1 Ontology based Policy Interoperability Dr. Latifur Khan Tahseen Al-Khateeb Mohammad Alam Mohammad Farhan Husain.

Slides:



Advertisements
Similar presentations
XML-XSL Introduction SHIJU RAJAN SHIJU RAJAN Outline Brief Overview Brief Overview What is XML? What is XML? Well Formed XML Well Formed XML Tag Name.
Advertisements

Access control for geospatial information objects using/extending the eXtensible Access Control Markup Language Andreas Matheus, Technische Universität.
News in XACML 3.0 and application to the cloud Erik Rissanen, Axiomatics
1 Authorization XACML – a language for expressing policies and rules.
New Challenges for Access Control April 27, Improving Usability and Expressiveness with Dynamic Policies and Obligations Dennis Kafura Markus Lorch.
Using XACML Policies to Express OAuth Scope Hal Lockhart Oracle June 27, 2013.
Approaches to generalization of XACML New challenges for access control 27 th April 2005 Tim Moses.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Authz work in GGF David Chadwick
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
1 Draft of a Matchmaking Service Chuang liu. 2 Matchmaking Service Matchmaking Service is a service to help service providers to advertising their service.
Distributed Systems CS Naming – Part II Lecture 6, Sep 26, 2011 Majd F. Sakr, Vinay Kolar, Mohammad Hammoud.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
XACML By Ganesh Godavari Craig Peltier. Information Sharing Information Sharing relates to the sharing of information between two or more entities. Entities.
Audumbar. Access control and privacy Who can access what, under what conditions, and for what purpose.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
XACML Gyanasekaran Radhakrishnan. Raviteja Kadiyam.
XACML 2.0 in the Enterprise: Use- Cases and Deployment Challenges Prateek Mishra, Frank Villavicencio, Rich Levinson Oracle Identity Management Group 02/07/2006.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
XACML Briefing for PMRM TC Hal Lockhart July 8, 2014.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Authorization Infrastructure, a Standards View Hal Lockhart OASIS.
An Algebra for Composing Access Control Policies (2002) Author: PIERO BONATTI, SABRINA DE CAPITANI DI, PIERANGELA SAMARATI Presenter: Siqing Du Date:
Querying Structured Text in an XML Database By Xuemei Luo.
Secure Systems Research Group - FAU Using patterns to compare web services standards E. Fernandez and N. Delessy.
XACML – The Standard Hal Lockhart, BEA Systems. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Elisa Bertino Purdue University Pag. 1 Security of Distributed Systems Part II Elisa Bertino CERIAS and CS &ECE Departments Purdue University.
1 Relational Databases and SQL. Learning Objectives Understand techniques to model complex accounting phenomena in an E-R diagram Develop E-R diagrams.
11 Usage policies for end point access control  XACML is Oasis standard to express enterprise security policies with a common XML based policy language.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
Access Management in Federated Digital Libraries Kailash Bhoopalam Kurt Maly Mohammed Zubair Ravi Mukkamala Old Dominion University Norfolk, Virginia.
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp - SWITCH EGI TF Prague.
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Proposal for RBAC Features for SDD James Falkner Sun Microsystems October 11, 2006.
A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights K. Bhoopalam,K. Maly, R. MukkamalaM. Zubair Old Dominion University.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Model Checking Grid Policies JeeHyun Hwang, Mine Altunay, Tao Xie, Vincent Hu Presenter: tanya levshina International Symposium on Grid Computing (ISGC.
Computer Science Conformance Checking of Access Control Policies Specified in XACML Vincent C. Hu (National Institute of Standards and Technology) Evan.
XML Access Control Koukis Dimitris Padeleris Pashalis.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
INFSO-RI Enabling Grids for E-sciencE G-PBox Auth meeting 13/9/2005 Presenter: Vincenzo Ciaschini.
MyGrid/Taverna Provenance Daniele Turi University of Manchester OMII f2f Meeting, London, 19-20/4/06.
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
September XACML: Consistency analysis Luigi Logrippo Université du Québec University of Ottawa
11 Restricting key use with XACML* for access control * Zack’-a-mul.
1 Access Control Policies: Modeling and Validation Luigi Logrippo & Mahdi Mankai Université du Québec en Outaouais.
Department of Computer Science PCL: A Policy Combining Language EXAM: Environment for Xacml policy Analysis & Management Access Control Policy Combining.
EMI INFSO-RI Argus Policies in Action Valery Tschopp (SWITCH) on behalf of the Argus PT.
RSVP Policy Control using XACML Pontifícia Universidade Católica do Paraná PUC-PR, Brazil Presented by: Emir Toktar Emir Toktar Edgard.
Old Dominion University1 eXtensible Access Control Markup Language [OASIS Standard] Kailash Bhoopalam Java and XML.
EMI INFSO-RI Argus The EMI Authorization Service Valery Tschopp (SWITCH) Argus Product Team.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Policy Based Management for Internet Communities Kevin Feeney, Dave Lewis, Vinny Wade, Knowledge and Data Engineering Group Trinity College Dublin Policy.
Semantic Interoperability in GIS N. L. Sarda Suman Somavarapu.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
XACML Contributions Hal Lockhart, Oracle Corp. 2 Topics Authorization API Finding Input Attributes.
Access Control Policy Languages in XML Lê Anh Vũ Võ Thành Vinh
Authorization PDP GE Course (R4) FIWARE Chapter: Security FIWARE GE: Authorization PDP FIWARE GEri: AuthZForce Authorization PDP Owner: Cyril Dangerville,
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp (SWITCH) – Argus Product Team.
OGSA Attributes: Requirements, Definitions, and SAML Profile Abstract This document specifies elements and vocabulary for expressing attribute assertions.
XRANK: RANKED KEYWORD SEARCH OVER XML DOCUMENTS Lin Guo Feng Shao Chavdar Botev Jayavel Shanmugasundaram Abhishek Chennaka, Alekhya Gade Advanced Database.
Argus EMI Authorization Integration
Security of Distributed Systems Part II Elisa Bertino CERIAS and CS &ECE Departments Purdue University Purdue University.
Obligations in the OGSA SAML Authorization Service Interface
XACML and the Cloud.
Argus The EMI Authorization Service
Groups and Permissions
Presentation transcript:

