<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">WS-Policy and Beyond: Application of OWL Defaults to Web Service Policies</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Vladimir</forename><surname>Kolovski</surname></persName>
							<email>kolovski@cs.umd.edu</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Maryland</orgName>
								<address>
									<settlement>College Park</settlement>
									<region>MD</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Bijan</forename><surname>Parsia</surname></persName>
							<email>bparsia@cs.man.ac.uk</email>
							<affiliation key="aff1">
								<orgName type="department">School of Computer Science</orgName>
								<orgName type="institution">The University of Manchester</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">WS-Policy and Beyond: Application of OWL Defaults to Web Service Policies</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">FB2E8749EAEBCC427C86D6818E4ED7C0</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T21:14+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Recently, there has been an increased amount of attention dedicated to WS-Policy -it has become a W3C submission and a working group was formed to standardize the specification. In our previous work, we provided a mapping of WS-Policy to OWL-DL. In this paper, we continue that work by analyzing the operation of policy intersection (determining whether two web service policies are compatible). We show how this operation motivates the use of a non-monotonic extension of OWL in the form of OWL default rules. We discuss our prototype implementation of an OWL defaults reasoner based on Baader and Hollunder's terminological defaults.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Recently, there have been many different web service policy language proposals with varying degrees of expressivity and complexity <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b0">1]</ref>. One of these languages, WS-Policy became a W3C member submission and is the basis for the WS-Policy working group <ref type="foot" target="#foot_0">3</ref> .</p><p>In previous work <ref type="bibr" target="#b12">[13]</ref> we described a translation of WS-Policy to a standardized logic (OWL-DL). This mapping essentially provided a formal semantics for the framework, and allowed us to use an OWL DL reasoner for policy processing tasks such as determining policy equivalence, incompatibility, containment, incoherence and explanation. In this paper, we provide additional results on the translation by exploring the operation of policy intersection. This operation determines whether two policies are compatible and generally involves domain-specific processing. In the official specification of WS-Policy <ref type="bibr" target="#b20">[21]</ref>, only an approximation algorithm is defined for this operation. Instead, we describe an algorithm based on OWL-DL extended with default rules. Because default logic is computationally more expensive than the logic behind OWL-DL, we do provide clear motivations for our usage of defaults.</p><p>To provide reasoning support for OWL defaults we have extended an open-source OWL-DL reasoner (Pellet). Our implementation is based on Baader and Hollunder's terminological default logic <ref type="bibr" target="#b2">[3]</ref> (adapted to OWL-DL). To retain decidability, the terminological default logic of Baader and Hollunder restricts the default rules to named individuals only, similar to DL-safe rules. We provide a brief description of our system in Section 6.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>In this section we provide brief overview of the WS-Policy framework and Reiter's default logic, which served as the basis of our implementation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">WS-Policy Framework Overview</head><p>The WS-Policy Framework provides a general purpose model and syntax to describe the policies of a Web service. Its scope is limited to allowing endpoints to specify requirements and capabilities needed for establishing a connection. Its initial goal is not to be used as a language for expressing more complex, application-specific policies that take effect after the connection is established. For this purpose, WS-Policy introduces a simple and extensible grammar that consists of assertions and alternatives.</p><p>An assertion is the basic unit of a policy. For example, an assertion could declare that the message should be encrypted. The actual definitions and meaning of the assertions are domain-dependent and not defined in the WS-Policy Framework. An assertion is defined by a unique Qualified Name, and can be a simple string or a complex object with many sub elements and attributes. Note that an assertion can contain a nested policy expression.</p><p>A set of assertions is called a policy alternative, and a set of alternatives comprises a policy. For an alternative to be supported by a web service requester, all assertions in that alternative have to be satisfied by that requester. For a policy to be supported by a requester, one or more alternatives need to be supported. Following is a schema outline for the normal form of a policy expression: Possible sets of conclusions from a default theory are defined in terms of extensions of the theory. Extensions are deductively closed sets of formulae that also include the original set of facts from the world description. Extensions are also closed under the application of defaults in D -we keep applying default rules as long as possible to generate an extension.</p><p>Default rules can conflict. A simple example is when two defaults d 1 and d 2 are applicable yet the consequent of d 1 is inconsistent with the consequent of d 2 . We then typically end up with two extensions: one where the consequent of d 1 holds, and one where the consequent of d 2 holds.