. Bistarelli, S., Martinelli, F., Roperti, F., & Santini, F. Negotiation on mobile devices using Weighted RTML Credentials, pages 429–438. Springer, 2012.
doi  abstract   bibtex   
In this paper we describe an implementation for mobile phones of two important services in logical reasoning, that is deduction and abduction, defined over a set of weighted credentials. The main benefit comes during the process of automated access authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the access. We implement a negotiation of credentials between two mobile devices in order to grant the access to the requestor peer, with the use of deduction/abduction services.
@inbook{
	11391_309493,
	author = {Bistarelli, S. and Martinelli, F. and Roperti, F. and Santini, F.},
	title = {Negotiation on mobile devices using Weighted RTML Credentials},
	year = {2012},
	publisher = {Springer},
	booktitle = {INFORMATION SYSTEMS: CROSSROADS FOR ORGANIZATION, MANAGEMENT, ACCOUNTING AND ENGINEERING},
	abstract = {In this paper we describe an implementation for mobile phones of two important services in logical reasoning, that is deduction and abduction, defined over a set of weighted credentials. The main benefit comes during the process of automated access authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the access. We implement a negotiation of credentials between two mobile devices in order to grant the access to the requestor peer, with the use of deduction/abduction services.},
	doi = {10.1007/978-3-7908-2789-7_47},	
	pages = {429--438}
}

Downloads: 0