There is to add that, being involved a reasoning
procedure, one must ensure that all the data types
(e.g. numbers, dates, geo-locations) in the ontology
are correctly managed by an OWL reasoner in order
to generate complete inferences.
7 RELATED WORK
Bonatti, Olmedilla and Peer (Bonatti et al., 2006) an-
alyzed the possibility of generating policy explana-
tions, with the Protune policy language, using abduc-
tive logic procedures. They do not rely on standard
abductive tools, explaining that “There is no support
for explaining infinite failed derivations” (p. 1). The
problem is resolved in the present work with the dif-
ferent approach of reasoning on the identities that are
able to access to specific resources, and then explain-
ing in what the current user is different, as presented
in section 4.2. Also, they do not deal with the problem
of non user-friendly explanations, while the present
work proposes the different approach of inductiverea-
soning. Furthermore, their approach is not able to
manage specific data types and data constraint, as,
e.g., expressing that a user must have a minimum age
to access to a resource.
KNOW System (Kapadia et al., 2004) is a method
for providing feedback to users who are denied ac-
cess to resources, using Ordered Binary Decision Di-
agrams. The feedback returned consists in a set of
policy changes, that are sufficient and necessary to
obtain a permission. No verbose explanation is fore-
seen; also, they make use of no reasoning procedure.
8 FUTURE WORK
Computational resources required for OWL reasoning
are usually consistent for large ontologies. Needing
the present work to eventually generate all the pos-
sible privileges and theorems for even large knowl-
edge bases, the performances in a real environment
are to be evaluated, and ways to lower the compu-
tational load are eventually to be identified. The us-
age of SPARQL-DL query language (Sirin and Parsia,
2007), allowing queries for inferred knowledge, rep-
resents a possible way.
Moreover, the approach must be tested in real en-
vironments also to evaluating interfaces usability and
user satisfaction.
Also, the possibility to expand further the ex-
pressivity of the used policy language, starting from
PoSecCo IT Policy, has to be studied. For example, as
presented in section 6, some languages express obli-
gations to be fulfilled by the user. Other advance-
ments must concern general environment states, as,
e.g., generation of policy decisions as a consequence
of current date and time.
Finally, applicability to other policy languages
(see section 6) has to be studied in deep, especially for
the most widespread policy languages, as XACML.
REFERENCES
Agrawal, R., Imieli´nski, T., and Swami, A. (1993). Min-
ing association rules between sets of items in large
databases. SIGMOD Rec., 22(2):207–216.
Agrawal, R. and Srikant, R. (1994). Fast algorithms for
mining association rules in large databases. In Pro-
ceedings of the 20th International Conference on Very
Large Data Bases, VLDB ’94, pages 487–499, San
Francisco, CA, USA. Morgan Kaufmann Publishers
Inc.
Basile, C., Lioy, A., and Paraboschi, S. (2012). The posecco
security decision support system. In Reimer, H.,
Pohlmann, N., and Schneider, W., editors, ISSE 2012
Securing Electronic Business Processes, pages 64–74.
Springer Fachmedien Wiesbaden.
Bonatti, P. A., Olmedilla, D., and Peer, J. (2006). Advanced
policy explanations on the web. In Proceedings of the
2006 Conference on ECAI 2006: 17th European Con-
ference on Artificial Intelligence August 29 – Septem-
ber 1, 2006, Riva Del Garda, Italy, pages 200–204,
Amsterdam, The Netherlands, The Netherlands. IOS
Press.
Coi, J. L. D. and Olmedilla, D. (2008). A review of trust
management, security and privacy policy languages.
In International Conference on Security and Cryptog-
raphy (SECRYPT 2008). INSTICC Press.
Horridge, M., Parsia, B., and Sattler, U. (2008). Laconic
and precise justifications in owl. In Proceedings of
the 7th International Conference on The Semantic
Web, ISWC ’08, pages 323–338, Berlin, Heidelberg.
Springer-Verlag.
Kapadia, A., Sampemane, G., and Campbell, R. H. (2004).
Know why your access was denied: Regulating feed-
back for usable security. In Proceedings of the 11th
ACM Conference on Computer and Communications
Security, CCS ’04, pages 52–61, New York, NY, USA.
ACM.
Neri, Mutti, Psaila, Salvaneschi, Verdicchio, and Basile
(2013). D2.5 - IT Policy Meta-Model and Language.
PoSecCo WP2, Business and IT level policies.
Sirin, E. and Parsia, B. (2007). Sparql-dl: Sparql query for
owl-dl. In In 3rd OWL Experiences and Directions
Workshop (OWLED-2007).
SECRYPT2014-InternationalConferenceonSecurityandCryptography
462