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Updated OWL-DL Mapping</head><p>In <ref type="bibr" target="#b12">[13]</ref> we presented a mapping of WS-Policy to OWL-DL based on the idea that service policy assertions and alternatives were mapped to classes, and web service requesters are mapped to OWL individuals. With this mapping, checking whether a web service requester satisfies a particular policy can then be reduced to simply checking whether the OWL individual representing the requester is a member of the OWL class representing the policy. The mapping was relatively simple since there are only two relevant constructs in a WS-Policy in a normal form (&lt;wsp:exactlyOne&gt;, &lt;wsp:All&gt;). Due to the name of one of the operators (&lt;wsp:exactlyOne&gt;) and the ambiguity in the WS-Policy specifications, we translated it to a logical XOR. Thus the policy P = ExactlyOne(A, B) was mapped to the description logic expression: P = (A B) ¬(A B) (&lt;wsp:All&gt; was mapped to logical conjunction).</p><p>However, due to the open world assumption present in OWL-DL, our previous mapping produces non-intuitive results. For example, if a request r comes in such that r : A, and the policy P contains only two alternatives, A and B, we will not be able to infer that the request r satisfies P (i.e., r is of type (A B) ¬(A B) ) unless we explicitly state that r : ¬B. To solve this issue, we simplified the mapping to represent &lt;wsp:exactlyOne&gt; as logical disjunction (inclusive OR), and in addition we have made the classes representing the alternatives pair-wise disjoint, so even though a requester supports more than one alternative, he cannot use more than one at a time. This updated translation is more concise than the old one (compare A B with (A B) ¬(A B)). In this scenario, if a requester comes in that is a member of two alternatives, we will get an inconsistency.</p><p>Example 1. Consider the example policy in Figure <ref type="figure">1</ref>. For each policy assertion, we have a separate OWL class (RequireDerivedKeys, WssUsernameToken10, WssUsernameToken11). Then, each alternative is simply the conjunction of its assertions. The policy class P is equivalent to the disjunction of the alternative classes:</p><formula xml:id="formula_0">P ≡ Alt 1 Alt 2</formula><p>In addition, we add a disjoint axiom for the alternatives:</p><formula xml:id="formula_1">Alt 1 ¬Alt 2 .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Policy Processing Services</head><p>In our previous work <ref type="bibr" target="#b12">[13]</ref> on WS-Policy, we described the services that DL reasoners provide regarding policies: containment, equivalence, incompatibility, incoherence (nothing can satisfy the policy) and policy conformance, among others. Thus, the mapping allows us to use an off-the-shelf OWL reasoner as a policy engine and analysis tool, and an off-the-shelf OWL editor as a policy development and integration environment. OWL editors can also be used to develop domain specific assertion languages (essentially, domain ontologies) with a uniform syntax and well specified semantics.</p><p>There is one additional reasoning service that is useful for policies and warrants more discussion. It has been argued (see <ref type="bibr" target="#b3">[4]</ref> for example) that explanation is a crucial requirement for a policy language. To address this requirement, we can use recent advances in the field of debugging OWL ontologies <ref type="bibr" target="#b10">[11]</ref>, esp. in providing explanations for both ontology inconsistencies and arbitrary entailments for OWL-DL.</p><p>For example, the why query mentioned in <ref type="bibr" target="#b3">[4]</ref> can be handled by the explanation for arbitrary entailments. If a user asks why the requester r satisfies the policy P, then the debugging framework is simply asked to provide justification for the type assertion r:P. On the other hand, if a web service request causes an inconsistency (for example because of violating a domain disjointness constraint), then the debugging framework can provide explanation of why the inconsistency occurred. More specifically, if an OWL-DL ontology is inconsistent, <ref type="bibr" target="#b10">[11]</ref> provides the minimal set of axioms in the ontology that causes the inconsistency (the set of axioms is called a justification).</p><p>These techniques are already implemented in Pellet, and there is also a UI for debugging implemented in SWOOP.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Policy Intersection</head><p>Policy intersection is used when a web service requester and provider both express policies and want to compute the compatible policy alternatives between them. This commutative and associative function takes two policies as input and returns a policy containing the compatible alternatives. As defined in <ref type="bibr" target="#b20">[21]</ref>, two alternatives are compatible if each assertion in the first alternative is compatible with an assertion in the second, and vice-versa. If two policy alternatives are compatible, their intersection is an alternative containing all of the assertions in both alternatives.</p><p>Determining whether two policy alternatives are compatible involves domain-specific processing. In an attempt to automate the operation, one might be tempted to mark the incompatible policy assertions as mutually disjoint classes. Then, to determine whether two policies A and B are compatible we only check whether A B is satisfiable. However, this will prevent us from having entities support assertions of different types, since it will render the policy ontology inconsistent. Since it is usually the case that entities do support different assertion types (example: an entity can support some specific encoding and some type of reliability, and encoding and reliability are different assertion types), the simple approach of marking incompatible assertions as disjoint classes is incorrect.</p><p>To overcome this problem, we introduce an additional property in the policy ontology -compatibleWith. Then, for two policy assertion classes A and B, if we want to say that A is not compatible with B, we can simply use A ¬∃compatibleWith.B.