“…Modelling such situations requires defeasible inheritance, i.e., properties transfer to all instances of a class by default, but can be explicitly overridden in special cases (McCarthy, 1986;Horty, 1994;Brewka, 1994;Baader & Hollunder, 1995b). The second application is the use of DLs as security policy languages (Uszok, Bradshaw, Johnson, Jeffers, Tate, Dalton, & Aitken, 2004;Kagal, Finin, & Joshi, 2003;Tonti, Bradshaw, Jeffers, Montanari, Suri, & Uszok, 2003). In formalizing access control policies, one must deal with the situation where a given request is neither explicitly allowed nor explicitly denied.…”