Skip to main content
Log in

Computing Strong and Weak Permissions in Defeasible Logic

  • Published:
Journal of Philosophical Logic Aims and scope Submit manuscript

Abstract

In this paper we propose an extension of Defeasible Logic to represent and compute different concepts of defeasible permission. In particular, we discuss some types of explicit permissive norms that work as exceptions to opposite obligations or encode permissive rights. Moreover, we show how strong permissions can be represented both with, and without introducing a new consequence relation for inferring conclusions from explicit permissive norms. Finally, we illustrate how a preference operator applicable to contrary-to-duty obligations can be combined with a new operator representing ordered sequences of strong permissions. The logical system is studied from a computational standpoint and is shown to have linear computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. As it is well-known, in a non-reflexive modal logic, □a does not imply a, where □ is a modal operator.

  2. The idea of using defeaters to introduce permissions was introduced in [16].

  3. Hence, we speak here of entitlements or rights, as corresponding to options for exercising the same general permissive right to compensation. In this perspective, we can model them as permissions on one party (in this case the copyright owner) generating an obligation on another party (in this case the infringer). This is in line with the classic conception of rights proposed, for instance, in [19], which does not properly view them as powers: a power is typically required there to generate further normative effects (such as duties, juridical relations, etc.). For a more detailed discussion on these issues, see [25].

  4. This in general might be prohibited based on contractual conditions or by other laws.

  5. The strong negation of a formula is closely related to the function that simplifies a formula by moving all negations to an inner most position in the resulting formula, and replaces the positive tags with respective negative tags, and vice versa.

  6. Situations like Ol O l, where the proof conditions will generate a loop without introducing a proof.

  7. Notice that the rules in conditions (2.2) and (2.3.3) are different rules: they form a team that can defeat teams of rules for the opposite.

  8. A defeasible theory is finite when the sets of facts and rules are finite.

  9. Notice that we do not remove any negative modal literal from HB by definition of modal Herbrand Base.

References

  1. Alchourrón, C.E. (1993). Philosophical foundations of deontic logic and the logic of defeasible conditionals. In J.J. Meyer, & R.J. Wieringa (Eds.), Deontic logic in computer science: normative system specification. Wiley.

  2. Alchourrón, C.E., & Bulygin, E. (1984). Permission and permissive norms. In W. Krawietz et al. (Ed.), Theorie der Normen. Duncker & Humblot.

  3. Antoniou, G., Billington, D., Governatori, G., Maher, M.J., Rock, A. (2000). A family of defeasible reasoning logics and its implementation. In ECAI 2000 (pp. 459–463). IOS Press.

  4. Antoniou, A., Billington, D., Governatori, G., Maher, M.J. (2001). Representation results for defeasible logic. ACM Transactions on Computational Logic, 2, 255–287.

    Article  Google Scholar 

  5. Bobbio, N. (1958). Teoria della norma giuridica. Giappichelli.

  6. Boella, G., & van der Torre, L. (2003). Permissions and obligations in hierarchical normative systems. In ICAIL ’03 (pp. 109–118). ACM.

  7. Boella, G., & van der Torre, L. (2003). Permissions and undercutters. In NRAC’03 (pp. 51–57). Acapulco.

  8. Boella, G., & van der Torre, L. (2005). Permission and authorization in normative multiagent systems. In ICAIL ’05 (pp. 236–237). ACM.

  9. Brown, M.A. (2000). Conditional obligation and positive permission for agents in time. Nordic Journal of Philosophical Logic, 5(2), 83–111.

    Article  Google Scholar 

  10. Governatori, G., Olivieri, F., Rotolo, A., Scannapieco, S. (2011). Three concepts of defeasible permission. In K.M. Atkinson (Ed.), JURIX 2011 (pp. 63–72). IOS Press.

  11. Governatori, G., Olivieri, F., Rotolo, A., Scannapieco, S. (2012). Computing strong and weak permissions in defeasible logic. In CoRR. arXiv:1212.0079.

  12. Governatori, G., Padmanabhan, V., Rotolo, A., Sattar, A. (2009). A defeasible logic for modelling policy-based intentions and motivational attitudes. Logic Journal of the IGPL, 17(3), 227–265.

    Article  Google Scholar 

  13. Governatori, G., & Rotolo, A. (2006). Logic of violations: a gentzen system for reasoning with contrary-to-duty obligations. Australasian Journal of Logic, 4, 193–215.

    Google Scholar 

  14. Governatori, G., & Rotolo, A. (2011). Justice delayed is justice denied: logics for a temporal account of reparations and legal compliance. In CLIMA (pp. 364–382). Springer.

  15. Governatori, G., Rotolo, A., Calardo, E. (2012). Possible world semantics for defeasible deontic logic. In T. Ågotnes, J. Broersen, D. Elgesem (Eds.), DEON 2012 (pp. 46–60). Springer.

  16. Governatori, G., Rotolo, A., Sartor, G. (2005). Temporalised normative positions in defeasible logic. In ICAIL 05 (pp. 25–34). ACM.

  17. Governatori, G., & Sadiq, S. (2008). The journey to business process compliance. Handbook of Research on BPM, 426–454. IGI Global.

  18. Governatori, G., & Shek, S. (2012). Rule based business process compliance. In Proceedings of the RuleML2012@ECAI Challenge (article 5). CEUR.

  19. Hohfeld, W.N., Cook, W.W., Corbin, A.L. (2010). Fundamental legal conceptions: as applied in judicial reasoning. Lawbook Exchange, Limited.

  20. Lam, H., & Governatori, G. (2011). What are the necessity rules in defeasible reasoning? In J. Delgrande & W. Faber (Eds.), LPNMR-11 (pp. 187–192). Springer.

  21. Maher, M.J. (2001). Propositional defeasible logic has linear complexity. Theory and Practice of Logic Programming, 1(6), 691–711.

    Article  Google Scholar 

  22. Makinson, D. (1999). On a fundamental problem of deontic logic. In P. McNamara & H. Prakken (Eds.), Norms, logics and information systems. new studies in deontic logic and computer science (pp. 29–54). Amsterdam: IOS Press.

  23. Makinson, D., & van der Torre, L. (2000). Input-output logics. Journal of Philosophical Logic, 29(4), 383–408.

    Article  Google Scholar 

  24. Makinson, D., & van der Torre, L. (2003). Permission from an input/output perspective. Journal of Philosophical Logic, 32(4), 391–416.

    Article  Google Scholar 

  25. Sartor, G. (2005). Legal reasoning: a cognitive approach to the law. Springer.

  26. Stolpe, A. (2010). Relevance, derogation and permission. In DEON 2010 (pp. 98–115). Springer.

  27. Stolpe, A. (2010). A theory of permission based on the notion of derogation. Journal Applied Logic, 8(1), 97–113.

    Article  Google Scholar 

  28. von Wright, G.H. (1963). Norm and action: a logical inquiry. Routledge and Kegan Paul.

Download references

Acknowledgments

This work is an extended and revised version of the paper presented at Jurix 2011 [10]. We thank the anonymous referees for their valuable comments.

NICTA is funded by the Australian Government as represented by the Department of Broadband, Communications and the Digital Economy, the Australian Research Council through the ICT Centre of Excellence program and the Queensland Government.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guido Governatori.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Governatori, G., Olivieri, F., Rotolo, A. et al. Computing Strong and Weak Permissions in Defeasible Logic. J Philos Logic 42, 799–829 (2013). https://doi.org/10.1007/s10992-013-9295-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10992-013-9295-1

Keywords

Navigation