</p><p>As stated in <ref type="bibr" target="#b20">[21]</ref>, assertion authors are encouraged to factor assertions such that two assertions of the same assertion type are typically compatible. We can model this using inheritance hierarchies (with exceptions). For instance, the policy modeler can state that for two classes representing assertions C, D, which she knows are compatible, every pair of classes C i , D i that are subclasses of C, D (i.e., C i C and D i D) is also compatible by default. This can be expressed with the following default rule:</p><formula xml:id="formula_2">C(x) ∧ D(y) : compatibleWith(x, y) compatibleWith(x, y)</formula><p>In the cases when two assertions are incompatible (even though they are a inherit from the same type) the policy developer can add a disjoint axiom by hand, overriding the default rule above.</p><p>The basic algorithm would be as follows: for two policies A and B and a default theory KB = W, D (where W is an OWL-DL ontology and D is a set of defaults), to determine whether they are compatible start with the alternatives of A and try to find one compatible alternative in B, and vice-versa. If for at least one alternative in one policy, we succeed in finding compatible alternatives in the other policy, we conclude that the policies can intersect. The intersection of the policies is the policy containing the mutually compatible set of alternatives. To determine whether two alternatives are compatible, we try to match their assertions. For each assertion Assert a ∈ A, we try to find an assertion Assert b ∈ B s.t. KB |= compatibleWith(Assert a , Assert b ).</p><p>If the assertion has a nested policy, then we try to match it with a nested policy from the other alternative, by asking recursively whether they are compatible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">OWL Defaults</head><p>Both of the default logic scenarios described above could be plausibly met with Reiter's default logic, which is one of the most studied non-monotonic logics. Reiter's default logic, while very expressive, is, like many non-monotonic formalisms, known to be computationally difficult even in the propositional case. In <ref type="bibr" target="#b2">[3]</ref>, Baader and Hollunder showed that even a restricted form of defaults coupled with a description logic that contains a smaller set of constructors than OWL-DL was undecidable. They also showed that if one restricted the defaults to apply only to named individuals (or, equivalently, restricted the logic to closed defaults), then a robust decidability ensued.</p><p>We have implemented a prototype of the terminological defaults of Baader and Hollunder that is based on recent advances in description logic reasoning: tableaux tracing for the description logic SHOIN and incremental reasoning support. The implementation is provided as an extension to Pellet and it provides realization of individuals in terminological default theories. We have also provided a UI for defaults by extending the open source OWL Ontology editor SWOOP. More specifically, we added support for default rules editing and updating the current ontology with the set of inferred facts from the defaults. We refer the reader to <ref type="bibr" target="#b11">[12]</ref> for more details.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Related Work</head><p>There have been a number of proposals for ontology-based web policy systems <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b17">18,</ref><ref type="bibr" target="#b7">8]</ref> -because of lack of space, we will only briefly cover Rei and KaOS.</p><p>Rei <ref type="bibr" target="#b9">[10]</ref> is a policy specification language based on a combination of OWL-Lite, logic-like variables and rules. It allows users to develop declarative policies over domain specific ontologies in RDF and OWL. Rei allows policies to be specified as constraints over allowable and obligated actions on resources in the environment. A distinguishing feature of Rei is that it includes specifications for speech acts for remote policy management and policy analysis specifications like what-if analysis and use-case management. Our goal is to encode WS-Policy in a not very expressive logic formalism (so as to be able to perform policy analysis), and our opinion is that we do not need a language as expressive as Rei for WS-Policy.</p><p>KaOS Policy and Domain Services <ref type="bibr" target="#b17">[18]</ref> use ontology concepts encoded in OWL to build policies. These policies constrain allowable actions performed by actors which might be clients or agents. The KAoS Policy Service distinguishes between authorizations and obligations. The applicability of the policy is defined by a class of situations which definition can contain components specifying required history, state and currently undertaken action. Even though we use the same representation language as KaOS (OWL-DL), our reasoning support is provided by tableaux-based description logic reasoners which are sound and complete for OWL-DL. In addition, by using Pellet we were able to leverage its ontology debugging support.</p><p>In addition, there are a number of proposals <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b13">14]</ref> of policy/authorization languages based on logic programs extended with default rules -the difference with our approach is that we use description logics as the underlying logic formalism.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Conclusions and Future Work</head><p>While most policy language proposals are based on logic programs, in this paper we explored the alternative of using OWL-DL as a language for expressing web service policies. We argued that the policy services that DL reasoners provide out of the box, the advances in explanation mechanisms for DL, and the ability to closely integrate OWL-DL with default logic make an OWL-based policy framework worth exploring. Also, OWL-DL is a W3C standard, a language with clear syntax and semantics that is ubiquitous in the Semantic Web. As a consequence, the number of reasoners and OWL-DL editors has been growing steadily. A policy language based on OWL-DL should be able to capitalize on the popularity of OWL-DL.