Logics for Data and Knowledge Representation

Slides:



Advertisements
Similar presentations
1 Formal Model and Analysis of Usage Control Dissertation defense Student: Xinwen Zhang Director: Ravi S. Sandhu Co-director: Francesco Parisi-Presicce.
Advertisements

ROWLBAC – Representing Role Based Access Control in OWL
Charting the Potential of Description Logic for the Generation of Referring Expression SELLC, Guangzhou, Dec Yuan Ren, Kees van Deemter and Jeff.
OWL - DL. DL System A knowledge base (KB) comprises two components, the TBox and the ABox The TBox introduces the terminology, i.e., the vocabulary of.
An Introduction to Description Logics
Ontological Logic Programming by Murat Sensoy, Geeth de Mel, Wamberto Vasconcelos and Timothy J. Norman Computing Science, University of Aberdeen, UK 1.
1 A Description Logic with Concrete Domains CS848 presentation Presenter: Yongjuan Zou.
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
Building and Analyzing Social Networks Web Data and Semantics in Social Network Applications Dr. Bhavani Thuraisingham February 15, 2013.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford), and Helen Nissenbaum (NYU) TRUST Winter.
Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a.
Description Logics. Outline Knowledge Representation Knowledge Representation Ontology Language Ontology Language Description Logics Description Logics.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
FiRE Fuzzy Reasoning Engine Nikolaos Simou National Technical University of Athens.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
An Introduction to Description Logics. What Are Description Logics? A family of logic based Knowledge Representation formalisms –Descendants of semantic.
CatBAC: A Generic Framework for Designing and Validating Hybrid Access Control Models Bernard Stepien, University of Ottawa Hemanth Khambhammettu Kamel.
Ming Fang 6/12/2009. Outlines  Classical logics  Introduction to DL  Syntax of DL  Semantics of DL  KR in DL  Reasoning in DL  Applications.
Query Answering Based on the Modal Correspondence Theory Evgeny Zolin University of Manchester Manchester, UK
LDK R Logics for Data and Knowledge Representation Exercise 3: DLs.
Ontology Summit 2015 Track C Report-back Summit Synthesis Session 1, 19 Feb 2015.
Logics for Data and Knowledge Representation Application of DLs: RelBAC.
An Introduction to Description Logics (chapter 2 of DLHB)
Semantic web course – Computer Engineering Department – Sharif Univ. of Technology – Fall Description Logics: Logic foundation of Semantic Web Semantic.
Scalable and E ffi cient Reasoning for Enforcing Role-Based Access Control Tyrone Cadenhead Murat Kantarcioglu, and Bhavani Thuraisingham 1.
Logics for Data and Knowledge Representation Application of DLs: RelBAC.
LDK R Logics for Data and Knowledge Representation Description Logics (ALC)
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
DL Overview Second Pass Ming Fang 06/19/2009. Outlines  Description Languages  Knowledge Representation in DL  Logical Inference in DL.
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
ece 627 intelligent web: ontology and beyond
1 Instance Store Database Support for Reasoning over Individuals S Bechhofer, I Horrocks, D Turi. Instance Store - Database Support for Reasoning over.
Knowledge Representation and Reasoning University "Politehnica" of Bucharest Department of Computer Science Fall 2011 Adina Magda Florea
Presented by Kyumars Sheykh Esmaili Description Logics for Data Bases (DLHB,Chapter 16) Semantic Web Seminar.
Of 29 lecture 15: description logic - introduction.
Scalable and E ffi cient Reasoning for Enforcing Role-Based Access Control Tyrone Cadenhead Advisors: Murat Kantarcioglu, and.
LDK R Logics for Data and Knowledge Representation Description Logics: family of languages.
Ontology Technology applied to Catalogues Paul Kopp.
Representing and Reasoning with Heterogeneous, Modular and Distributed ontologies UniTN/IRST contribution to KnowledgeWeb.WP 2.1.
COP Introduction to Database Structures
Lake Minneola High School
Identity and Access Management
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: System Protection
Knowledge Representation Part II Description Logic & Introduction to Protégé Jan Pettersen Nytun.
ece 720 intelligent web: ontology and beyond
Software Security II Karl Lieberherr.
Logics for Data and Knowledge Representation
Configuration for Network Security
Overview of System Engineering
Norton customer support Number
Database Driven Websites
Analyzing and Securing Social Networks
Internet of Things: Security Challenges
ece 720 intelligent web: ontology and beyond
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Analysis models and design models
Pervasive Computing Happening?
Communications & Computer Networks Resource Notes - Introduction
Chapter 14: Protection.
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Description Logics.
Logics for Data and Knowledge Representation
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
ONTOMERGE Ontology translations by merging ontologies Paper: Ontology Translation on the Semantic Web by Dejing Dou, Drew McDermott and Peishen Qi 2003.
Mark Quirk Head of Technology Developer & Platform Group
A Tutorial Summary of Description Logic and Hybrid Rules
CIS Monthly Seminar – Software Engineering and Knowledge Management IS Enterprise Modeling Ontologies Presenter : Dr. S. Vasanthapriyan Senior Lecturer.
Presentation transcript:

Logics for Data and Knowledge Representation Application of DLs: RelBAC

Outline New Challenges for Access Control Model and Logic Automated Reasoning Reasoning tasks SoD

New Challenges Objects Various scales: eBusiness, eScience NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING Objects Various scales: eBusiness, eScience Various types: Blogs, Wiki, Flickr, Youtube Subjects Social network explosion: MySpace, Facebook Permissions Context: Pervasive Computing

Dynamic Permissions Time Access time, duration, frequency, etc. NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING Time Access time, duration, frequency, etc. Location Physical address System System condition such as load, connection number, priority, etc.

