Abstract
The existing authorization policy language and technologies in traditional distributed systems can not meet the requirements of dynamic ubiquitous computing environment. The provision of an efficient and flexible policy specification approach is needed to support the deployment of access control of mobile computing applications. This paper introduces a deontic concepts based approach for security policy specification in the wireless, mobile computing environment, considers in particular the problems that can arise when collaborative commitment are negotiated via agents communication, and give the description of relationship between obligation and commitment in the specific organization domains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abrahams, A., Bacon, J.: The Life and Times of Identified, Situated and Conflicting Norms. In: Proc Sixth International Workshop on Deontic Logic in Computer Science (DEON 2002), London, May 2002, pp. 3–20 (2002)
Ahn, G.J., Sandhu, R.: Role-based Authorization Constraints Specification. ACM Transactions on Information and Systems Security 3(4) (November 2000)
Bacon, J., Lloyd, M., Moody, K.: Translating Role-Based Access Control Policy within Context. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, p. 107. Springer, Heidelberg (2001)
Bacon, J., Moody, K., Yao, W.: A model of Oasis role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC) 5(4), 492–540 (2002)
Bell, D.E., LaPadula, L.J.: Secure computer systems: Unified exposition and multics interpretation. Technical Report ESC-TR-75-306, The MITRE Corporation, Bedford, MA, USA (March 1975)
Cholvy, L., Cuppens, F.: Analyzing Consistency of Security Policies. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 103–112. IEEE Press, Oakland (1997)
Colombetti, M.: A commitment-based approach to agent speech acts and conversations. In: Proc. Workshop on Agent Languages and Communication Policies, 4th International Conference on Autonomous Agents (Agents 2000), Barcelona (E), pp. 21–29 (2000)
Devlin, K.: Logic and Information. Cambridge University Press, Cambridge (1991)
Devlin, K., Rosenberg, D.: Language at Work: Analyzing Communication Breakdown in the Workplace to Inform Systems Design. CSLI, Stanford (1996)
Haag, Z.: Deontic Logic Based Process Modelling for Coordination Support in Virtual Software Corporations. PhD Thesis, Glasgow Caledonian University (June 2000)
Haag, Z., Foley, R., Newman, J.: A Deontic Formalism for Coordinating Software Development in Virtual Software Corporations. In: IEEE 7th Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 1998), pp. 15–20. IEEE Computer Society Press, Los Alamitos (1998)
Hayton, R., Bacon, J., Moody, K.: OASIS: Access Control in an Open, Distributed Environment. In: Proc IEEE Symposium on Security and Privacy, Oakland CA, May 1998, pp. 3–14 (1998)
Meyer, J.-J.C.: A Different Approach to Deontic Logic: Deontic Logic Viewed as a Variant of Dynamic Logic. Notre Dame Journal Of Formal Logic 29(1), 109–136 (1988)
Meyer, J.-J.C., Wieringa, R.J. (eds.): Deontic Logic in Computer Science: Normative System Specification. John Wiley & Son, Chichester (1993)
NCSC A Guide to understand Discretionary Access Control in Trusted Systems. National Computer Security Center (1987)
Ortalo, R.: A Flexible Method for Information System Security Policy Specification. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 67–85. Springer, Heidelberg (1998)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. Computer 29(2), 38–47 (1996)
Searle, J.R.: A Taxonomy of illocutionary acts. In: Gunderson, K. (ed.) Language, mind, and knowledge(Minnesota Studies in the Philosophy of Science VII), pp. 344–369. University of Minnesota Press (1975); Reprinted in Searle, J. R.: Expression and Meaning. Cambridge University Press, Cambridge (1979)
Sergot, M.J.: A computational theory of normative positions. ACM Transactions on Computational Logic 2(4), 581–622 (2001)
Winograd, T., Flores, F.: Understanding Computers and Cognition. Addison Wesley, New York (1987)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gong, X., Newman, J. (2003). The Role of Deontic Concepts and Commitment in the Policy Specification of Mobile Computing Environment. In: Meersman, R., Tari, Z. (eds) On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops. OTM 2003. Lecture Notes in Computer Science, vol 2889. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39962-9_80
Download citation
DOI: https://doi.org/10.1007/978-3-540-39962-9_80
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20494-7
Online ISBN: 978-3-540-39962-9
eBook Packages: Springer Book Archive