The Experts below are selected from a list of 1014 Experts worldwide ranked by ideXlab platform
Francesco Santini - One of the best experts on this subject based on the ideXlab platform.
-
Negotiation of Weighted RTML Credentials on Mobile Devices
Information Systems: Crossroads for Organization Management Accounting and Engineering, 2012Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco Roperti, Francesco SantiniAbstract:In this paper we describe an implementation for mobile phones of two important services in logical reasoning, that is deduction and abduction, defined over a set of weighted credentials. The main benefit comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the Access. We implement a negotiation of credentials between two mobile devices in order to grant the Access to the requestor peer, with the use of deduction/abduction services.
-
ATC - A formal framework for trust policy negotiation in autonomic systems: abduction with soft constraints
Lecture Notes in Computer Science, 2010Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco SantiniAbstract:We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In particular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with Access control policies and credentials. In this way, we can associate the level of preference defined by the "softness" of the constraint with a "level" of trust. The main benefit comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the Access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.
-
A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction
2010Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco SantiniAbstract:We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In partic- ular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with Access control policies and credentials. In this way, we can associate the level of preference de¯ned by the \softness" of the constraint with a \level" of trust. The main bene¯t comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not su±cient, abduction can be used to compute the missing credentials and the levels that grant the Access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.
J.r. Burruss - One of the best experts on this subject based on the ideXlab platform.
-
ROAM: An Authorization Manager for Grids
Journal of Grid Computing, 2006Co-Authors: J.r. Burruss, T. W. Fredian, M. R. ThompsonAbstract:The Resource Oriented Authorization Manager (ROAM) was created to provide a simple but flexible Authorization system for the FusionGrid computational Grid. ROAM builds on and extends previous community efforts by both responding to Access Authorization requests and by providing a Web interface for resource management. ROAM works with the Globus Resource Allocation Manager (GRAM), and is general enough to be used by other virtual organizations that use Globus middleware or X.509/TLS authentication schemes to secure a Grid of distributed resources. In addition to describing ROAM, this paper discusses the basic design parameters of a Grid Authorization system and the reasons for the choices made in the ROAM design.
-
HPDC - The resource oriented Authorization manager (ROAM)
HPDC-14. Proceedings. 14th IEEE International Symposium on High Performance Distributed Computing 2005., 1Co-Authors: J.r. BurrussAbstract:The resource oriented Authorization manager (ROAM) was created to provide a simple but flexible Authorization system for the National Fusion Grid (FusionGrid). This system builds on and extends previous community efforts by both responding to Access Authorization requests and by providing a Web interface/or resource management. ROAM works with the globus resource allocation manager (GRAM), and is general enough to be used by other virtual organizations that use Globus middleware or X.509/TLS authentication schemes to secure a grid of distributed resources.
Stefano Bistarelli - One of the best experts on this subject based on the ideXlab platform.
-
Negotiation of Weighted RTML Credentials on Mobile Devices
Information Systems: Crossroads for Organization Management Accounting and Engineering, 2012Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco Roperti, Francesco SantiniAbstract:In this paper we describe an implementation for mobile phones of two important services in logical reasoning, that is deduction and abduction, defined over a set of weighted credentials. The main benefit comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the Access. We implement a negotiation of credentials between two mobile devices in order to grant the Access to the requestor peer, with the use of deduction/abduction services.
-
ATC - A formal framework for trust policy negotiation in autonomic systems: abduction with soft constraints
Lecture Notes in Computer Science, 2010Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco SantiniAbstract:We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In particular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with Access control policies and credentials. In this way, we can associate the level of preference defined by the "softness" of the constraint with a "level" of trust. The main benefit comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the Access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.
-
A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction
2010Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco SantiniAbstract:We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In partic- ular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with Access control policies and credentials. In this way, we can associate the level of preference de¯ned by the \softness" of the constraint with a \level" of trust. The main bene¯t comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not su±cient, abduction can be used to compute the missing credentials and the levels that grant the Access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.
Fabio Martinelli - One of the best experts on this subject based on the ideXlab platform.
-
Negotiation of Weighted RTML Credentials on Mobile Devices
Information Systems: Crossroads for Organization Management Accounting and Engineering, 2012Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco Roperti, Francesco SantiniAbstract:In this paper we describe an implementation for mobile phones of two important services in logical reasoning, that is deduction and abduction, defined over a set of weighted credentials. The main benefit comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the Access. We implement a negotiation of credentials between two mobile devices in order to grant the Access to the requestor peer, with the use of deduction/abduction services.
-
ATC - A formal framework for trust policy negotiation in autonomic systems: abduction with soft constraints
Lecture Notes in Computer Science, 2010Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco SantiniAbstract:We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In particular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with Access control policies and credentials. In this way, we can associate the level of preference defined by the "softness" of the constraint with a "level" of trust. The main benefit comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the Access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.
-
A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction
2010Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco SantiniAbstract:We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In partic- ular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with Access control policies and credentials. In this way, we can associate the level of preference de¯ned by the \softness" of the constraint with a \level" of trust. The main bene¯t comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not su±cient, abduction can be used to compute the missing credentials and the levels that grant the Access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.
M. R. Thompson - One of the best experts on this subject based on the ideXlab platform.
-
ROAM: An Authorization Manager for Grids
Journal of Grid Computing, 2006Co-Authors: J.r. Burruss, T. W. Fredian, M. R. ThompsonAbstract:The Resource Oriented Authorization Manager (ROAM) was created to provide a simple but flexible Authorization system for the FusionGrid computational Grid. ROAM builds on and extends previous community efforts by both responding to Access Authorization requests and by providing a Web interface for resource management. ROAM works with the Globus Resource Allocation Manager (GRAM), and is general enough to be used by other virtual organizations that use Globus middleware or X.509/TLS authentication schemes to secure a Grid of distributed resources. In addition to describing ROAM, this paper discusses the basic design parameters of a Grid Authorization system and the reasons for the choices made in the ROAM design.