</p><p>Despite the advantages mentioned above, policies, being associated with rules first and foremost, seem to demand greater expressivity than OWL-DL (as argued in <ref type="bibr" target="#b8">[9]</ref>, for example) in the form of monotonic rules. However, because of the recent advances in hybrid (description logic + logic programs) knowledge bases, and successful implementations ( <ref type="bibr" target="#b14">[15]</ref> ) we believe that OWL-DL combined with rules is reaching a maturity level where it will be a suitable alternative for a policy framework.</p><p>During the past couple of years, there has been great advances <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b18">19,</ref><ref type="bibr" target="#b16">17]</ref> in the area of automated trust negotiation (ATN) between policy entities. ATN deals with the problem of exchanging of sensitive credentials between strangers in order to establish trust. We plan to investigate how we can integrate our OWL-based system with such mechanisms.</p><p>Finally, it is unfortunate that we cannot provide clear semantics for policy intersection because its dependence on domain-specific reasoning. The WS-Policy framework requires each domain to specify its own policy assertions, but there is no generic, domain-independent language for expressing these assertions. As a result, every domain has its own language (with unclear semantics ) that makes it hard to reason and analyze the assertions. We plan to investigate how we could couple OWL with concrete domains (e.g. XPath) so as to be able to express and give semantics to some of these domains. A promising step toward a domain-independent policy assertions language is <ref type="bibr" target="#b1">[2]</ref>; we plan to investigate the idea further.</p></div>			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_0">WS-Policy Working Group web site: http://www.w3.org/2002/ws/policy/</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">An introduction to the web services policy language</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Anderson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fifth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY&apos;04)</title>
				<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">WS-PolicyConstraints: A domain-independent web services policy assertion language</title>
		<author>
			<persName><forename type="first">Anne</forename><surname>Anderson</surname></persName>
		</author>
		<ptr target="http://research.sun.com/projects/xacml/IntroToWSPolicyConstraints.pdf" />
		<imprint>
			<date type="published" when="2005-11">November 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Embedding Defaults Into Terminological Knowledge Representation Formalisms</title>
		<author>
			<persName><forename type="first">Franz</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bernhard</forename><surname>Hollunder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Autom. Reasoning</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="149" to="180" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">The rewerse view on policies</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>Bonatti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Antoniou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Baldoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Baroglio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Duma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Fuchs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Martelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Nejdl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Olmedilla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Peer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Patti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Shamheri</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A uniform framework for regulating service access and information release on the web</title>
		<author>
			<persName><forename type="first">A</forename><surname>Piero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pierangela</forename><surname>Bonatti</surname></persName>
		</author>
		<author>
			<persName><surname>Samarati</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Comput. Secur</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="241" to="271" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">Jacques</forename><surname>Durand</surname></persName>
		</author>
		<ptr target="http://lists.oasis-open.org/archives/wsrm/200403/msg00082.html" />
		<title level="m">Wsdl annotation proposal</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web</title>
		<author>
			<persName><forename type="first">R</forename><surname>Gavriloaie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Nejdl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Olmedilla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Seamons</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Winslett</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">European Semantic Web Symposium</title>
				<imprint>
			<date type="published" when="2004-05">May 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Ontology based specification of web service policies</title>
		<author>
			<persName><forename type="first">Stephan</forename><surname>Grimm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Steffen</forename><surname>Lamparter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andreas</forename><surname>Abecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sudhir</forename><surname>Agarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andreas</forename><surname>Eberhart</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Semantic Web Services and Dynamic Networks Workshop</title>
