Reactive Policies for the Semantic Web*

Slides:



Advertisements
Similar presentations
Office Of Purchasing and Contracts Procurement Outreach Training Level II - Module C Specialized Agreements.
Advertisements

AVATAR: Advanced Telematic Search of Audivisual Contents by Semantic Reasoning Yolanda Blanco Fernández Department of Telematic Engineering University.
Workpackage 2: Norms
Trust, Security and Privacy in Learning Networks Daniel Olmedilla L3S Research Center / Hannover University Learning Networks in Practice 10 th May, 2007.
A Review of Trust Management, Security and Privacy Policy Languages Juri Luca De Coi L3S Research Center & Hannover University A Review of Trust Management,
1Philipp Kärger, ICALT 2007 Services for Knowledge Resource Sharing and Management in an Open Source Infrastructure Elena Demidova, Philipp Kärger, Daniel.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
25/10/2009Philipp Kärger1 Reactivity and Social Data: Keys to Drive Privacy Decisions in Social Network Applications* * This work was partially supported.
Using Social Semantic Web Data for Privacy Policies Presentation of the Bachelor Thesis Emily Kigel.
Semantic Search Jiawei Rong Authors Semantic Search, in Proc. Of WWW Author R. Guhua (IBM) Rob McCool (Stanford University) Eric Miller.
COMP 6703 eScience Project Semantic Web for Museums Student : Lei Junran Client/Technical Supervisor : Tom Worthington Academic Supervisor : Peter Strazdins.
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke L3S Research.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation
Exploiting Preference Queries for Searching Learning Resources Fabian Abel, Eelco Herder, Philipp Kärger, Daniel Olmedilla, Wolf Siberski L3S Research.
ReQuest (Validating Semantic Searches) Norman Piedade de Noronha 16 th July, 2004.
Advanced Semantic Web Policies ____ Preferences and Reactivity Philipp Kärger L3S Research Center, Leibniz University Hannover Research Seminar, DERI Galway,
Machine Reasoning about Anomalous Sensor Data Matt Calder, Francesco Peri, Bob Morris Center for Coastal Environmental Sensoring Networks CESN University.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
“Health Insurance Providers - Improving Customer Service through Access of Information & How to Take Advantage of each Platform” Alain Grijseels (INAMI-RIZIV,
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
An Introduction to the Resource Description Framework Eric Miller Online Computer Library Center, Inc. Office of Research Dublin, Ohio 元智資工所 系統實驗室 楊錫謦.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
The Grid Component Model: an Overview “Proposal for a Grid Component Model” DPM02 “Basic Features of the Grid Component Model (assessed)” -- DPM04 CoreGrid.
Master Thesis Defense Jan Fiedler 04/17/98
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
The Critical Nouns and Their Definitions Critical Vocabulary of the Common Core.
Web Services Martin Smítka. Description The main idea behind Web Services is that back-end application comunicate with another back-end application without.
Using Event-Driven Process Chains for Model-Driven Development of Business Applications Daniel Lübke, Tim Lüecke, Kurt Schneider and Jorge Marx-Gómez University.
22/01/2004Daniel Olmedilla1 INTEGRATING PROLOG IN TRUST NEGOTIATION Software Project / Summer Semester /04/2004 Daniel Olmedilla L3S / University.
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
Egocentric Context-Aware Programming in Ad Hoc Mobile Environments Christine Julien Gruia-Catalin Roman Mobile Computing Laboratory Department of Computer.
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
1 Object Oriented Logic Programming as an Agent Building Infrastructure Oct 12, 2002 Copyright © 2002, Paul Tarau Paul Tarau University of North Texas.
WG2 – Enabling Technologies Status of white paper Olaf Droegehorn, Klaus David University of Kassel Chair for Communication Technology (ComTec)
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
ITSRM Content Management Infrastructure Coordination David Foster IT June 2010.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Smart, Secure and Sustainable Home: A Socio-Technological Perspective Aleksandr.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Cooperation & Interoperability Architecture & Ontology.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
MIT CFP Identity and Privacy: Social TV case study Security and Privacy Working Group CFP Plenary Meeting October 29, 2009.
A Solution Perspective An Open Source Collaborative and Foundational Solution Targeted at Non-OECD Member Countries February 9, 2016.
Thomas Gutberlet HZB User Coordination NMI3-II Neutron scattering and Muon spectroscopy Integrated Initiative WP5 Integrated User Access.
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI CF.
Enabling Access Control and Privacy through Ontology Mohammad M. R. Chowdhury Dr. Josef Noll UniK - University Graduate Center, Norway Dr. Juan Miguel.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Identity and Access Management
Conflict & Negotiation
The Critical Nouns and Their Definitions
Security & .NET 12/1/2018.
HIMSS National Conference New Orleans Convention Center
Policy reasoning A policy is a set of norms that define optimal behavior of agents in a system What does policy reasoning usually entail ? Proving that.
Conducting a meeting فرح جبر نعمة مشايخ.
The Critical Nouns and Their Definitions
Model-Driven Semantic Web Rule Engineering
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web Philipp Kärger and Wolf Siberski L3S Research Center, Hannover, Germany.
Project DIRECT Final Summary
Presentation transcript:

Reactive Policies for the Semantic Web* Piero A. Bonatti Universita di Napoli Federico II, Italy Philipp Kärger L3S Research Center, Hannover, Germany Daniel Olmedilla Telefonica R&D, Madrid, Spain * The authors' efforts were partly funded by the European COST Action IC0801 ``Agreement Technologies'' Philipp Kärger - L3S Research Center 17/01/19

Outline Motivation for reactive policies Background (non-reactive) Semantic Web policies Trust Negotiation Reactive Semantic Web Policies Implementation: Reactive Policies on Skype Future Work and Conclusions Philipp Kärger - L3S Research Center 17/01/19