State of the Art AC Models Formalisms AM ACL RBAC TBAC Non-logical NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING AC Models AM ACL MAC, DAC RBAC TBAC Formalisms Non-logical Logical Right Pencil Pen Einstein Use -Use - Request - Access - Use

Motivations Natural Friendly to ordinary user NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING Natural Friendly to ordinary user Automated tools for management Flexible Coverage of various domains Extensible for new requests Formal Compact syntax and semantics Security Analysis

RelBAC Model SUBJECT: Anna, Bob, Client 001, Friends, … NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING SUBJECT OBJECT PERMIS-SION SUBJECT: Anna, Bob, Client 001, Friends, … OBJECT: File, Email, Picture, Music, Video, Tags, … PERMISSION: Read, Upload, Correct, Remove, …

Logic Language ALCQIb ALC = AL with full concept negation NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING ALCQIb ALC = AL with full concept negation Q = Qualified number restrictions I = inverse properties b = safe boolean role expressions * a RelBAC rule may take the form of equality, but seldom used. ER Model DL Formalization SUBJECT Concept OJBECT PERMISSION Role PARTIAL ORDER Subsumption RULE Subsumption *

The partial order A1≥A2 iff A1⊑A2 U1≥U2 U1⊑U2 O1≥O2 O1⊑O2 P1≥P2 P1⊑P2 NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING A1≥A2 iff A1⊑A2 U1≥U2 U1⊑U2 O1≥O2 O1⊑O2 P1≥P2 P1⊑P2 SUBJECT HIERARCHY: Coder ⊑ KnowDive OBJECT HIERARCHY: Video ⊑ Entertainment PERMISSION HIERARCHY: Write ⊑ Read

Access Control Rules Three kinds of axioms NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING Three kinds of axioms General Access Control Rules User-centric vs. Object-centric rules C≡D C⊑D C⊒D U⊑∃P.O (1) U⊑≥n P.O (5) O⊑∃P-1.U (2) O⊑≥n P-1.U (6) U⊑∀P.O (3) U⊑≤n P.O (7) O⊑∀P-1.U (4) O⊑≤n P-1.U (8)

Access Control Rules: example NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING Policy RelBAC Representation All friends can download some music Friend ⊑ ∃Download.Music Music can be downloaded by some friend Music ⊑ ∃Download-1.Friend All friends can download only music Friend ⊑ ∀Download.Music Music can be downloaded by only friend Music ⊑ ∀Download-1.Friend KnowDive members should program at least one project code KnowDive ⊑ ≥1 Program.Code Each project code should be programmed by at most 2 KnowDive members Code ⊑ ≤2 Program-1.KnowDive Each manager should manage exactly 3 project codes Manager ⊑ ≤3 Manage.Code ⊓ ≥3 Manage.Code

TAC (Total Access Control) Rule NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING All to all mapping {P(u1,o1),…,P(um,o1),…,P(um,on)} ∀O.P ≡ ∀¬P. ¬O (∀O.P)I = {u ∈ UserI |∀o O(o)→ P(u,o) } {u ∈ UserI |∀o ¬P(u,o) →¬O(o)} (∀¬P. ¬O)I “Close friends can read all the entertainment files.” Close ⊑∀Entertain.Read

Correspondences to Motivations NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING Natural permission  binary relation partial order  subsumption axiom rule  formula(e) Flexible hierarchy  partial order attribute  binary relation Formal domain specific description logics

Reasoning Services TBox ABox ABox + TBox Design vs. Run time Reasoning NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING TBox ‘A business friend can update some entries.’ ABox ‘Bob is a business friend.’ ABox + TBox ‘Bob is a business friend so that he can update some entries.’ Design vs. Run time Reasoning

Reasoning Tasks: Design NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING Hierarchy IPod ⊑ DigitalDevice Membership DigitalDevice(ipod-2g0903) Separation of duties ‘customer and sales manager are to be separated.’ High-level Concern ‘the 3 users to commit an order should include 1 customer, 1 sales agent and 1 sales manager.’

Design Time Reasoning: Hierarchy NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING Alice’s online shop Digital Device Software Apple Lenovo Symantec IPod IPhone Norton AntiVirus

Design Time Reasoning: Membership NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING Alice’s Social Network Business Lesure Bob Supplyer Customer Sport Music Apple Lenovo VIP Soccer Hiking Jazz Jane

Separation of Duties (from RBAC) NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING ‘For a task consisting of n steps, no one can complete all the steps to complete the task.’ ⊓i=1n ∃Pi.Oi ⊑ ⊥ ‘…no one can complete more than one of the steps.’ ∃Pi.Oi ⊓ ∃Pi.Oj ⊑ ⊥ 1≤i<j≤n ‘To cash out a check, a check has to be signed by a customer and cashed out by a clear (in a bank).’ ∃Sign.Check ⊓ ∃Cashout.Check ⊑ ⊥

Separation of Duties: High-level Concern NEW CHALLENGES FOR ACCESS CONTROL :: MODEL AND LOGIC :: AUTOMATED REASONING Composition of the k users Order ⊑ ≥1 Initiate-1.Customer ⊔ ≥1 Process-1.Agent ⊔ ≥1 Check-1.Manager Initiates an order Fulfill an order Customer Processes the order Checks the order Agent Manager