Norm-based deontic logic for access control, some computational results

Abstract In this paper we study the complexity of deontic logics grounded on norm-based semantics and apply norm-based deontic logic to access control. Four principal norm-based deontic logics have been proposed so far: imperative logic, input/output logic, deontic default logic and deontic defeasible logic. We present the readers that imperative logic is complete for the 2ed level of the polynomial hierarchy and deontic default logic is located in the 3ed level of the polynomial hierarchy. We then show how it is possible to impose restrictions to imperative logic such that the complexity goes down to be tractable, allowing the logic to be used in practical applications. We focus on a specific application: access control.

[1]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[2]  Deepak Garg,et al.  New Modalities for Access Control Logics: Permission, Control and Ratification , 2011, STM.

[3]  John F. Horty,et al.  Reasoning with Moral Conflicts , 2003 .

[4]  John-Jules Ch. Meyer,et al.  A different approach to deontic logic: deontic logic viewed as a variant of dynamic logic , 1987, Notre Dame J. Formal Log..

[5]  Audun Stolpe,et al.  A theory of permission based on the notion of derogation , 2010, J. Appl. Log..

[6]  Guido Governatori,et al.  A system for modal and deontic defeasible reasoning , 2007, SAC '08.

[7]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[9]  Frédéric Cuppens,et al.  A stratification-based approach for handling conflicts in access control , 2003, SACMAT '03.

[10]  Frank Pfenning,et al.  Stateful Authorization Logic: - Proof Theory and a Case Study , 2010, STM.

[11]  Mark W. Krentel Generalizations of Opt P to the Polynomial Hierarchy , 1992, Theor. Comput. Sci..

[12]  Insup Lee,et al.  Permission to speak: A logic for access control and conformance , 2011, J. Log. Algebraic Methods Program..

[13]  Sven Ove Hansson,et al.  David Makinson on Classical Methods for Non-Classical Problems , 2014 .

[14]  Nora Cuppens-Boulahia,et al.  Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic , 2008, DEON.

[15]  Marc Denecker,et al.  Distributed Autoepistemic Logic and its Application to Access Control , 2016, IJCAI.

[16]  Xavier Parent,et al.  Moral particularism in the light of deontic logic , 2011, Artificial Intelligence and Law.

[17]  Guido Governatori,et al.  A modal and deontic defeasible reasoning system for modelling policies and multi-agent systems , 2009, Expert Syst. Appl..

[18]  Roderick M. Chisholm,et al.  Contrary-To-Duty Imperatives and Deontic Logic , 1963 .

[19]  Leon van der Torre,et al.  Constraints for Input/Output Logics , 2001, J. Philos. Log..

[20]  J. Horty Agency and Deontic Logic , 2001 .

[21]  Grzegorz Kolaczek,et al.  APPLICATION OF DEONTIC LOGIC IN ROLE-BASED ACCESS CONTROL , 2002 .

[22]  Martín Abadi,et al.  Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..

[23]  Guido Governatori,et al.  Computing Strong and Weak Permissions in Defeasible Logic , 2012, Journal of Philosophical Logic.

[24]  B. V. Fraassen Values and the Heart's Command , 1973 .

[25]  Leon van der Torre,et al.  Input/Output Logics , 2000, J. Philos. Log..

[26]  Jörg Hansen Reasoning About Permission and Obligation , 2014 .

[27]  Davide Grossi,et al.  Constitutive Norms and Counts-as Conditionals , 2013 .

[28]  Gerhard Brewka,et al.  Preferred Subtheories: An Extended Logical Framework for Default Reasoning , 1989, IJCAI.

[29]  Xin Sun,et al.  Conditional Ought, a Game Theoretical Perspective , 2011, LORI.

[30]  Xin Sun,et al.  Computational Complexity of Input/Output Logic , 2015, MIWAI.

[31]  Leon van der Torre,et al.  Combining Constitutive and Regulative Norms in Input/Output Logic , 2014, DEON.

[32]  J. Horty Reasons as Defaults , 2012 .

[33]  V. Wiktor Marek,et al.  Nonmonotonic Logic , 1993, Artificial Intelligence.

[34]  Leon van der Torre,et al.  Permission from an Input/Output Perspective , 2003, J. Philos. Log..

[35]  Selim G. Akl,et al.  A Quantum Cryptographic Solution to the Problem of Access Control in a Hierarchy , 2010, Parallel Process. Lett..

[36]  Sanjeev Arora,et al.  Computational Complexity: A Modern Approach , 2009 .

[37]  Victor W. Marek,et al.  Nonmonotonic logic - context-dependent reasoning , 1997, Artificial intelligence.

[38]  Jörg Hansen Prioritized conditional imperatives: problems and a new proposal , 2007, Autonomous Agents and Multi-Agent Systems.

[39]  Martín Abadi,et al.  A Modal Deconstruction of Access Control Logics , 2008, FoSSaCS.

[40]  Ron van der Meyden,et al.  The Dynamic Logic of Permission , 1990, J. Log. Comput..