Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks
DOI: 10.1109/policy.2003.1206958
|View full text |Cite
|
Sign up to set email alerts
|

A policy language for a pervasive computing environment

Abstract: In this paper we describe a policy language designed for pervasive computing applications that is based on deontic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
216
0
5

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 321 publications
(221 citation statements)
references
References 16 publications
0
216
0
5
Order By: Relevance
“…Modelling such situations requires defeasible inheritance, i.e., properties transfer to all instances of a class by default, but can be explicitly overridden in special cases (McCarthy, 1986;Horty, 1994;Brewka, 1994;Baader & Hollunder, 1995b). The second application is the use of DLs as security policy languages (Uszok, Bradshaw, Johnson, Jeffers, Tate, Dalton, & Aitken, 2004;Kagal, Finin, & Joshi, 2003;Tonti, Bradshaw, Jeffers, Montanari, Suri, & Uszok, 2003). In formalizing access control policies, one must deal with the situation where a given request is neither explicitly allowed nor explicitly denied.…”
Section: Introductionmentioning
confidence: 99%
“…Modelling such situations requires defeasible inheritance, i.e., properties transfer to all instances of a class by default, but can be explicitly overridden in special cases (McCarthy, 1986;Horty, 1994;Brewka, 1994;Baader & Hollunder, 1995b). The second application is the use of DLs as security policy languages (Uszok, Bradshaw, Johnson, Jeffers, Tate, Dalton, & Aitken, 2004;Kagal, Finin, & Joshi, 2003;Tonti, Bradshaw, Jeffers, Montanari, Suri, & Uszok, 2003). In formalizing access control policies, one must deal with the situation where a given request is neither explicitly allowed nor explicitly denied.…”
Section: Introductionmentioning
confidence: 99%
“…Recent work on frameworks for distributed trust management and policy in multi-agent systems [17,18] and existing authentication and delegation logics have to be taken into consideration for future logical extensions of DAML+OIL. The first step will be the development of further basic ontologies for deontic concepts (permissions, obligations, and rights), as well as a basic agent and action ontology (requesting a resource, delegating rights, etc) [19]. A theory for reasoning about trust relations will be at the core of decision procedures for web agents that search for reliable information.…”
Section: Discussionmentioning
confidence: 99%
“…CoBrA's broker enforces privacy policies to define rules of behavior and restrict context (Kagal & T. A. Joshi, 2003) which does description logic inference over OWL. CoBrA also implements a meta-policy reasoning mechanism so that users can override some aspects of a global policy to define specific constraints at their desired level of granularity.…”
Section: Semantic Context Managementmentioning
confidence: 99%