Distributed Autoepistemic Logic and its Application to Access Control

Pieter Van Hertum, Marcos Cramer, Bart Bogaerts, Marc Denecker

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Abstract

In this paper we define and study an extension of autoepistemic logic (AEL) called distributed autoepistemic logic (dAEL) with multiple agents that have full introspection in their own knowledge as well as in that of others. This mutual full introspection between agents is motivated by an application of dAEL in access control. We define 2- and 3-valued semantic operators for dAEL. Using
these operators, approximation fixpoint theory, an abstract algebraic framework that unifies different knowledge representation formalisms, immediately yields us a family of semantics for dAEL, each based on different intuitions that are wellstudied in the context of AEL. The application in access control also motivates an extension of dAEL with inductive definitions (dAEL(ID)). We explain a use-case from access control to demonstrate how dAEL(ID) can be fruitfully applied to this domain and discuss how well-suited the different semantics are for the application in access control.
Original languageEnglish
Title of host publicationProceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016
PublisherAAAI Press
Number of pages7
ISBN (Print)978-1-57735-770-4
Publication statusPublished - 2016
MoE publication typeA4 Article in a conference publication
EventInternational Joint Conference on Artificial Intelligence - New York Hilton Midtown, New York, United States
Duration: 9 Jul 201615 Jul 2016
Conference number: 25
http://ijcai-16.org/index.php/welcome/view/home

Conference

ConferenceInternational Joint Conference on Artificial Intelligence
Abbreviated titleIJCAI
Country/TerritoryUnited States
CityNew York
Period09/07/201615/07/2016
Internet address

Fingerprint

Dive into the research topics of 'Distributed Autoepistemic Logic and its Application to Access Control'. Together they form a unique fingerprint.

Cite this