The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.11 - November (2010 vol.22)
pp: 1507-1520
P.A. Bonatti , Università di Napoli "Federico II", Napoli
J.L. De Coi , Forschungszentrum L3S, Hannover
D. Olmedilla , Telefonica R&D, Madrid
L. Sauro , Università di Napoli "Federico II", Napoli
ABSTRACT
Open distributed environments, such as the World Wide Web, facilitate information sharing but provide limited support to the protection of sensitive information and resources. Trust negotiation (TN) frameworks have been proposed as a better solution for open environments, in which parties may get in touch and interact without being previously known to each other. In this paper, we illustrate Protune, a rule-based TN system. By describing Protune, we will illustrate the advantages that arise from an advanced rule-based approach in terms of deployment efforts, user friendliness, communication efficiency, and interoperability. The generality and technological feasibility of Protune's approach are assessed through an extensive analysis and experimental evaluations.
INDEX TERMS
Protune, trust negotiation, rule-based policies, sensitive policies, policy exchange, explanations, privacy.
CITATION
P.A. Bonatti, J.L. De Coi, D. Olmedilla, L. Sauro, "A Rule-Based Trust Negotiation System", IEEE Transactions on Knowledge & Data Engineering, vol.22, no. 11, pp. 1507-1520, November 2010, doi:10.1109/TKDE.2010.83
REFERENCES
[1] A.H. Anderson, "An Introduction to the Web Services Policy Language (WSPL)," Proc. Fifth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '04), pp. 189-192, 2004.
[2] P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter, "Enterprise Privacy Authorization Language (EPAL 1.2)," technical report, IBM, Nov. 2003.
[3] M. Baldoni et al., "Choice, Interoperability, and Conformance in Interaction Protocols and Service Choreographies," Proc. Eighth Int'l Conf. Autonomous Agents and Multiagent Systems (AAMAS), pp. 843-850, 2009.
[4] S. Baselice, P.A. Bonatti, and M. Faella, "On Interoperable Trust Negotiation Strategies," Proc. Eighth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '07), pp. 39-50, 2007.
[5] M. Becker and P. Sewell, "Cassandra: Distributed Access Control Policies with Tunable Expressiveness," Proc. Fifth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '04), pp. 159-168, 2004.
[6] M. Bienvenu, "Complexity of Abduction in the EL Family of Lightweight Description Logics," Proc. 11th Int'l Conf. Principles of Knowledge Representation and Reasoning (KR '08), pp. 220-230, 2008.
[7] P. Bonatti, T. Eiter, and M. Faella, "Automated Negotiation Mechanisms," Technical Report I2-D6, REWERSE, http://rewerse.net/deliverables/m24i2-d6.pdf , Apr. 2006.
[8] P. Bonatti and P. Samarati, "Regulating Service Access and Information Release on the Web," Proc. Seventh ACM Conf. Computer and Comm. Security, pp. 134-143, 2000.
[9] P.A. Bonatti, C. Duma, D. Olmedilla, and N. Shahmehri, "An Integration of Reputation-Based and Policy-Based Trust Management," Proc. Semantic Web Policy Workshop, 2005.
[10] P.A. Bonatti and F. Mogavero, "Comparing Rule-Based Policies," Proc. IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '08), pp. 11-18, 2008.
[11] P.A. Bonatti and D. Olmedilla, "Driving and Monitoring Provisional Trust Negotiation with Metapolicies," Proc. Sixth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '05), 2005.
[12] P.A. Bonatti, D. Olmedilla, and J. Peer, "Advanced Policy Explanations on the Web." Proc. 17th European Conf. Artificial Intelligence (ECAI '06), pp. 200-204, 2006.
[13] P.A. Bonatti and P. Samarati, "Logics for Authorization and Security," Logics for Emerging Applications of Databases, pp. 277-323, Springer, 2003.
[14] A. Borgida, E. Franconi, I. Horrocks, D.L. McGuinness, and P.F. Patel-Schneider, "Explaining ALC Subsumption," Proc. Int'l Workshop Description Logics, 1999.
[15] Z.-Z. Chen and S. Toda, "The Complexity of Selecting Maximal Solutions," Information and Computation, vol. 119, pp. 231-239, 1995.
[16] S. Colucci et al., "Concept Abduction and Contraction for Semantic-Based Discovery of Matches and Negotiation Spaces in an e-Marketplace," Electronic Commerce Research and Applications, vol. 4, no. 4, pp. 345-361, 2005.
[17] N. Damianou, N. Dulay, E. Lupu, and M. Sloman, "The Ponder Policy Specification Language," Proc. Second IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '01), pp. 18-38, 2001.
