– IMStatus is a string attribute that represents a User’s instant messenger status.
– Day is a time attribute of the System user that represents the current day.
The following examples are based on two requesters indirectly accessing the infras-
tructure with an IAP and a PAP.
– The inputs to the access control algorithm are the indirect requester Ilaria, the
proxy requester FriendFinder, and the following IAP and PAP:
hMaria, #i ∈ {Ilaria, Alexia}, ¬#p.isUser, True, α
3
i
hMaria, #p ∈ {FriendFinder}, #i.isUser, True, α
⊥
, Falsei
The access control algorithm will return a sighting accuracy of α
3
. This IAP ef-
fectively allows Ilaria to obtain sightings for Maria, with a sighting accuracy
of α
3
, using any LBS that Maria trusts. However, if Maria has a higher trust in
sighting requests jointly from Ilaria and FriendFinder, then Maria creates
the following IAP that can be used with the previous PAP:
hMaria, #i ∈ {Ilaria, Alexia}, #p ∈ {FriendFinder}, True, α
2
i
– The inputs to the access control algorithm are the indirect requester Ilaria, the
proxy requester FriendFinder, and the following IAP and PAP:
hStefano, #i ∈ {Ilaria, Maria, Alexia}, ¬#p.isUser, True, α
1
i
hStefano, #p ∈ {FriendFinder}, #i.isUser, ¬(#System.Day = “Sunday”), α
4
, Truei
The access control algorithm will return a sighting accuracy of α
⊥
if it is invoked
on a Sunday, or α
4
if it is invoked on any other day.
– The inputs to the access control algorithm are the indirect requester Maria, the
proxy requester FriendFinder, and the following IAP and PAP:
hStefano, #i ∈ {Ilaria, Maria, Alexia}, ¬#p.isUser, True, α
1
i
hStefano, ¬#p.isUser, #i ∈ {Ilaria, Maria, Alexia}, True, α
⊥
, Falsei
The access control algorithm will return a sighting accuracy of α
1
. These permis-
sions have the effect of allowing Ilaria, Maria and Alexia to indirectly
retrieve Stefano’s sightings with an accuracy of α
1
using any LBS as the proxy
requester. Therefore, this PAP enables Stefano to allow Ilaria, Maria and
Alexia to delegate the sighting request rights that he gave them to any LBS.
4.4 Semantics
The access control model must enforce certain semantic rules at run-time, and if these
rules are violated then it will return a sighting accuracy of α
⊥
. Consider an example
where the inputs to the access control algorithm are the indirect requester Ilaria, the
proxy requester FriendFinder, and the following IAP and PAP:
hMaria,#i ∈ {Ilaria, Alexia}, ¬#p.isUser, Alexia.IMStatus = “Online”, α
2
i
hMaria,#p ∈ {FriendFinder}, #i.isUser, True, α
⊥
, Falsei
55