				<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Rule-based and ontology-based policies: Toward a hybrid approach to control agents in pervasive environments</title>
		<author>
			<persName><forename type="first">R</forename><surname>Montanari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bradshaw</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Kagal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Toninelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ISWC2005 Semantic Web and Policy Workshop</title>
				<meeting>the ISWC2005 Semantic Web and Policy Workshop</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A policy language for a pervasive computing environment</title>
		<author>
			<persName><forename type="first">L</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 4th International Workshop on Policies for Distributed Systems and Networks</title>
				<imprint>
			<date type="published" when="2003-06">June 2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Debugging unsatisfiable classes in owl ontologies</title>
		<author>
			<persName><forename type="first">Aditya</forename><surname>Kalyanpur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bijan</forename><surname>Parsia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Evren</forename><surname>Sirin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">James</forename><surname>Hendler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Web Semantics -Special Issue of the Semantic Web Track of WWW2005</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Implementing owl defaults</title>
		<author>
			<persName><forename type="first">Vladimir</forename><surname>Kolovski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bijan</forename><surname>Parsia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yarden</forename><surname>Katz</surname></persName>
		</author>
		<ptr target="http://www.mindswap.org/kolovski/defaults.pdf" />
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
		<respStmt>
			<orgName>University of Maryland -College Park</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Representing web service policies in owl-dl</title>
		<author>
			<persName><forename type="first">Vladimir</forename><surname>Kolovski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bijan</forename><surname>Parsia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yarden</forename><surname>Katz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jim</forename><surname>Hendler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Semantic Web Conference (ISWC)</title>
				<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Delegation Logic: A logic-based approach to distributed authorization</title>
		<author>
			<persName><forename type="first">Ninghui</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Benjamin</forename><forename type="middle">N</forename><surname>Grosof</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joan</forename><surname>Feigenbaum</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ACM Transaction on Information and System Security (TISSEC)</title>
				<imprint>
			<date type="published" when="2003-02">February 2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Query answering for owl-dl with rules</title>
		<author>
			<persName><forename type="first">Boris</forename><surname>Motik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ulrike</forename><surname>Sattler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rudi</forename><surname>Studer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of ISWC 2004</title>
				<meeting>of ISWC 2004</meeting>
		<imprint>
			<biblScope unit="page" from="549" to="563" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Ontology-based policy specification and management</title>
		<author>
			<persName><forename type="first">W</forename><surname>Nejdl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Olmedilla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Winslett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2nd European Semantic Web Conference (ESWC)</title>
				<imprint>
			<date type="published" when="2005-05">May 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Limiting the disclosure of access control policies during automated trust negotiation</title>
		<author>
			<persName><forename type="first">K</forename><surname>Seamons</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Winslett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Yu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Kaos policies for web services</title>
		<author>
			<persName><forename type="first">A</forename><surname>Uszokand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bradshaw</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">W3C Workshop on Constraints and Capabilities for Web Servies</title>
				<imprint>
			<date type="published" when="2004-10">October 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Automated trust negotiation</title>
		<author>
			<persName><forename type="first">W</forename><surname>Winsborough</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Seamons</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Jones</surname></persName>
		</author>
		<idno>TR-2000-05, 24 2000</idno>
		<imprint/>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Authorization in distributed systems : A formal approach</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">Y C</forename><surname>Woo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE Symposium on Security and Privacy</title>
				<meeting>the IEEE Symposium on Security and Privacy</meeting>
		<imprint>
			<date type="published" when="1992">1992</date>
			<biblScope unit="page" from="33" to="51" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<ptr target="http://www-106.ibm.com/developerworks/library/specification/ws-polfram/" />
		<title level="m">Web services policy framework (ws-policy</title>
				<imprint/>
	</monogr>
	<note>WS-Policy</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