Philipp Kärger - L3S Research Center 17/01/19

Behavior on the Semantic Web limited support for semantic behavior definition rather focus on static knowledge typically expressed by Semantic Web policies Rei: has(X, right(service, graduateStudent(X, ’UMBC’))) Protune: allow(buy(Resource))  credential(C), valid_credit_card(C), accepted_credit_card(C). KAoS: It is permitted for actor X to perform action Y in context Z. Philipp Kärger - L3S Research Center 17/01/19

 Reactive Semantic Web Policies rather focused on access control and trust not easy to express something like Events (not just requests) reactions and “restricted” allowance (not just allow/deny) some sort of reasoning  Reactive Semantic Web Policies “A call on Skype from an untrustworthy person shall be blocked and turned into a chat.” Philipp Kärger - L3S Research Center 17/01/19

Background Philipp Kärger - L3S Research Center 17/01/19

Semantic Web Policies “declarative description of the behavior of a system” well-defined semantics shared vocabulary distributed evidences allow(read(“slides.ppt”),User)  isStudent(User). isStudent(Person)  credential(Person, Credential), Credential.issuer = “uni−hannover”, Credential.type = “studentid “. Philipp Kärger - L3S Research Center 17/01/19

Trust Negotiation establishes trust with strangers university student Trust Negotiation establishes trust with strangers collaborative fulfillment of the parties’ policies evidences are collected and shared Philipp Kärger - L3S Research Center 17/01/19

Reactive Semantic Web Policies A language for Reactive Semantic Web Policies Philipp Kärger - L3S Research Center 17/01/19

Event Condition Action rules borrowing an old idea: ON event IF condition DO action ON a skype call arrives IF caller is a student and it is not Wednesday DO turn call into a chat ON callArrives(Time,Call,Caller) IF isStudent(Caller) not isWednesday(Time) DO turnCallIntoChat(Call,Caller) Philipp Kärger - L3S Research Center 17/01/19

ON callArrives(Time,Call,Caller) IF isStudent(Caller) not isWednesday(Time) DO turnCallIntoChat(Call,Caller) Event definition rules Action definition rules Implication rules callArrives(X,Y,Z)  callArrivesOnSkype(X,Y,Z). turnCallIntoChat(Call,User)  cancelCall(Call), openChat(User). isStudent(Person)  credential(Person, Credential), Credential.issuer = “uni−hannover”, Credential.type = “studentid “. Philipp Kärger - L3S Research Center 17/01/19

Semantics ON callArrives(Time,Call,Caller) IF isStudent(Caller), not isWednesday(Time) DO turnCallIntoChat(Call,Caller) callArrives(X,Y,Z)  callArrivesOnSkype(X,Y,Z). turnCallIntoChat(Call,User)  cancelCall(Call), openChat(User). isStudent(Person)  credential(Person, Credential), Credential.issuer = “uni−hannover”, Credential.type = “studentid “. Philipp Kärger - L3S Research Center 17/01/19

Strong and lightweight evidences Strong evidences digitally signed credentials Lightweight evidences unproven facts like a license agreement age or address (html forms) password data gathered from the Semantic Web isStudent(Person)  credential(Person, Credential), Credential.issuer = “uni−hannover”, Credential.type = “studentid “. isAdult(Person)  declaration(Person, Age), Age > 18. isFOAFFriend(Person)  in([Friend], FOAFWrapper : getFOAFFriends()), Person = Friend. Philipp Kärger - L3S Research Center 17/01/19

Integration of (Semantic) Web sources isFOAFFriend(Person)  in([Friend], FOAFWrapper : getFOAFFriends()), Person = Friend. Philipp Kärger - L3S Research Center 17/01/19

Reactive Semantic Web Policies - Summary declarative policy language for reactive policies well-defined semantics strong and lightweight evidences seamless integration of (Semantic) Web sources Philipp Kärger - L3S Research Center 17/01/19

SPoX – Skype Policy Extension Implementation SPoX – Skype Policy Extension Philipp Kärger - L3S Research Center 17/01/19

Philipp Kärger - L3S Research Center 17/01/19

SPoX – a Skype Policy Extension “Driving the behavior of Skype” Reactive policies define who is allowed to do what which/whose notification shows up considers the Social Context Skype is extended by a reactive policy engine connector to (Semantic) Web sources channel for negotiations Philipp Kärger - L3S Research Center 17/01/19

Defining Reactive Policies in SPoX Philipp Kärger - L3S Research Center 17/01/19

Architecture of SPoX Philipp Kärger - L3S Research Center 17/01/19

Strong and lightweight evidences in action Strong evidences credentials are shared through the game channel Lightweight evidences used to identify people across Social Networks used to transfer passwords Philipp Kärger - L3S Research Center 17/01/19

Conclusions & Future Work Philipp Kärger - L3S Research Center 17/01/19

Future Work exploit authentication means (OpenID, FOAF+SSL, etc.) integrate other Semantic Web sources handle conflicting policy rules Philipp Kärger - L3S Research Center 17/01/19

Conclusions Reactive behavior description and trust features are isolated on the Semantic Web Reactive Semantic Web policies combines both: reactive rule reasoning and upper layers of trust on the SW stack Provided a framework for reactive Semantic Web policies establishes trust based on exchange of evidences features formal language definition Provided Implementation for the semantic behavior control in Skype Philipp Kärger - L3S Research Center 17/01/19

Thanks for your attention. www.L3S.de/~kaerger/SPoX Philipp Kärger L3S Research Center kaerger@L3S.de www.L3S.de/~kaerger Philipp Kärger - L3S Research Center 17/01/19