Abstract
Mobile social networks give online social networking sites the capabilities to extend their services to mobile device users. Smart phones and tablets allow users to interact with each other when they are moving. Policy-based management simplifies the management of interaction functionalities by establishing policies to control various activities involved in these functionalities. To detect and resolve potential dynamic conflicts between the rules and configurations from different administrative domains, a knowledge-based policy analysis framework is proposed in this paper. It incorporates relationships between different elements in policy rules into temporal logic using a knowledge extension, which makes dynamic policy conflict analysis more accurate. A prototype system for mobile social networks is implemented to illustrate the capability of this framework.



Similar content being viewed by others
References
Ahn, G., Xu, W., & Zhang, X. (2008). Systematic policy analysis for high-assurance services in SELinux. In Proceedings of IEEE workshop on policies for distributed systems and, networks, pp. 3–10.
Bacchus, F., & Kabanza, F. (1998). Planning for temporally extended goals. Annals of Mathematics and Artificial Intelligence, 22, 5–27.
Becker, M. Y. (2009). Specification and analysis of dynamic authorisation policies. In Proceedings of 22nd IEEE computer security foundations symposium pp. 203–217.
Bellini, P., Mattolini, R., & Nesi, P. (2000). Temporal logics for real-time system specification. ACM Computing Surveys, 32(1), 12–42.
Bowman, H., & Thompson, S. J. (2003). A decision procedure and complete axiomatization of finite interval temporal logic with projection. Journal of Logic and Computation, 13(2), 195–239.
Calvanese, D., De Giacomo, G., & Vardi, M. Y. (2002). Reasoning about actions and planning in LTL action theories. In Proceedings of the 8th international conference on principles of knowledge representation and reasoning pp. 593–602.
Charalambides, M., Flegkas, C., Pavlou, P., Rubio-Loyola, G., Bandara, J., Lupu, A. K., et al. (2009). Policy conflict analysis for diffserv quality of service management. IEEE Transactions on Network and Service Management, 6(1), 15–30.
Craven, R, Lobo, J, & Ma, J. F. (2009). Expressive policy analysis with enhanced system dynamicity. In Proceedings of the 4th international symposium on information, computer, and communications, security pp. 239–250.
Deng, L., Cai, Y., Wang, C., & Jiang, Y. (2009). Fuzzy Temporal logic on fuzzy temporal constraint networks. In Proceedings of sixth international conference on fuzzy systems and knowledge discovery, Vol. 6, pp. 272–276.
Dunlop, N., Indulska, J., & Raymond, K. (2002). Dynamic conflict detection in policy-based management systems. In Proceedings of sixth international enterprise distributed object computing conference, pp. 15–26.
Eamani, A., & Sistla, P. (2006). Language based policy analysis in a SPKI trust management system. Journal of Computer Security, 14(4), 327–357.
Friedman, N., Halpern, J., & Koller, D. (2000). First-order conditional logic for default reasoning revisited. ACM Transactions on Computational Logic, 1(2), 175–207.
Giordano, L., Martelli, A., & Schwind, C. (2007). Specifying and verifying interaction protocols in a temporal action logic. Journal of Applied Logic, 5(2), 214–234.
Henriksen, J. G., & Thiagarajan, P. S. (1999). Dynamic liner time temporal logic. Annals of Pure and Applied Logic, 96(1–3), 187–207.
Janicke, H., Cau, A., Siewe F., & Zedan, H. (2007). Deriving enforcement mechanisms from policies. In Proceedings of eighth IEEE international workshop on policies for distributed systems and, networks, pp. 161–172.
Kolovski, V., Hendler, J., & Parsia, B. (2007). Analyzing Web Access Control Policies. In Proceedings of the 16th international conference on, World Wide Web, pp. 677–686.
Lluch-Lafuente, A., & Montanari, U. (2005). Quantitative \(\mu \)-calculus and CTL based on constraint semirings. Electronic Notes in Theoretical Computer Science, 112, 37–59.
McDaniel, P., & Prakash, A. (2006). Methods and limitations of security policy reconciliation. ACM Transactions on Information and System Security, 9(3), 259–291.
Moszkowski, B. (2004). A hierarchical completeness proof for propositional interval temporal logic with finite time. Journal of Applied Non- Classical Logics, 14(1–2), 55–104.
Mylopoulos, J. (1980). An overview of knowledge representation. In Proceedings of the 1980 workshop on Data abstraction, databases and conceptual modeling, pp. 5–12.
Niksefat, S., & Sabaei, M. (2010). Efficient algorithms for dynamic detection and resolution of IPSec/VPN security policy conflicts. In Proceedings of 24th IEEE international conference on advanced information networking and applications pp. 737–744.
Samak, T., Al-Shaer, E., & Hong, L. (2008). QoS policy modeling and conflict analysis. In Proceedings of IEEE workshop on policies for distributed systems and, networks, pp. 19–26.
Sistla, P., & Zhou, M. (2008). Analysis of dynamic policies. Information and Computation, 204(2–4), 185–212.
Sorensen, L. T., & Skouby, K. E. (2009). Requirements on next generation social networking—A user’s perspective. Wireless Personal Communications, 51(4), 811–823.
Wu, Z., & Liu, Y. (2011). Knowledge-based policy conflict analysis in mobile social networks. In Proceedings of 20th international conference on computer communications and, networks, pp. 1–6.
Wu, Z., & Wang, L. (2010). An innovative simulation environment for cross-domain policy enforcement. Simulation Modelling Practice and Theory, 19(7), 1558–1583.
Zalta, E. (2008). Temporal logic, the Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/archives/fall2008/entries/logic-temporal/.
Zhang, H., & Shen, H. (2009). A social network based file sharing system in mobile peer-to-peer networks. In Proceedings of 18th internatonal conference on computer communications and, networks, pp. 1–6.
Zhang, J., & Cheng Betty, H. C. (2006). Using temporal logic to specify adaptive program semantics. Journal of Systems and Software, 79(10), 1361–1369.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wu, Z., Liu, Y. Knowledge-Based Policy Conflict Analysis in Mobile Social Networks. Wireless Pers Commun 73, 5–22 (2013). https://doi.org/10.1007/s11277-012-0964-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0964-0