[18] E. Dantsin, T. Eiter, G. Gottlob, and A. Voronkov, "Complexity and Expressive Power of Logic Programming," ACM Computing Surveys, vol. 33, no. 3, pp. 374-425, 2001.
[19] X. Deng et al., "Resolution Based Explanations for Reasoning in the Description Logic ALC," Proc. First Canadian Semantic Web Working Symp. (CSWWS '06), pp. 189-204, 2006.
[20] E. Denti, A. Omicini, and A. Ricci, "tu Prolog: A Light-Weight Prolog for Internet Applications and Infrastructures," Proc. Third Int'l Symp. Practical Aspects of Declarative Languages (PADL '01), pp. 184-198, 2001.
[21] C. Duma, A. Herzog, and N. Shahmehri, "Privacy in the Semantic Web: What Policy Languages Have to Offer," Proc. Eighth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '07), pp. 109-118, 2007.
[22] R. Gavriloaie et al., "No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on The Semantic Web," Proc. First European Semantic Web Symp. (ESWS '04), pp. 342-356, May 2004.
[23] M. Gelfond and V. Lifschitz, "The Stable Model Semantics for Logic Programming," Proc. Fifth Int'l Conf. and Symp. Logic Programming (ICLP/SLP '88), pp. 1070-1080, 1988.
[24] S.R. Haynes, "Explanation in Information Systems: A Design Rationale Approach," PhD dissertation, London School of Economics and Political Science, Dept. of Information Systems and Dept. of Social Psychology, 2001.
[25] A. Herzberg, Y. Mass, J. Michaeli, Y. Ravid, and D. Naor, "Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers," Proc. IEEE Symp. Security and Privacy, pp. 2-14, 2000.
[26] L. Kagal, T.W. Finin, and A. Joshi, "A Policy Language for a Pervasive Computing Environment," Proc. Fourth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '03), pp. 63-74, 2003.
[27] L. Kagal, C. Hanson, and D.J. Weitzner, "Using Dependency Tracking to Provide Explanations for Policy Management," Proc. IEEE Workshop Policies for Distributed Systems and Networks (POLICY '08), pp. 54-61, 2008.
[28] N. Li and J.C. Mitchell, "RT: A Role-Based Trust-Management Framework," Proc. Third DARPA Information Survivability Conference and Exposition (DISCEX III), pp. 1-12, 2003.
[29] D.L. McGuinness and P.P. da Silva, "Explaining Answers from the Semantic Web: The Inference Web Approach," J. Web Semantics, vol. 1, no. 4, pp. 397-413, 2004.
[30] A. Ragone et al., "Fully Automated Web Services Discovery and Composition through Concept Covering and Concept Abduction," Int'l J. Web Services Research, vol. 4, no. 3, pp. 85-112, 2007.
[31] D. Roman and M. Kifer, "Semantic Web Service Choreography: Contracting and Enactment," Proc. Seventh Int'l Semantic Web Conf. (ISWC '08), pp. 550-566, 2008.
[32] K. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobsen, H. Mills, and L. Yu, "Requirements for Policy Languages for Trust Negotiation," Proc. Third Int'l Workshop Policies for Distributed Systems and Networks (POLICY '02), pp. 68-79, 2002.
[33] T.M. Simon Godik, "Oasis Extensible Access Control Markup Language (XACML) Version 1.0," technical report, OASIS, Feb. 2003.
[34] S. Staab, B.K. Bhargava, L. Lilien, A. Rosenthal, M. Winslett, M. Sloman, T.S. Dillon, E. Chang, F.K. Hussain, W. Nejdl, D. Olmedilla, and V. Kashyap, "The Pudding of Trust," IEEE Intelligent Systems, vol. 19, no. 5, pp. 74-88, Sept. 2004.
[35] V.S. Subrahmanian, P.A. Bonatti, J. Dix, T. Eiter, S. Kraus, F. Ozcan, and R. Ross, Heterogenous Active Agents. MIT Press, 2000.
[36] A. Uszok et al., "KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement," Proc. Fourth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '03), 2003.
[37] M.R. Wick, "Second Generation Expert System Explanation," Second Generation Expert Systems, J.-M. David, J.-P. Krivine, and R. Simmons, eds., pp. 614-640, Springer-Verlag, 1993.
[38] W. Winsborough, K. Seamons, and V. Jones, "Automated Trust Negotiation," Proc. DARPA Information Survivability Conf. and Exposition (DISCEX '00), pp. 88-102, 2000.
[39] C. Zhang, P. Bonatti, and M. Winslett, "PeerAccess: A Logic for Distributed Authorization," Proc. 12th ACM Conf. Computer and Comm. Security (CCS '05), 2005.
41 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool