A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints

We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In particular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with access control policies and credentials. In this way, we can associate the level of preference defined by the "softness" of the constraint with a "level" of trust. The main benefit comes during the process of automated access authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.

[1]  Francesca Rossi,et al.  Semiring-based constraint satisfaction and optimization , 1997, JACM.

[2]  Verónica Dahl,et al.  HYPROLOG: A New Logic Programming Language with Assumptions and Abduction , 2005, ICLP.

[3]  Alessandro Sperduti,et al.  Experimental Results on Learning Soft Constraints , 2000, KR.

[4]  Fabio Massacci,et al.  A Negotiation Scheme for Access Rights Establishment in Autonomic Communication , 2006, Journal of Network and Systems Management.

[5]  Murray Shanahan,et al.  Prediction is Deduction but Explanation is Abduction , 1989, IJCAI.

[6]  Philippe Codognet,et al.  Abduction and Concurrent Logic Languages , 1994, ECAI.

[7]  André Zúquete,et al.  Security Policy Consistency , 2000, ArXiv.

[8]  Christian Bessiere,et al.  Learning Implied Global Constraints , 2007, IJCAI.

[9]  Roberto Rossi,et al.  Cost-Based Filtering for Stochastic Inventory Control , 2006, CSCLP.

[10]  Thom W. Frühwirth,et al.  Constraint Handling Rules , 2009, Constraint Programming.

[11]  Michael J. Maher,et al.  On Computing Constraint Abduction Answers , 2008, LPAR.

[12]  Harry E. Pople,et al.  Session 6 Theorem Proving and Logic: I I ON THE MECHANIZATION OF ABDUCTIVE LOGIC , 2006 .

[13]  Thom W. Frühwirth,et al.  Soft constraint propagation and solving in CHRs , 2002, SAC '02.

[14]  Francesca Rossi,et al.  Computing Explanations and Implications in Preference-Based Configurators , 2002, International Workshop on Constraint Solving and Constraint Logic Programming.

[15]  Jan Wielemaker,et al.  An Overview of the SWI-Prolog Programming Environment , 2003, WLPE.

[16]  Stefano Bistarelli,et al.  A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily , 2008, ATC.

[17]  Leon G. Higley,et al.  Forensic Entomology: An Introduction , 2009 .

[18]  Tim Menzies,et al.  Applications of abduction: knowledge-level modelling , 1996, Int. J. Hum. Comput. Stud..

[19]  Fabio Gadducci,et al.  Enhancing Constraints Manipulation in Semiring-Based Formalisms , 2006, ECAI.

[20]  Frank Wolter,et al.  Monodic fragments of first-order temporal logics: 2000-2001 A.D , 2001, LPAR.

[21]  Krzysztof R. Apt,et al.  Logic Programming , 1990, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.

[22]  Ninghui Li,et al.  Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[23]  Stefano Bistarelli,et al.  Weighted Datalog and Levels of Trust , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[24]  Antonis C. Kakas,et al.  ACLP: Integrating Abduction and Constraint Solving , 2000, ArXiv.

[25]  Michael J. Maher Abduction of Linear Arithmetic Constraints , 2005, ICLP.

[26]  Barry O'Sullivan,et al.  Semiring-Based Constraint Acquisition , 2007, 19th IEEE International Conference on Tools with Artificial Intelligence(ICTAI 2007).

[27]  Stefano Bistarelli Semirings for Soft Constraint Solving and Programming , 2004, Lecture Notes in Computer Science.

[28]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..