Obligation is regarded as one of the requirements
associated with a specific action. If subjects can del-
egate their privileges and there is an obligation com-
bined with these privileges, then we need to investi-
gate delegation of obligation as well. Another direc-
tion for future work is to engage trust management
with authorization and obligation.
REFERENCES
AL-Wahah, M. and Farkas, C. (2018a). Context-aware iot
authorization: A dynamic and adaptive approach. In
13th International Conference for Internet Technology
and Secured Transactions. (ICITST-2018), pages 64–
72. Infonomics Society.
AL-Wahah, M. and Farkas, C. (2018b). Context delegation
for context-based access control. In 2nd International
Workshop on A.I. in Security, pages 70–79. ECML.
Ardagna, C. A., Camenisch, J., Kohlweiss, M., Leenes, R.,
Neven, G., Priem, B., Samarati, P., Sommer, D., and
Verdicchio, M. (2010). Exploiting cryptography for
privacy-enhanced access control: A result of the prime
project. Journal of Computer Security, 18(1):123–
160.
Bettini, C., Jajodia, S., Wang, X., and Wijesekera, D.
(2002). Provisions and obligations in policy man-
agement and security applications. In Proceedings of
the 28th international conference on Very Large Data
Bases, pages 502–513. VLDB Endowment.
Chen, L., Crampton, J., Kollingbaum, M., and Norman, T.
(2012). Obligations in risk-aware access control. In
Privacy, Security and Trust (PST), 2012 Tenth Annual
International Conference on, pages 145–152. IEEE.
Corradi, A., Montanari, R., and Tibaldi, D. (2004). Context-
based access control management in ubiquitous envi-
ronments. In Proceedings of the 3rd IEEE Interna-
tional Symposium on Network Computing and Appli-
cations, pages 253–260. IEEE.
Dey, A., Abowd, D., and Salber, D. (2001). A concep-
tual framework and a toolkit for supporting the rapid
prototyping of context-aware applications. Hum.-
Comput. Interact., 16(2):97–166.
Elrakaiby, Y., Cuppens, F., and Cuppens-Boulahia, N.
(2012). Formal enforcement and management of obli-
gation policies. Data & Knowledge Engineering,
71(1):127–147.
Fornara, N. (2011). Specifying and monitoring obliga-
tions in open multiagent systems using semantic web
technology. In Semantic agent systems, pages 25–45.
Springer.
Friesen, J. (2019). Java XML and JSON, Document Pro-
cessing for Java SE. APress.
Hilty, M., Basin, D., and Pretschner, A. (2005). On obliga-
tions. In European Symposium on Research in Com-
puter Security, pages 98–117. Springer.
Hitzler, P., Kr
¨
otzsch, M., and Rudolph, S. (2010). Foun-
dations of Semantic Web Technologies. Chapman and
Hall/CRC Press.
Marfia, F., Fornara, N., and Nguyen, T. (2015). Modeling
and enforcing semantic obligations for access control.
In Multi-Agent Systems and Agreement Technologies,
pages 303–317. Springer.
P
´
erez, J., Arenas, M., and Gutierrez, C. (2009). Seman-
tics and complexity of sparql. ACM Transactions on
Database Systems (TODS), 34(3):1–16.
Pontual, M., Chowdhury, O., Winsborough, W. H., Yu, T.,
and Irwin, K. (2011). On the management of user
obligations. In Proceedings of the 16th ACM sym-
posium on Access control models and technologies,
pages 175–184. ACM.
Robinson, W. and Purao, S. (2009). Specifying and moni-
toring interactions and commitments in open business
processes. IEEE software, 26(2):72–79.
Rubab, I., Ali, S., Briand, L., and Traon, Y. L. (2014).
Model-based testing of obligations. In 2014 14th In-
ternational Conference on Quality Software, pages 1–
10. IEEE.
S¸ensoy, M., Norman, T., Vasconcelos, W., and Sycara, K.
(2010). Owl-polar: Semantic policies for agent rea-
soning. In International Semantic Web Conference,
pages 679–695. Springer.
SECRYPT 2019 - 16th International Conference on Security and Cryptography
540