Applications of abduction: knowledge-level modelling
International Journal of Human-Computer Studies
Semiring-based constraint satisfaction and optimization
Journal of the ACM (JACM)
Soft constraint propagation and solving in CHRs
Proceedings of the 2002 ACM symposium on Applied computing
Selected Papers from Constraint Programming: Basics and Trends
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Semirings for Soft Constraint Solving and Programming (LECTURE NOTES IN COMPUTER SCIENCE)
Semirings for Soft Constraint Solving and Programming (LECTURE NOTES IN COMPUTER SCIENCE)
A survey of trust and reputation systems for online service provision
Decision Support Systems
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication
Journal of Network and Systems Management
Semiring-Based Constraint Acquisition
ICTAI '07 Proceedings of the 19th IEEE International Conference on Tools with Artificial Intelligence - Volume 01
Weighted Datalog and Levels of Trust
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
On Computing Constraint Abduction Answers
LPAR '08 Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning
Enhancing constraints manipulation in semiring-based formalisms
Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy
Prediction is deduction but explanation is abduction
IJCAI'89 Proceedings of the 11th international joint conference on Artificial intelligence - Volume 2
On the mechanization of abductive logic
IJCAI'73 Proceedings of the 3rd international joint conference on Artificial intelligence
Learning implied global constraints
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Computing explanations and implications in preference-based configurators
ERCIM'02/CologNet'02 Proceedings of the 2002 Joint ERCIM/CologNet international conference on Constraint solving and constraint logic programming
HYPROLOG: a new logic programming language with assumptions and abduction
ICLP'05 Proceedings of the 21st international conference on Logic Programming
Abduction of linear arithmetic constraints
ICLP'05 Proceedings of the 21st international conference on Logic Programming
Computers & Mathematics with Applications
Hi-index | 0.00 |
We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In particular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with access control policies and credentials. In this way, we can associate the level of preference defined by the "softness" of the constraint with a "level" of trust. The main benefit comes during the process of automated access authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.