<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Comparison of Terminological and Rule-based Policy Languages</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Piero</forename><forename type="middle">A</forename><surname>Bonatti</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università di Napoli Federico II</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">A Comparison of Terminological and Rule-based Policy Languages</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">54CC4CD89737FA2B3D2824A86FEB0709</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T09:53+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract/>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Security and privacy policies commonly consist of declarative constraints over resource usage (data and services). Therefore logic-based representation languages are well-suited as a foundation of policy languages. Indeed, the semantics of standard languages like XACML can be reformulated in a logic-based fashion similar to the encoding adopted in <ref type="bibr" target="#b1">[2]</ref>; moreover, both description logics and logic programming languages (i.e., the two main families of knowledge representation formalisms) have been proposed as policy languages, see KAOS, <ref type="bibr" target="#b6">[7]</ref>, REI <ref type="bibr" target="#b4">[5]</ref>, RT <ref type="bibr" target="#b5">[6]</ref>, Cassandra <ref type="bibr" target="#b0">[1]</ref>, PeerTrust <ref type="bibr" target="#b3">[4]</ref>, and PROTUNE <ref type="bibr" target="#b2">[3]</ref> just to name a few approaches.</p><p>Policy-related processing involves several different reasoning tasks over the axioms that constitute a policy:</p><p>-An authorization A is granted iff A is entailed by the policy; -In trust negotiation, a set of credentials C unlocks a resource R iff C and the policy together entail the authorization to use R; the process of finding the sets C that enjoy this property (given the desired authorization for R) is called abduction;</p><p>-Usability, awareness, and validation issues make it very important to support explanation facilities such as those supplied by expert systems; explanation facilities convert axioms and proofs into natural language text understandable by people with no specific training in knowledge representation or computer science; when such documentation is produced automatically, it is guaranteed to be always aligned with the policy actually applied by the system; moreover, automated explanation facilities can produce contextualized documentation, relative to specific transactions;</p><p>-A natural privacy-related operation is comparing the privacy policy published by a web site with the privacy preferences of a user; the relevant question here is whether the information disclosures permitted by the web site's policy will always be permitted also by the user's privacy policy. Policy comparison can also be useful in assessing the results of a policy update; it can answer the question of whether the new policy is more permissive or more restricted than the old one.</p><p>In this talk we will assess different knowledge representation formalisms as policy languages for security and privacy, taking into account not only the kind of constraints that they can express on resource usage, but also the degree to which the above reasoning tasks can be supported. We will conclude that currently rulebased languages are more mature than description logics as far as the general needs of security and privacy policy languages are concerned.</p></div>		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Cassandra: Distributed access control policies with tunable expressiveness</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Moritz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peter</forename><surname>Becker</surname></persName>
		</author>
		<author>
			<persName><surname>Sewell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004)</title>
				<meeting><address><addrLine>Yorktown Heights, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2004-06">June 2004</date>
			<biblScope unit="page" from="159" to="168" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">An algebra for composing access control policies</title>
		<author>
			<persName><forename type="first">Piero</forename><surname>Bonatti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sabrina</forename><surname>De Capitani Di Vimercati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pierangela</forename><surname>Samarati</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Inf. Syst. Secur</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="35" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Driving and monitoring provisional trust negotiation with metapolicies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Piero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Daniel</forename><surname>Bonatti</surname></persName>
		</author>
		<author>
			<persName><surname>Olmedilla</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">6th IEEE Policies for Distributed Systems and Networks (POLICY 2005)</title>
				<meeting><address><addrLine>Stockholm, Sweden</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2005-06">June 2005</date>
			<biblScope unit="page" from="14" to="23" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web</title>
		<author>
			<persName><forename type="first">Rita</forename><surname>Gavriloaie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wolfgang</forename><surname>Nejdl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Daniel</forename><surname>Olmedilla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kent</forename><forename type="middle">E</forename><surname>Seamons</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marianne</forename><surname>Winslett</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">1st European Semantic Web Symposium</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting><address><addrLine>ESWS; Heraklion, Crete, Greece</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004-05">2004. May 2004</date>
			<biblScope unit="volume">3053</biblScope>
			<biblScope unit="page" from="342" to="356" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A policy language for a pervasive computing environment</title>
		<author>
			<persName><forename type="first">Lalana</forename><surname>Kagal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Timothy</forename><forename type="middle">W</forename><surname>Finin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Anupam</forename><surname>Joshi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Policies for Distributed Systems and Networks</title>
				<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2003-06">2003. June 2003</date>
			<biblScope unit="page" from="63" to="74" />
		</imprint>
	</monogr>
	<note>IEEE 4th International Workshop on</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Design of a role-based trust-management framework</title>
		<author>
			<persName><forename type="first">Ninghui</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><forename type="middle">C</forename><surname>Mitchell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">William</forename><forename type="middle">H</forename><surname>Winsborough</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Symposium on Security and Privacy</title>
				<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="114" to="130" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement</title>
		<author>
			<persName><forename type="first">A</forename><surname>Uszok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bradshaw</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Jeffers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Suri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hayes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Breedy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Bunch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Johnson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kulkarni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lott</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Policies for Distributed Systems and Networks</title>
				<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2003-06">2003. June 2003</date>
			<biblScope unit="page" from="93" to="96" />
		</imprint>
	</monogr>
	<note>IEEE 4th International Workshop on</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
