Using ASP for knowledge management with user authorization

Unlike conventional rule based knowledge bases (KBs) that support monotonic reasoning, a key correctness issue, i.e. the correctness of a sub-KB with respect to the full KB, arises when using a KB represented by non-monotonic reasoning languages such as Answer Set Programming (ASP). Since a user may have rights to access only a subset of a KB, the non-monotonic nature of ASP may cause the occurrence of consequences, which are erroneous in the sense that the consequences are not reasonable in the full KB. This paper proposes an approach dealing with the problem. The main idea is to let the usage of Closed World Assumptions (CWAs) for literals in a KB satisfy certain constraints. Two kinds of access right propositions are created, rule retrieval right propositions to control the access to rules, and CWA right propositions to control the usage of CWAs for literals. Based on these right propositions, this paper first defines an algorithm for translating an original KB into a KB tagged by right propositions, and then discusses the right dependency in a KB and proposes methods for checking and obtaining a set of rights that is closed under a set of dependency rules. Finally, several results on the correctness of a set of rights in a KB are presented, which serve as guidelines for the correct use of a KB. As an example, a KB of illness-related financial support for teachers of a university is presented to illustrate the application of our approach.

[1]  Amit Basu,et al.  Knowledge base views in multiuser knowledge based systems , 1988, Proceedings. Fourth International Conference on Data Engineering.

[2]  Sarit Kraus,et al.  Combining Multiple Knowledge Bases , 1991, IEEE Trans. Knowl. Data Eng..

[3]  Grzegorz J. Nalepa,et al.  A visual edition tool for design and verification of knowledge in rule-based systems , 2005 .

[4]  Giorgio Terracina,et al.  Enhancing a DLP System for Advanced Database Applications , 2008, RR.

[5]  Jean Bacon,et al.  A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..

[6]  Torsten Schaub Model-Based Knowledge Representation and Reasoning Via Answer Set Programming , 2008, FLOPS.

[7]  Peter Buneman,et al.  Semistructured data , 1997, PODS.

[8]  Tsung-Yi Chen,et al.  Knowledge sharing in virtual enterprises via an ontology-based access control approach , 2008, Comput. Ind..

[9]  Steve Barker,et al.  Protecting deductive databases from unauthorized retrieval and update requests , 2002, Data Knowl. Eng..

[10]  Sébastien Konieczny,et al.  On the Logic of Merging , 1998, KR.

[11]  Stefan Woltran,et al.  Merging Logic Programs under Answer Set Semantics , 2009, ICLP.

[12]  Paramartha Dutta,et al.  An evolutionary heuristic for knowledge base partitioning problem , 1997, Proceedings of 1997 IEEE International Conference on Evolutionary Computation (ICEC '97).

[13]  Joan Feigenbaum,et al.  Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.

[14]  Thomas Eiter,et al.  Preferred Answer Sets for Extended Logic Programs , 1999, Artif. Intell..

[15]  C. Pandu Rangan,et al.  Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases , 2006, Secure Data Management.

[16]  Chitta Baral,et al.  Logic Programming and Knowledge Representation , 1994, J. Log. Program..

[17]  Wolfgang Faber,et al.  The DLV system for knowledge representation and reasoning , 2002, TOCL.

[18]  Marco Schaerf,et al.  Arbitration (or How to Merge Knowledge Bases) , 1998, IEEE Trans. Knowl. Data Eng..

[19]  Dirk Vermeir,et al.  Preferred answer sets for ordered logic programs , 2006, Theory Pract. Log. Program..

[20]  Wolfgang Faber,et al.  Magic Sets and their application to data integration , 2007, J. Comput. Syst. Sci..

[21]  Peter J. Stuckey,et al.  Flexible access control policy specification with constraint logic programming , 2003, TSEC.

[22]  Gheorghe Tecuci,et al.  Rapid development of large knowledge bases , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[23]  Johann Eder,et al.  Logic and Databases , 1992, Advanced Topics in Artificial Intelligence.

[24]  Ni Xianjun A Logic Specification and Implementation Approach for Object Oriented Database Security , 2008, First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008).