1 Ontology based Policy Interoperability Dr. Latifur Khan Tahseen Al-Khateeb Mohammad Alam Mohammad Farhan Husain

2 Outline  Motivating example ←  XACML Recap  The problem of heterogeneity  OPI: Our solution to the problem  Demonstration  Future Works

3 An example scenario  Suppose there are two organizations: OrgA and OrgB, both having geo-spatial data.  Access control policy in XACML.  They form a federation and want that subjects (e.g. People, client s/w etc.) of one organization will be able to access resources (e.g. Data, file etc.) of other organization based on existing policies without any modification & human assistance

4 Problem faced  Both organizations have policies based on their own naming convention, data type Not recognized by other organization  Access request will contain organization specific keywords and data type  Requests will fail if evaluated by existing XACML processing model

5 Geo-spatial data specific improvement  For some data in case full permission cannot be given, Partial Permit can be provided  Partial Permit will essentially mean getting a part of data the request wanted to get

6 Outline  Motivating example  XACML Recap ←  The problem of heterogeneity  OPI: Our solution to the problem  Demonstration  Future Works

7 XACML: brief introduction  XACML stands for eXtensible Access Control Markup Language.  It is a declarative access control policy language implemented in XML  It also includes a processing model, describing how to interpret the policies.  Latest version 2.0 was ratified by OASIS standards organization on 1 February 2005.

8 XACML Request processing rule PDP PEP Decision request (Premise) Decision response (Conclusion) 3 2 Access request 1 5 Attributes Decision, Obligations rule PEP fulfills obligations 4 PDP – Policy Decision Point PEP – Policy Enforcement Point

9 More about XACML  Elements Attribute Function Rule Policy Policy Set  Rule effects Permit Deny

10 Rule combination algorithms Combination AlgorithmExpected Behavior Deny Override A policy is denied if a rule is encountered the effect of which is “Deny” Permit Override A policy is permitted if a rule is encountered the effect of which is “Permit” First-one-applicable The combined result is the same as the result of the first rule Only-one-applicable The combined result corresponds to the result of the unique rule which applies to the request.  If there are multiple rules in a policy, they must be combined to get a single decision. The XACML normative rule combination algorithms are :

11 An example policy  Here is a simple example Policy in the following slide. Policy target says that Policy applies to requests for High access objects (e.g. sys-admin) Policy has a Rule which applies to viewing Airport data. A request is permitted if Subject is trying to view data between 10am and 2pm.

