Ninth International Conference on Deontic Logic in Computer Science (DEON'08)

Luxembourg, 15–18 July, 2008

Tuesday July 15

daytime NORMAS Workshop (and registration DEON+NorMAS)
18:15 - 20:15 Guided Tour through the City of Luxembourg

Wednesday July 16

morning NORMAS Workshop (and registration DEON+NorMAS)
12:15 - 13:45 Lunch
13:45 - 14:00 Opening Remarks
14:00 - 15:00
Invited talk
Norms in Branching Space-times ( Nuel Belnap )
15:00 - 15:30 Break
15:30 - 16:00 Changing Legal Systems: Abrogation and Annulment. Part I: Revision of Defeasible Theories (Governatori, Rotolo)
16:00 - 16:30 Acting, Events and Actions (Brown)
16:30 - 17:00 A Tableaux System for Deontic Action Logic (Castro, Maibaum)

Thursday July 17: (Special Theme - Security)

09:30 - 10:30
Invited talk
Information Security Economics - and Beyond (Ross Anderson)
10:30 - 11:00 Break
11.00 - 11:30 Trust and norms in the context of computer security (Demolombe, Lorini)
11:30 - 12:00 Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic (Cuppens, Cuppens)
12:00 - 12:30 Delegation of Control in Administrative Procedures (Hulstijn, Liu, Tan)
12:30 - 14:00 Lunch
14:00 - 15:00
Invited Talk
Access Control and Logics (Martin Abadi)
15:00 - 15:30 Break
15:30 - 16:00 Reasoning about Conditions and Exceptions to Laws in Regulatory Conformance Checking (Dinesh, Joshi, Lee, Sokolsky)
16:00 - 16:30 A Logical Analysis of the Interaction between `Obligation-to-do' and `Knowingly Doing' (Broersen)
19:00 - 00:00 Conference dinner at Bourglinster Castle.

Friday, July 18

09:00 - 10:00
Invited Talk
Reactive Kripke Models and Contrary to Duty Obligations (Dov Gabbay)
10:00 - 10:30 Break
10:30 - 11:00 Normative consequence: The dilemma of keeping it whilst giving it up (Stolpe)
11:00 - 11:30 Conditional Obligation and Incomparability. On the Strong Completeness of Aqvist's Dyadic Deontic Logic G (Parent)
11:30 - 12:00 Strata of Intervenient Concepts in Normative Systems (Lindahl, Odelstad)
12:00 - 13:30 Lunch
13:30 - 14:00 A Deontic Logic for Socially Optimal Norms (Broersen, Mastop, Meyer, Turrini)
14:00 - 14:30 Praise, Blame, Obligation, and Beyond: Toward a Comprehensive Framework for the Classical Conception of Supererogation and Kin (McNamara)
14:30 - 15:00 Break
15:00 - 15:30 Graded Deontic Logics (Dellunde, Godo)
15:30 - 16:00 Pushing Anderson's Envelope: The Modal Logic of Ascription (Grossi)
16:00 - 16:15 Closing Remarks

Norms in Branching Space-times by Nuel Belnap on 16. Jul. 2008, 14:00 - 15:00

The idea of norms presupposes agency, and agency presupposes an indeterministic causal order (so that "ought" does not imply "is"). So much can be modeled in "branching time with agents and choices" (BTAC). The seriously ontological independence of agentive choices, however, requires, as a necessary condition, a causal order permitting space-like separation of those choices in a sense definable in "branching space-times with agents and choices" (BSTAC). Let us idealize an agent, when restricted to a single space-time, as a kind of spatio-temporal "worm" in the familiar way, representing the life of the agent in that space-time. Then a representation of "the agent," since it must include representation of seriously objective choices, must look like a tree with two kinds of branching. In both kinds of branching, there is a single past-pointing worm-like representation of the past-life of the agent up to the branching, and an entire assemblage of distinct worm-like representations of the possible future-life of the agent subsequent to the branching, one for each history in which the life of the agent continues. The first kind of branching occurs at choice-points for the agent. According to BSTAC, such branching will involve a last point of agent's-choice-not-yet-made (say, a last point of deliberation), but no first point of agent's-choice-has-been-made in any possible future-life of the agent. In the second kind of branching, the agent is passive, having two or more possible future-lives due to space-like-related choices by other agents, or by metaphorical "choices" by some space-like-related element of Nature. In this case, BSTAC says that there will be no last point of the past-life of the agent, but instead a first point for each of the agent's possible future-lives.

Information Security Economics - and Beyond by Ross Anderson on 17. Jul. 2008, 09:30 - 10:30

The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with divergent interests, incentives are becoming as important to dependability as technical design. The new field provides valuable insights not just into security topics such as privacy, bugs, spam, and phishing, but into more general areas such as system dependability (the design of peer-to-peer systems and the optimal balance of effort by programmers and testers), and policy (particularly digital rights management). This research program has been starting to spill over into more general security questions (such as law-enforcement strategy), and into the interface between security and the social sciences. Most recently it has started to interact with psychology, both through the psychology-and-economics tradition and in response to phishing. The promise of this research program is a novel framework for analyzing information security problems {one that is both principled and effective.

Access Control and Logics by Martin Abadi on 17. Jul. 2008, 14:00 - 15:00

While access control appears in various guises in many aspects of computer systems, it is attractive to reduce it, as much as possible, to few central concepts and rules. The development and use of general logics for access control is an ongoing effort in this direction. In this talk, we examine several logics for access control and discuss some of their intended applications. Some of the principles that we consider come from modal logic, computational lambda calculus, and other standard formal systems. Others stem from ideas in security, such as delegations of authority and the Principle of Least Privilege.

Reactive Kripke Models and Contrary to Duty Obligations by Dov Gabbay on 17. Jul. 2008, 09:00 - 10:00

This is an intuitive description of our approach to modelling contrary to duty obligations. We shall describe our ideas through the analysis of typical problematic examples taken from Carmo and Jones [6], L. van der Torre [14] and Prakken and Sergot [5].

a picture of Bourglinster Castle
The conference dinner will take place on Thursday July 17, in Bourglinster Castle.