Skip to main content
Log in

Knowledge-Based Policy Conflict Analysis in Mobile Social Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile social networks give online social networking sites the capabilities to extend their services to mobile device users. Smart phones and tablets allow users to interact with each other when they are moving. Policy-based management simplifies the management of interaction functionalities by establishing policies to control various activities involved in these functionalities. To detect and resolve potential dynamic conflicts between the rules and configurations from different administrative domains, a knowledge-based policy analysis framework is proposed in this paper. It incorporates relationships between different elements in policy rules into temporal logic using a knowledge extension, which makes dynamic policy conflict analysis more accurate. A prototype system for mobile social networks is implemented to illustrate the capability of this framework.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Ahn, G., Xu, W., & Zhang, X. (2008). Systematic policy analysis for high-assurance services in SELinux. In Proceedings of IEEE workshop on policies for distributed systems and, networks, pp. 3–10.

  2. Bacchus, F., & Kabanza, F. (1998). Planning for temporally extended goals. Annals of Mathematics and Artificial Intelligence, 22, 5–27.

    Article  MathSciNet  MATH  Google Scholar 

  3. Becker, M. Y. (2009). Specification and analysis of dynamic authorisation policies. In Proceedings of 22nd IEEE computer security foundations symposium pp. 203–217.

  4. Bellini, P., Mattolini, R., & Nesi, P. (2000). Temporal logics for real-time system specification. ACM Computing Surveys, 32(1), 12–42.

    Article  Google Scholar 

  5. Bowman, H., & Thompson, S. J. (2003). A decision procedure and complete axiomatization of finite interval temporal logic with projection. Journal of Logic and Computation, 13(2), 195–239.

    Article  MathSciNet  MATH  Google Scholar 

  6. Calvanese, D., De Giacomo, G., & Vardi, M. Y. (2002). Reasoning about actions and planning in LTL action theories. In Proceedings of the 8th international conference on principles of knowledge representation and reasoning pp. 593–602.

  7. Charalambides, M., Flegkas, C., Pavlou, P., Rubio-Loyola, G., Bandara, J., Lupu, A. K., et al. (2009). Policy conflict analysis for diffserv quality of service management. IEEE Transactions on Network and Service Management, 6(1), 15–30.

    Article  Google Scholar 

  8. Craven, R, Lobo, J, & Ma, J. F. (2009). Expressive policy analysis with enhanced system dynamicity. In Proceedings of the 4th international symposium on information, computer, and communications, security pp. 239–250.

  9. Deng, L., Cai, Y., Wang, C., & Jiang, Y. (2009). Fuzzy Temporal logic on fuzzy temporal constraint networks. In Proceedings of sixth international conference on fuzzy systems and knowledge discovery, Vol. 6, pp. 272–276.

  10. Dunlop, N., Indulska, J., & Raymond, K. (2002). Dynamic conflict detection in policy-based management systems. In Proceedings of sixth international enterprise distributed object computing conference, pp. 15–26.

  11. Eamani, A., & Sistla, P. (2006). Language based policy analysis in a SPKI trust management system. Journal of Computer Security, 14(4), 327–357.

    Google Scholar 

  12. Friedman, N., Halpern, J., & Koller, D. (2000). First-order conditional logic for default reasoning revisited. ACM Transactions on Computational Logic, 1(2), 175–207.

    Article  MathSciNet  Google Scholar 

  13. Giordano, L., Martelli, A., & Schwind, C. (2007). Specifying and verifying interaction protocols in a temporal action logic. Journal of Applied Logic, 5(2), 214–234.

    Article  MathSciNet  MATH  Google Scholar 

  14. Henriksen, J. G., & Thiagarajan, P. S. (1999). Dynamic liner time temporal logic. Annals of Pure and Applied Logic, 96(1–3), 187–207.

    Article  MathSciNet  MATH  Google Scholar 

  15. Janicke, H., Cau, A., Siewe F., & Zedan, H. (2007). Deriving enforcement mechanisms from policies. In Proceedings of eighth IEEE international workshop on policies for distributed systems and, networks, pp. 161–172.

  16. Kolovski, V., Hendler, J., & Parsia, B. (2007). Analyzing Web Access Control Policies. In Proceedings of the 16th international conference on, World Wide Web, pp. 677–686.

  17. Lluch-Lafuente, A., & Montanari, U. (2005). Quantitative \(\mu \)-calculus and CTL based on constraint semirings. Electronic Notes in Theoretical Computer Science, 112, 37–59.

    Article  Google Scholar 

  18. McDaniel, P., & Prakash, A. (2006). Methods and limitations of security policy reconciliation. ACM Transactions on Information and System Security, 9(3), 259–291.

    Article  Google Scholar 

  19. Moszkowski, B. (2004). A hierarchical completeness proof for propositional interval temporal logic with finite time. Journal of Applied Non- Classical Logics, 14(1–2), 55–104.

    Article  MATH  Google Scholar 

  20. Mylopoulos, J. (1980). An overview of knowledge representation. In Proceedings of the 1980 workshop on Data abstraction, databases and conceptual modeling, pp. 5–12.

  21. Niksefat, S., & Sabaei, M. (2010). Efficient algorithms for dynamic detection and resolution of IPSec/VPN security policy conflicts. In Proceedings of 24th IEEE international conference on advanced information networking and applications pp. 737–744.

  22. Samak, T., Al-Shaer, E., & Hong, L. (2008). QoS policy modeling and conflict analysis. In Proceedings of IEEE workshop on policies for distributed systems and, networks, pp. 19–26.

  23. Sistla, P., & Zhou, M. (2008). Analysis of dynamic policies. Information and Computation, 204(2–4), 185–212.

    Article  MathSciNet  Google Scholar 

  24. Sorensen, L. T., & Skouby, K. E. (2009). Requirements on next generation social networking—A user’s perspective. Wireless Personal Communications, 51(4), 811–823.

    Article  Google Scholar 

  25. Wu, Z., & Liu, Y. (2011). Knowledge-based policy conflict analysis in mobile social networks. In Proceedings of 20th international conference on computer communications and, networks, pp. 1–6.

  26. Wu, Z., & Wang, L. (2010). An innovative simulation environment for cross-domain policy enforcement. Simulation Modelling Practice and Theory, 19(7), 1558–1583.

    Article  Google Scholar 

  27. Zalta, E. (2008). Temporal logic, the Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/archives/fall2008/entries/logic-temporal/.

  28. Zhang, H., & Shen, H. (2009). A social network based file sharing system in mobile peer-to-peer networks. In Proceedings of 18th internatonal conference on computer communications and, networks, pp. 1–6.

  29. Zhang, J., & Cheng Betty, H. C. (2006). Using temporal logic to specify adaptive program semantics. Journal of Systems and Software, 79(10), 1361–1369.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuanyao Liu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wu, Z., Liu, Y. Knowledge-Based Policy Conflict Analysis in Mobile Social Networks. Wireless Pers Commun 73, 5–22 (2013). https://doi.org/10.1007/s11277-012-0964-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-012-0964-0

Keywords

Navigation