[25]  Jürgen Dix,et al.  A Classification Theory of Semantics of Normal Logic Programs: I. Strong Properties , 1995, Fundam. Informaticae.

[26]  Michiharu Kudo,et al.  XML document security based on provisional authorization , 2000, CCS.

[27]  Antonio Brogi,et al.  On the Semantics of Logic Program Composition , 2004, Program Development in Computational Logic.

[28]  Torsten Schaub,et al.  A semantic framework for preference handling in answer set programming , 2003, Theory and Practice of Logic Programming.

[29]  Sushil Jajodia,et al.  A logic-based framework for attribute based access control , 2004, FMSE '04.

[30]  Stefan Woltran,et al.  Modularity Aspects of Disjunctive Stable Models , 2007, LPNMR.

[31]  Vladimir Lifschitz,et al.  Answer set programming and plan generation , 2002, Artif. Intell..

[32]  Tzvi Raz,et al.  The knowledge base partitioning problem: Mathematical formulation and heuristic clustering , 1992, Data Knowl. Eng..

[33]  Hans Tompits,et al.  A framework for compiling preferences in logic programs , 2002, Theory and Practice of Logic Programming.

[34]  J.C.A. Guadarrama,et al.  Maintaining Knowledge Bases at the Object Level , 2007, 2007 Sixth Mexican International Conference on Artificial Intelligence, Special Session (MICAI).

[35]  Michael Gelfond,et al.  Classical negation in logic programs and disjunctive databases , 1991, New Generation Computing.

[36]  Giovambattista Ianni,et al.  Institut F ¨ Ur Informationssysteme Efficiently Querying Rdf(s) Ontologies with Answer Set Programming Efficiently Querying Rdf(s) Ontologies with Answer Set Programming , 2022 .

[37]  Amit Basu,et al.  A Knowledge Representation Model for Multiuser Knowledge-Based Systems , 1993, IEEE Trans. Knowl. Data Eng..

[38]  Chiaki Sakama,et al.  Coordination in answer set programming , 2008, TOCL.

[39]  Yasuhiro Morita,et al.  Vertical Partitioning Method for Secret Sharing Distributed Database System , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[40]  Mihalis Yannakakis,et al.  Tie-breaking semantics and structural totality , 1992, PODS '92.

[41]  Gerhard Steinke Access control requirements for environmental information knowledge base systems , 1990, Proceedings of the 5th Jerusalem Conference on Information Technology, 1990. 'Next Decade in Information Technology'.

[42]  Kenneth A. Ross,et al.  The well-founded semantics for general logic programs , 1991, JACM.

[43]  Martín Abadi,et al.  Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..

[44]  Joost Vennekens,et al.  Building a Knowledge Base System for an Integration of Logic Programming and Classical Logic , 2008, ICLP.

[45]  Glynn Winskel,et al.  The formal semantics of programming languages - an introduction , 1993, Foundation of computing series.

[46]  Stefan Woltran,et al.  Debugging ASP Programs by Means of ASP , 2007, LPNMR.

[47]  Yuh-Min Chen,et al.  Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise , 2007, Comput. Ind..

[48]  Pascal Richard,et al.  Data Partitioning in Data Warehouses: Hardness Study, Heuristics and ORACLE Validation , 2008, DaWaK.

[49]  Stephen Hailes,et al.  An access control model based on distributed knowledge management , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[50]  Fangzhen Lin,et al.  On Odd and Even Cycles in Normal Logic Programs , 2004, AAAI.

[51]  Vladimir Lifschitz,et al.  Splitting a Logic Program , 1994, ICLP.

[52]  Luís Moniz Pereira,et al.  Layer Supported Models of Logic Programs , 2009, LPNMR.

[53]  Enrico Pontelli,et al.  A Tool for Knowledge Base Integration and Querying , 2006, AAAI Spring Symposium: Formalizing and Compiling Background Knowledge and Its Applications to Knowledge Representation and Question Answering.

[54]  Simon S. Lam,et al.  Authorization in distributed systems: a formal approach , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[55]  Jong P. Yoon Presto authorization: a bitmap indexing scheme for high-speed access control to XML documents , 2006, IEEE Transactions on Knowledge and Data Engineering.