Batsakis, S., Stravoskoufos, K., and Petrakis, E. G. M.
(2011). Temporal Reasoning for Supporting Tempo-
ral Queries in OWL 2.0. In Konig, A., Dengel, A.,
Hinkelmann, K., Kise, K., Howlett, R. J., and Jain,
L. C., editors, KES (1), volume 6881 of Lecture Notes
in Computer Science, pages 558–567. Springer.
DL query (2008). DL Query guide - Prot
´
eg
´
e DLQuery-
Tab. http://protegewiki.stanford.edu/wiki/
DLQueryTab.
Ferrini, R. and Bertino, E. (2009). Supporting RBAC with
XACML+OWL. In Proceedings of the 14th ACM
Symposium on Access Control Models and Technolo-
gies, SACMAT ’09, pages 145–154, New York, NY,
USA. ACM.
Finin, T., Joshi, A., Kagal, L., Niu, J., Sandhu, R., Winsbor-
ough, W. H., and Thuraisingham, B. (2008). ROWL-
BAC - Representing Role Based Access Control in
OWL. In Proceedings of the 13th Symposium on
Access control Models and Technologies, Estes Park,
Colorado, USA. ACM Press.
Fornara, N. and Colombetti, M. (2010). Ontology and Time
Evolution of Obligations and Prohibitions Using Se-
mantic Web Technology. In Baldoni, M., Bentahar,
J., van Riemsdijk, M., and Lloyd, J., editors, Declara-
tive Agent Languages and Technologies VII, volume
5948 of Lecture Notes in Computer Science, pages
101–118. Springer Berlin Heidelberg.
Hitzler, P., Kr
¨
otzsch, M., and Rudolph, S. (2009). Foun-
dations of Semantic Web Technologies. Chapman &
Hall/CRC. Pages 226–229.
Horridge, M. and Bechhofer, S. (2011). The OWL API: A
Java API for OWL Ontologies. Semant. web, 2(1):11–
21.
Horridge, M., Parsia, B., and Sattler, U. (2008). Laconic
and Precise Justifications in OWL. In Proceedings
of the 7th International Conference on The Semantic
Web, ISWC ’08, pages 323–338, Berlin, Heidelberg.
Springer-Verlag.
Horridge, M. and Patel-schneider, P. F. (2008). P.F.: Manch-
ester syntax for OWL 1.1. In In: OWLED 2008, 4th
international workshop OWL: Experiences and Direc-
tions (2008) Live Extraction 1223.
Kolovski, V., Hendler, J., and Parsia, B. (2007). Analyzing
Web Access Control Policies. In Proceedings of the
16th International Conference on World Wide Web,
WWW ’07, pages 677–686, New York, NY, USA.
ACM.
L
´
opez, F. L. Y., Luck, M., and D’Inverno, M. (2006).
A Normative Framework for Agent-based Systems.
Comput. Math. Organ. Theory, 12(2-3):227–250.
Marfia, F. (2014). Using Abductive and Inductive Infer-
ence to Generate Policy Explanations. In Obaidat, M.,
Holzinger, A., and Samarati, P., editors, Proceedings
of International Conference on Security and Cryptog-
raphy (SECRYPT 2014). SciTePress.
Mourad, A. and Jebbaoui, H. (2015). SBA-XACML:
Set-based approach providing efficient policy deci-
sion process for accessing Web services. Expert Syst.
Appl., 42(1):165–178.
Paraboschi and Arrigoni Neri (2013). D2.4 - Policy Har-
monization and Reasoning. PoSecCo WP2, Business
and IT level policies.
Posecco (2010). PoSecCo - Policy and Security Configura-
tion Management. http://www.posecco.eu/.
Primelife (2008). PrimeLife - Bringing sustainable privacy
and identity management to future networks and ser-
vices. http://primelife.ercim.eu/.
Sensoy, M., Norman, T. J., Vasconcelos, W. W., and Sycara,
K. (2012). OWL-POLAR: A Framework for Semantic
Policy Representation and Reasoning. Web Semant.,
12-13:148–160.
Shearer, R., Motik, B., and Horrocks, I. (2008). HermiT: A
Highly-Efficient OWL Reasoner. In Dolbear, C., Rut-
tenberg, A., and Sattler, U., editors, OWLED, volume
432 of CEUR Workshop Proceedings. CEUR-WS.org.
Singh, M. P. (1998). An Ontology for Commitments in Mul-
tiagent Systems: Toward a Unification of Normative
Concepts. Artificial Intelligence and Law, 7:97–113.
Sirin, E. and Parsia, B. (2007). SPARQL-DL: SPARQL
Query for OWL-DL. In In 3rd OWL Experiences and
Directions Workshop (OWLED-2007.
SUN XACML (2004). Sun’s XACML implementation.
http://sunxacml.sourceforge.net/.
SWRL Rules (2004). SWRL: A Semantic Web Rule Lan-
guage Combining OWL and RuleML. http://www.
w3.org/Submission/SWRL/.
Uszok, A. and Bradshaw, J. M. (2008). Demonstrating
Selected W3C Policy Languages Interest Group Use
Cases Using the KAoS Policy Services Framework.
In POLICY, pages 233–234. IEEE Computer Society.
XACML Combining Algorithms (2013). OASIS XACML
Version 3.0 Specification, Combining algorithms.
http://docs.oasis-open.org/xacml/3.0/
xacml-3.0-core-spec-cs-01-en.pdf. page 5.
XACML Data-Flow model (2013). OASIS XACML
Version 3.0 Specification, Data-flow model.
http://docs.oasis-open.org/xacml/3.0/
xacml-3.0-core-spec-cs-01-en.pdf. pages
19–20.
XACML RFC2904 (2000). RFC2904 - AAA Authoriza-
tion Framework Memo. http://tools.ietf.org/
html/rfc2904.
XACML Standard (2013). OASIS eXtensible Access Con-
trol Markup Language (XACML). https://www.
oasis-open.org/committees/xacml/.
XEngine (2008). XEngine: A Fast and Scalable XACML
Policy Evaluation Engine. http://xacmlpdp.
sourceforge.net/.
APPENDIX
We present the complete XACML code in this ap-
pendix for the example policies mentioned in Section
3. It is shown in Listings 1 and 2.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
134