12 Policy Target Rule Effect

13 Rule Condition

14 Outline  Motivating example  XACML Recap  The problem of heterogeneity ←  OPI: Our solution to the problem  Demonstration  Future Works

15 The problem of heterogeneity  Types of heterogeneity Naming heterogeneity Data type heterogeneity  Subjects, resources and attributes can be differently defined in different organizations  For example Network Administrator = System Admin Read = View Directory = Folder  In such case, policy of one organization is not applicable to another when they form a federation

16 Heterogeneity

17 Outline  Motivating example  XACML Recap  The problem of heterogeneity  OPI: Our solution to the problem ←  Demonstration  Future Works

18 OPI: our approach to solve the problem  In case a directly applicable policy or rule is not found for a request, we will use a domain ontology for Subjects Resources Actions

19 New rule effect: Partial Permit  We have added new rule effect: “Partial Permit” to XACML to grant request partially.  Example Grant only the outer boundary of some object e.g. airport Return a map with lower resolution than requested

20 Steps taken: Suppose, a subject of OrgA sends request to OrgB. Following steps will be taken:  Within all the policies and rules of OrgB, find the rule which has a subject of minimum semantic distance from the subject of the request in the ontology of subjects. In case of ties, find the rule among the tied rules which has a resource of minimum semantic distance from the resource of the request in the ontology of resources. In case of ties, find the rule among the tied rules which has an action of minimum semantic distance from the action of the request in the ontology of actions

21 Steps taken: (continued)  Use a semantic distance score formula to get a match score  If Score ≥ Full-effect threshold  use its effect as the outcome.  If Score ≤ Full-effect threshold & Score ≥ Partial-effect threshold & Rule-effect == Permit  Partial-permit  If Score < Partial-permit threshold  Deny  In case of multiple rules having tie, we will use rule combination algorithm specified in the policy to break the tie.

22 Steps taken:  Request Subject: SystemAdmin Resource: AIRPORT_area Action: View  Rule-1 Subject: GISAdmin Resource: AIRPORT_area Action: View Effect: Permit  Rule-2 Subject: Lkhan Resource: EMPLOYERS_point Action: View Effect: Deny  Rule-3 Subject: LowAccessSubjects Resource: AIRPORT_area Action: View Effect: Deny

23 The ontology

24 Semantic distance score formula  To find the matching similarity score between two nodes C1 and C2, we first determine their closes common parent C. Then the score S(C1,C2) is formulated as follows: S(C1, C2) =  Where len is a length operator that calculates the shortest distance between two nodes in an ontology tree and D is the overall depth of the tree.

25 Semantic distance score formula (continued)  We calculate there different score values, S S (C1, C2), S R (C1, C2), and S A (C1, C2) for subject, resource and action parameters, respectively. The score values are combined by an aggregation function where is a set of 3-ary tuples and is the set of real numbers. The function, henceforth referred to as Aggregation function, is represented as  Aggregation function result is compared against a pre-determined threshold value to resolve the policy decision. The decision could be either one of the three effects: Permit, Deny, and Partial- Permit.

26 A complete example

27

28

29 Outline  Motivating example  XACML Recap  The problem of heterogeneity  OPI: Our solution to the problem  Demonstration ←  Future Works

30 Outline  Motivating example  XACML Recap  The problem of heterogeneity  OPI: Our solution to the problem  Demonstration  Future Works ←

31 Future works:  Take all policies of all organizations into account  Address data type heterogeneity

32 Future Works:  GML rendering API in java ArcGIS shows GML data but the process is cumbersome ArcGIS does not provide API for GML display Currently, no API in any language for displaying GML data