Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Piero A. Bonatti is active.

Publication


Featured researches published by Piero A. Bonatti.


Artificial Intelligence | 2015

A new semantics for overriding in description logics

Piero A. Bonatti; Marco Faella; Iliana M. Petrova; Luigi Sauro

Abstract Many modern applications of description logics (DLs, for short), such as biomedical ontologies and semantic web policies, provide fresh motivations for extending DLs with nonmonotonic inferences—a topic that has attracted a significant amount of attention along the years. Despite this, nonmonotonic inferences are not yet supported by DL technology due to a number of issues related to expressiveness, computational complexity, and optimizations. This paper contributes to the practical support of nonmonotonic inferences in description logics by introducing a new semantics expressly designed to address knowledge engineering needs. This formalism has appealing expressiveness, enjoys nice computational properties, and constitutes an interesting solution to an ample class of application needs. The formalism is validated through extensive comparison with the other nonmonotonic DLs, and systematic scalability tests. The test case generator and its novel validation methodology constitute a further contribution of this paper.


symposium on access control models and technologies | 2013

ERBAC: event-driven RBAC

Piero A. Bonatti; Clemente Galdi; Davide Torres

Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present an extension of the TRBAC model that allows the specification and enforcement of general reactive policies. Then we extend XACML to support the new model, and illustrate a prototype implementation of the PDP.


ieee international conference on services computing | 2014

E-Auctions for Multi-Cloud Service Provisioning

Marco Anisetti; Claudio Agostino Ardagna; Piero A. Bonatti; Ernesto Damiani; Marco Faella; Clemente Galdi; Luigi Sauro

The cloud computing paradigm requires solutions supporting customers in the selection of services that satisfy their functional and non-functional requirements. These solutions must i) support the dynamic, multi-cloud nature of service provisioning, ii) manage scenarios where no total preference relation over service properties is available, and iii) prevent providers from misrepresenting or overstating their properties. In this paper we put forward the idea of modeling multi-cloud provisioning scenarios as procurement e-auctions (where the auctioneer is the customer and the bidders are service providers). We introduce a service selection process based on matching and ranking algorithms, and an e-auction mechanism that addresses the above requirements, encouraging trustworthy bids and therefore improving the truthfulness on the e-auction outcome. Finally we describe the implementation of a prototype used to evaluate the performance of our approach with respect to traditional query-based engines.


international conference on datalog in academia and industry | 2010

Datalog for security, privacy and trust

Piero A. Bonatti

Logic-based policy languages are appreciated because of their clean semantics and expressiveness. Datalog has been used for a long time as a foundation of many security models and policy languages. Recently, Description Logics (DLs for short) have been adopted as policy languages, too. In this paper we carry out a comparison of Datalog and Description Logics as policy languages, based both on expressiveness analysis and on an assessment of the current maturity of the two fields, expressly related to the representation and reasoning tasks involved in policy authoring, enforcement, and management. We shall argue that Datalog-based approaches are currently more powerful and mature than those based on pure DLs, although the ongoing research on the latter might change the picture in a near future. The potential of hybrid approaches will be briefly discussed.


international semantic web conference | 2013

A Confidentiality Model for Ontologies

Piero A. Bonatti; Luigi Sauro

We illustrate several novel attacks to the confidentiality of knowledge bases (KB). Then we introduce a new confidentiality model, sensitive enough to detect those attacks, and a method for constructing secure KB views. We identify safe approximations of the background knowledge exploited in the attacks; they can be used to reduce the complexity of constructing secure KB views.


international semantic web conference | 2015

Optimizing the Computation of Overriding

Piero A. Bonatti; Iliana M. Petrova; Luigi Sauro

We introduce optimization techniques for reasoning in


european symposium on research in computer security | 2014

Optimality and Complexity of Inference-Proof Data Filtering and CQE

Joachim Biskup; Piero A. Bonatti; Clemente Galdi; Luigi Sauro


Journal of Computer Security | 2015

Event-driven RBAC

Piero A. Bonatti; Clemente Galdi; Davide Torres

\mathcal {DL}^\mathrm {N}


mathematical foundations of computer science | 2013

Auctions for Partial Heterogeneous Preferences

Piero A. Bonatti; Marco Faella; Clemente Galdi; Luigi Sauro


Essays Dedicated to Gerhard Brewka on the Occasion of His 60th Birthday on Advances in Knowledge Representation, Logic Programming, and Abstract Argumentation - Volume 9060 | 2014

Decidability of Circumscribed Description Logics Revisited

Piero A. Bonatti; Marco Faella; Carsten Lutz; Luigi Sauro; Frank Wolter

---a recently introduced family of nonmonotonic description logics whose characterizing features appear well-suited to model the examples naturally arising in biomedical domains and semantic web access control policies. Such optimizations are validated experimentally on large KBs with more than 30K axioms. Speedups exceed 1 order of magnitude. For the first time, response times compatible with real-time reasoning are obtained with nonmonotonic KBs of this size.

Collaboration


Dive into the Piero A. Bonatti's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marco Faella

University of Naples Federico II

View shared research outputs
Top Co-Authors

Avatar

Clemente Galdi

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Frank Wolter

University of Liverpool

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Joachim Biskup

Technical University of Dortmund

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge