RE: Security Policies using SWRL

You may also want to check:

Gandon, F. and Sadeh, N., "Semantic Web Technologies to Reconcile Privacy and Context Awareness", Web Semantics Journal. Vol. 1, No. 3, 2004.

Norman Sadeh
**************************************************************
Prof. Norman M. Sadeh -- www.cs.cmu.edu/~sadeh

ISRI - School of Computer Science - Carnegie Mellon University

Assistant: Jennifer Lucas: jmlucas@cs.cmu.edu - 412-268-9870 
**************************************************************

-----Original Message-----
From: www-rdf-rules-request@w3.org [mailto:www-rdf-rules-request@w3.org] On Behalf Of Bijan Parsia
Sent: Monday, May 30, 2005 7:18 PM
To: Somaya Aboulwafa
Cc: www-rdf-rules@w3.org
Subject: Re: Security Policies using SWRL


On May 30, 2005, at 2:40 PM, Somaya Aboulwafa wrote:

> Hi Everyone,
>  
> Can we use SWRL for representing security policies (authorization and 
> access control policies)?

Sure. Though you may not need SWRL. OWL can be quite effective. See:
	http://www.mindswap.org/2005/services-policies/

>  Are there any reasoning engines that can reason over those SWRL 
> polices?

http://owl.man.ac.uk/hoolet/

There are more coming down the pike, with various degrees of 
"coverage". E.g., Kaon2, Racer, Pellet...

Cheers,
Bijan.

Received on Tuesday, 31 May 2005 13:40:37 UTC