Skip to main content

The Role of Deontic Concepts and Commitment in the Policy Specification of Mobile Computing Environment

  • Conference paper
On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops (OTM 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2889))

  • 463 Accesses

Abstract

The existing authorization policy language and technologies in traditional distributed systems can not meet the requirements of dynamic ubiquitous computing environment. The provision of an efficient and flexible policy specification approach is needed to support the deployment of access control of mobile computing applications. This paper introduces a deontic concepts based approach for security policy specification in the wireless, mobile computing environment, considers in particular the problems that can arise when collaborative commitment are negotiated via agents communication, and give the description of relationship between obligation and commitment in the specific organization domains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Abrahams, A., Bacon, J.: The Life and Times of Identified, Situated and Conflicting Norms. In: Proc Sixth International Workshop on Deontic Logic in Computer Science (DEON 2002), London, May 2002, pp. 3–20 (2002)

    Google Scholar 

  • Ahn, G.J., Sandhu, R.: Role-based Authorization Constraints Specification. ACM Transactions on Information and Systems Security 3(4) (November 2000)

    Google Scholar 

  • Bacon, J., Lloyd, M., Moody, K.: Translating Role-Based Access Control Policy within Context. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, p. 107. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  • Bacon, J., Moody, K., Yao, W.: A model of Oasis role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC) 5(4), 492–540 (2002)

    Article  Google Scholar 

  • Bell, D.E., LaPadula, L.J.: Secure computer systems: Unified exposition and multics interpretation. Technical Report ESC-TR-75-306, The MITRE Corporation, Bedford, MA, USA (March 1975)

    Google Scholar 

  • Cholvy, L., Cuppens, F.: Analyzing Consistency of Security Policies. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 103–112. IEEE Press, Oakland (1997)

    Google Scholar 

  • Colombetti, M.: A commitment-based approach to agent speech acts and conversations. In: Proc. Workshop on Agent Languages and Communication Policies, 4th International Conference on Autonomous Agents (Agents 2000), Barcelona (E), pp. 21–29 (2000)

    Google Scholar 

  • Devlin, K.: Logic and Information. Cambridge University Press, Cambridge (1991)

    MATH  Google Scholar 

  • Devlin, K., Rosenberg, D.: Language at Work: Analyzing Communication Breakdown in the Workplace to Inform Systems Design. CSLI, Stanford (1996)

    MATH  Google Scholar 

  • Haag, Z.: Deontic Logic Based Process Modelling for Coordination Support in Virtual Software Corporations. PhD Thesis, Glasgow Caledonian University (June 2000)

    Google Scholar 

  • Haag, Z., Foley, R., Newman, J.: A Deontic Formalism for Coordinating Software Development in Virtual Software Corporations. In: IEEE 7th Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 1998), pp. 15–20. IEEE Computer Society Press, Los Alamitos (1998)

    Chapter  Google Scholar 

  • Hayton, R., Bacon, J., Moody, K.: OASIS: Access Control in an Open, Distributed Environment. In: Proc IEEE Symposium on Security and Privacy, Oakland CA, May 1998, pp. 3–14 (1998)

    Google Scholar 

  • Meyer, J.-J.C.: A Different Approach to Deontic Logic: Deontic Logic Viewed as a Variant of Dynamic Logic. Notre Dame Journal Of Formal Logic 29(1), 109–136 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  • Meyer, J.-J.C., Wieringa, R.J. (eds.): Deontic Logic in Computer Science: Normative System Specification. John Wiley & Son, Chichester (1993)

    MATH  Google Scholar 

  • NCSC A Guide to understand Discretionary Access Control in Trusted Systems. National Computer Security Center (1987)

    Google Scholar 

  • Ortalo, R.: A Flexible Method for Information System Security Policy Specification. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 67–85. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  • Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  • Searle, J.R.: A Taxonomy of illocutionary acts. In: Gunderson, K. (ed.) Language, mind, and knowledge(Minnesota Studies in the Philosophy of Science VII), pp. 344–369. University of Minnesota Press (1975); Reprinted in Searle, J. R.: Expression and Meaning. Cambridge University Press, Cambridge (1979)

    Google Scholar 

  • Sergot, M.J.: A computational theory of normative positions. ACM Transactions on Computational Logic 2(4), 581–622 (2001)

    Article  MathSciNet  Google Scholar 

  • Winograd, T., Flores, F.: Understanding Computers and Cognition. Addison Wesley, New York (1987)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gong, X., Newman, J. (2003). The Role of Deontic Concepts and Commitment in the Policy Specification of Mobile Computing Environment. In: Meersman, R., Tari, Z. (eds) On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops. OTM 2003. Lecture Notes in Computer Science, vol 2889. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39962-9_80

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39962-9_80

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20494-7

  • Online ISBN: 978-3-540-39962-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics