The Role of Deontic Logic in the Specification of Information Systems
نویسندگان
چکیده
In this paper we discuss the role that deontic logic plays in the specification of information systems, either because constraints on the systems directly concern norms or, and even more importantly, system constraints are considered ideal but violable (so-called ‘soft’ constraints). To overcome the traditional problems with deontic logic (the so-called paradoxes), we first state the importance of distinguishing between ought-to-be and ought-to-do constraints and next focus on the most severe paradox, the so-called Chisholm paradox, involving contrary-to-duty norms. We present a multi-modal extension of standard deontic logic (SDL) to represent the ought-to-be version of the Chisholm set properly. For the ought-to-do variant we employ a reduction to dynamic logic, and show how the Chisholm set can be treated adequately in this setting. Finally we discuss a way of integrating both ought-to-be and ought-to-do reasoning, enabling one to draw conclusions from ought-to-be constraints to ought-to-do ones, and show by an example the use(fulness) of this.
منابع مشابه
Roles, Counts-as and Deontic and Action Logics
• J. Carmo and O. Pacheco, “Deontic and action logics for organized collective agency, modeled through institutionalized agents and roles”, Fundamenta Informaticae, Special Issue on Deontic Logic in Computer Science, Vol 48, Numbers 2,3, pp. 129-163, 2001 • O. Pacheco and J. Carmo, “A Role Based Model for the Normative Specification of Organized Collective Agency and Agents Interaction”, Journa...
متن کاملUsing Role-based Abstractions for Security Policy Specification with Deontic Logic
This paper presents the use of role-based notions in the formal specification of a security policy. The formal method used is based on deontic logic, a logical formalism that seems particularly adapted for the specification of security properties. An outline of the main characteristics of this formalism and of the graphical notation used is presented through examples. The use of role-based abst...
متن کاملAn Ontological Framework for User-Driven System Specification
User-driven specification of network information systems is required in many virtual professional communities, such as research networks. This paper introduces a method and an accompanying tool being developed to support the legitimate user-driven specification of network information systems. The need for method ontologies, organized in an ontological framework, is motivated. A key part of this...
متن کاملA rule-based evaluation of ladder logic diagram and timed petri nets for programmable logic controllers
This paper describes an evaluation through a case study by measuring a rule-based approach, which proposed for ladder logic diagrams and Petri nets. In the beginning, programmable logic controllers were widely designed by ladder logic diagrams. When complexity and functionality of manufacturing systems increases, developing their software is becoming more difficult. Thus, Petri nets as a high l...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کامل