall goal of dynamic access control is to reduce human intervention, make access control more responsive to attacks, and more cost effective. Several techniques have been proposed, including, resource usage [57], temporal properties [34], risk [41], and trust [12,65]. For example, in usage control [57] a perception of user activity is maintained over time and evaluated against thresholds of usage (e.g., a staff member may not print more than 100 pages per day), alongside traditional access control rules (e.g., a user must be assigned the role of staff to print).…”
Section: Static and Dynamic Access Controlmentioning
confidence: 99%
“…Definition 1: [Deduction with soft constraints [2], [14]] Given a soft constraint store that represents the current knowledge in terms of credentials ( = ⊗ credentials), and a soft constraint , which represents a request access, if ⊢ then the store entails (i.e., deduces) . The entailment ⊢ (see Section II-A) consequently implements the deduction operator.…”
Section: A Deductionmentioning
confidence: 99%
“…Definition 2: [Abduction with soft constraints [2], [14]] Given a soft constraint store and a soft constraint such that ∕ ⊢ , then the abduction process is aimed at finding a constraint , such that ⊗ ⊢ , i.e., = ⊖ ÷ (see Sec. II-A for the formal definition of ⊖ ÷).…”
Section: B Abductionmentioning
confidence: 99%