These tests confirm the theoretical claim that rea-
soning over defeasible logic requires linear time,
while satisfiability checking in Description Logic is
a significantly harder problem and can require up to
NEXPTIME, and that this is in fact noticeable for the
input dimensions we are dealing with. In the context
of our service composition approach, this means that
the merging of multiple annotated decisions can be
done quite efficiently and scales well with the num-
ber of services (i.e., policy decisions), but deciding
access requests by reasoning over Description Logic
has limits in size of the rule set and might not ful-
fill the performance requirements of each scenario.
Nevertheless, there are many optimization possibili-
ties, ranging from pre-computation and caching, on
to reducing the complexity of the problem.
5 CONCLUSIONS
We have tackled the problem of composing policy
decisions of collaborating, but independently man-
aged policy domains. We proposed an approach for
annotating policy decisions with information from
metapolicies and using it in a policy composition pro-
cess to automatically derive a decision that suits the
policies of all involved domains. In contrast to other
approaches, we do not assume policies of each do-
main to be publicly available, but rather allow each
domain to use its own policy model and language, as
long as the actual decision annotation can be mapped
to the format we use. The composition process is
based on defeasible description logic and has been
implemented in form of a module for the Apollon pol-
icy framework. By means of the prototype implemen-
tation, we were able to show that proposed solution is
applicable and show satisfying performance.
As part of our future work we further investigate
ways of handling and possibly predicting unresolv-
able conflicts between policy domains. Moreover, ex-
tending the proposed solution in a way that it sup-
ports chains of composed policy domains is currently
in progress.
REFERENCES
Baader, F., Horrocks, I., and Sattle, U. (2007). Handbook
of Knowledge Representation, chapter 3 Description
Logics, pages 135–180. Elsevier. ISBN 0444522115.
Bonatti, P., De Capitani di Vimercati, S., and Samarati, P.
(2002). An algebra for composing access control poli-
cies. ACM Transaction on Information System Secu-
rity, 5:1–35.
Cuppens, F., Cholvy, L., Saurel, C., and Carrère, J. (1998).
Merging security policies: Analysis of a practical ex-
ample. In Proc. of the 11th IEEE Computer Secu-
rity Foundations Workshop (CSFW), pages 123–137.
IEEE Computer Society Press.
Governatori, G. (2004). Defeasible description logics. In
Antoniou, G. and Boley, H., editors, Rules and Rule
Markup Languages for the Semantic Web, volume
3323 of Lecture Notes in Computer Science, pages
98–112. Springer Berlin / Heidelberg.
Kagal, L., Berners-Lee, T., Connolly, D., and Weitzner, D.
(2006). Using semantic web technologies for policy
management on the web. In Proc. 21st National Conf.
on Artificial Intelligence (AAAI).
Lee, A., Boyer, J. P., Olson, L. E., and Gunter, C. A. (2006).
Defeasible security policy composition for web ser-
vices. In Proc. of the fourth ACM workshop on Formal
methods in security, FMSE ’06, pages 45–54, New
York, NY, USA. ACM.
Nejdl, W., Olmedilla, D., Winslett, M., and Zhang, C. C.
(2005). Ontology-based policy specification and man-
agement. In In 2nd European Semantic Web Confer-
ence (ESWC), pages 290–302. Springer.
Nute, D. (2003). Defeasible logic. In Bartenstein, O.,
Geske, U., Hannebauer, M., and Yoshie, O., edi-
tors, Web Knowledge Management and Decision Sup-
port, volume 2543 of LNCS, pages 151–169. Springer
Berlin / Heidelberg.
Schütte, J. (2011). Apollon: Towards a modular semantic
policy framework for pervasive systems. In Int’l Conf.
Security and Cryptography (SECRYPT).
Toninelli, A., Montanari, R., Kagal, L., and Lassila, O.
(2007). Proteus: A semantic context-aware adaptive
policy model. In Proc. Int’l Workshop on Policies for
Distributed Systems and Networks (POLICY).
Wei, W. and Yu, T. (2010). The design and enforce-
ment of a rule-based constraint policy language for
service composition. In Social Computing (Social-
Com), 2010 IEEE Second International Conference
on, pages 873–880.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
238