Nonmonotonic Trust Management for P2P Applications
Autor: | Czenko, Marcin, Tran, Ha, Doumen, Jeroen M., Etalle, Sandro, Hartel, Pieter, den Hartog, Jeremy, Mauw, Sjouke, Issarny, Valérie, Cremers, Cas |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2005 |
Předmět: |
FOS: Computer and information sciences
Computer Science - Logic in Computer Science General Computer Science Semantics (computer science) Computer science Virtual Communities (VC) Access control Monotonic function computer.software_genre Semantics Chain Discovery Theoretical Computer Science Negation EC Grant Agreement nr.: FP6/507894 Role Based Trust Management (RT) Trust management (information system) Non-monotonic Policies F.4.1 I.2.3 I.2.4 Programming language business.industry Peer to Peer (P2P) Distributed Trust Management (DTM) SCS-Cybersecurity Logic in Computer Science (cs.LO) business computer Computer Science(all) |
Zdroj: | 1st Int. Workshop on Security and Trust Management (STM), 113-130 STARTPAGE=113;ENDPAGE=130;TITLE=1st Int. Workshop on Security and Trust Management (STM) Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005), 113-130 STARTPAGE=113;ENDPAGE=130;TITLE=Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005) |
ISSN: | 1571-0661 |
DOI: | 10.1016/j.entcs.2005.09.037 |
Popis: | Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT). To solve this problem we propose RT-, which adds a restricted form of negation to the standard RT language, thus admitting a controlled form of non-monotonicity. The semantics of RT- is discussed and presented in terms of the well-founded semantics for Logic Programs. Finally we discuss how chain discovery can be accomplished for RT-. Comment: This paper appears in the proceedings of the 1st International Workshop on Security and Trust Management (STM 2005). To appear in ENTCS |
Databáze: | OpenAIRE |
Externí odkaz: |