Using Abductive and Inductive Inference to Generate Policy Explanations

Fabio Marfia

2014

Abstract

Providing reliable explanations for the causes of an access response represents an important improvement of applications usability and effectiveness, in a context where users are permitted or denied access to resources. I present an approach composed by two different procedures, both relying on OWL-DL and SWRL Rules, in order to generate policy explanations. The first procedure makes use of OWL Explanation and abductive reasoning. The second uses an algorithm of Association Rule Learning to identifying attributes and states arising together with policy privileges, in an inductive way. The PosSecCo IT Policy language is used in the present paper for representing the policies, but the approach is general enough to be applied in other environments as well.

References

  1. Agrawal, R., ImieliƁski, T., and Swami, A. (1993). Mining association rules between sets of items in large databases. SIGMOD Rec., 22(2):207-216.
  2. Agrawal, R. and Srikant, R. (1994). Fast algorithms for mining association rules in large databases. In Proceedings of the 20th International Conference on Very Large Data Bases, VLDB 7894, pages 487-499, San Francisco, CA, USA. Morgan Kaufmann Publishers Inc.
  3. Basile, C., Lioy, A., and Paraboschi, S. (2012). The posecco security decision support system. In Reimer, H., Pohlmann, N., and Schneider, W., editors, ISSE 2012 Securing Electronic Business Processes, pages 64-74. Springer Fachmedien Wiesbaden.
  4. Bonatti, P. A., Olmedilla, D., and Peer, J. (2006). Advanced policy explanations on the web. In Proceedings of the 2006 Conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 - September 1, 2006, Riva Del Garda, Italy, pages 200-204, Amsterdam, The Netherlands, The Netherlands. IOS Press.
  5. Coi, J. L. D. and Olmedilla, D. (2008). A review of trust management, security and privacy policy languages. In International Conference on Security and Cryptography (SECRYPT 2008). INSTICC Press.
  6. Horridge, M., Parsia, B., and Sattler, U. (2008). Laconic and precise justifications in owl. In Proceedings of the 7th International Conference on The Semantic Web, ISWC 7808, pages 323-338, Berlin, Heidelberg. Springer-Verlag.
  7. Kapadia, A., Sampemane, G., and Campbell, R. H. (2004). Know why your access was denied: Regulating feedback for usable security. In Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 7804, pages 52-61, New York, NY, USA. ACM.
  8. Neri, Mutti, Psaila, Salvaneschi, Verdicchio, and Basile (2013). D2.5 - IT Policy Meta-Model and Language. PoSecCo WP2, Business and IT level policies.
  9. Sirin, E. and Parsia, B. (2007). Sparql-dl: Sparql query for owl-dl. In In 3rd OWL Experiences and Directions Workshop (OWLED-2007).
Download


Paper Citation


in Harvard Style

Marfia F. (2014). Using Abductive and Inductive Inference to Generate Policy Explanations . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 457-462. DOI: 10.5220/0005116004570462


in Bibtex Style

@conference{secrypt14,
author={Fabio Marfia},
title={Using Abductive and Inductive Inference to Generate Policy Explanations},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={457-462},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005116004570462},
isbn={978-989-758-045-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Using Abductive and Inductive Inference to Generate Policy Explanations
SN - 978-989-758-045-1
AU - Marfia F.
PY - 2014
SP - 457
EP - 462
DO - 10.5220/0005116004570462