In this presentation I first review new developments of deontic logic in computer science, then I discuss the use of dynamic epistemic deontic logic to reason about privacy policies, and finally I discuss the use of modal logic for access control. This presentation is based on joint work with Guillaume Aucher, Guido Boella, Jan Broersen, Dov Gabbay and Valerio Genovese.


Privacy Policy Normative Reasoning Kripke Model Access Control Policy Sequent Calculus 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Aucher, G., Boella, G., van der Torre, L.: A dynamic logic for privacy compliance. Artif. Intell. Law 19(2-3), 187–231 (2011)CrossRefGoogle Scholar
  2. 2.
    Boella, G., Gabbay, D.M., Genovese, V., van der Torre, L.: Fibred security language. Studia Logica 92(3), 395–436 (2009)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Broersen, J., van der Torre, L.: Ten problems of deontic logic and normative reasoning in computer science. In: ESSLLI 2010/2011 Lecture Notes in Logic and Computation (2012)Google Scholar
  4. 4.
    Cuppens, F.: A logical formalization of secrecy. In: IEEE Computer Security Foundations Workshop CSFW 1993. IEEE Computer Society, Los Alamitos (1993)Google Scholar
  5. 5.
    Cuppens, F., Demolombe, R.: A deontic logic for reasoning about confidentiality. In: Deontic Logic, Agency and Normative Systems, Third International Workshop on Deontic Logic in Computer Science, DEON 1996. Springer, Berlin (1996)Google Scholar
  6. 6.
    Cuppens, F., Demolombe, R.: A Modal Logical Framework for Security Policies. In: Raś, Z.W., Skowron, A. (eds.) ISMIS 1997. LNCS, vol. 1325, pp. 579–589. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  7. 7.
    Garg, D., Genovese, V., Negri, S.: Countermodels from sequent calculi in multi-modal logics. In: 27th Annual ACM/IEEE Symposium on Logics in Computer Science - LICS 2012 (2012)Google Scholar
  8. 8.
    Genovese, V., Garg, D., Rispoli, D.: Labeled sequent calculi for access control logics: Countermodels, saturation and abduction. In: 25th IEEE Computer Security Foundations Symposium - CSF 2012 (2012)Google Scholar
  9. 9.
    Genovese, V., Garg, D.: New Modalities for Access Control Logics: Permission, Control and Ratification. In: Meadows, C., Fernández-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 56–71. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  10. 10.
    Genovese, V., Giordano, L., Gliozzi, V., Pozzato, G.L.: A Conditional Constructive Logic for Access Control and Its Sequent Calculus. In: Brünnler, K., Metcalfe, G. (eds.) TABLEAUX 2011. LNCS, vol. 6793, pp. 164–179. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  11. 11.
    Hansen, J., Pigozzi, G., van der Torre, L.W.N.: Ten philosophical problems in deontic logic. In: Boella, G., van der Torre, L.W.N., Verhagen, H. (eds.) Normative Multi-agent Systems. Dagstuhl Seminar Proceedings, vol. 07122, Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany (2007)Google Scholar
  12. 12.
    Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    van Ditmarsch, H., van der Hoek, W., Kooi, B.: Dynamic Epistemic Logic. Synthese library, vol. 337. Springer, Berlin (2007)CrossRefzbMATHGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Leendert van der Torre
    • 1
  1. 1.Computer Science and CommunicationUniversity of LuxembourgLuxembourg

Personalised recommendations