What legal inferences in OPM OPM Workshop Luc Moreau.

Slides:



Advertisements
Similar presentations
Brief Introduction to Provenance "As data becomes plentiful, verifiable truth becomes scarce
Advertisements

Eggs Eggs are important! They are responsible for holding the cake together so that is doesnt fall apart.
Feedback on OPM Yogesh Simmhan Microsoft Research Synthesis of pairwise conversations with: Roger Barga Satya Sahoo Microsoft Research Beth Plale Abhijit.
Inverses of Functions Part 2
Q UERY L ANGUAGE C ONSTRUCTS FOR P ROVENANCE Murali Mani, Mohamad Alawa, Arunlal Kalyanasundaram University of Michigan, Flint Presented at IDEAS 2011.
Open Provenance Model Tutorial Session 2: OPM Overview and Semantics Luc Moreau University of Southampton.
Carnegie Mellon Lecture 7 Instruction Scheduling I. Basic Block Scheduling II.Global Scheduling (for Non-Numeric Code) Reading: Chapter 10.3 – 10.4 M.
ICS-FORTH May 23, An Ontological Approach to Digital Preservation Metadata Martin Doerr Foundation for Research and Technology - Hellas Institute.
Open Provenance Model Tutorial Session 3: OPM Serializations Luc Moreau University of Southampton.
A Provenance-based Access Control Model for Dynamic Separation of Duties July 10, 2013 PST 2013 Dang Nguyen, Jaehong Park, and Ravi Sandhu Institute for.
RECIPE FOR 1 CAKE 2 Cups Flour 2 Eggs 1 Cup Sugar 1 Tbs Baking Powder 1 Cup Water 1/3 Cup Oil.
 150 grams of honey  100 grams of butter  2 big eggs  100 grams of sugar  A cup of flour  Half a teaspoon of salt  Package of baking powder  A.
Al-Karma Language School Computer Department Prep. 3.
Storing, Indexing and Querying Large Provenance Data Sets as RDF Graphs in Apache HBase Artem Chebotko Joint work with John Abraham and Pearl Brazier University.
Copyright © 2006 Addison-Wesley. All rights reserved.1-1 ICS 410: Programming Languages Chapter 3 : Describing Syntax and Semantics Axiomatic Semantics.
Axiomatic Semantics Dr. M Al-Mulhem ICS
Dr. Muhammed Al-Mulhem 1ICS ICS 535 Design and Implementation of Programming Languages Part 1 Fundamentals (Chapter 4) Axiomatic Semantics ICS 535.
Given Connections Solution
Open Provenance Model Tutorial Session 5: OPM Emerging Profiles.
Predicting Missing Provenance Using Semantic Associations in Reservoir Engineering Jing Zhao University of Southern California Sep 19 th,
Usage of `provenance’: A Tower of Babel Luc Moreau.
Making a pizza First mix flour and water.
Provenance-based Access Control in Cloud IaaS August 23, 2013 Dissertation Proposal Dang Nguyen Institute for Cyber Security University of Texas at San.
Chapter 4.8: Determine if the Relation is a Function.
On Data Provenance in Group-centric Secure Collaboration Oct. 17, 2011 CollaborateCom Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
By 15 Amy. Ingredients Two eggs Castor sugar 40g Milk 100cc cake flour 160g Corn flour 40g baking powder 6g Melt butter 60g Salt 1g vanilla extract.
Open Provenance Model Tutorial Session 4: Use cases from data.gov.uk.
Chocolate fudge cake Ingredients 100g butter 250g caster sugar 50ml sunflower oil 25g cocoa powder 2 teaspoons vanilla extract 4 medium eggs 80ml milk.
Lesson 1-3, 1-4 Represent Functions as Graphs; Graphing Linear Equations using Intercepts.
Two quantities are in direct proportion if the graph of one quantity against the other quantity is a straight line through the origin. So if one quantity.
 You are selling tickets for a high school basketball game. Student tickets cost $3 and general admission tickets cost $5. You sell 350 tickets and collect.
1.1 Functions This section deals with the topic of functions, one of the most important topics in all of mathematics. Let’s discuss the idea of the Cartesian.
A Semantic Web Approach for the Third Provenance Challenge Tetherless World Rensselaer Polytechnic Institute James Michaelis, Li Ding,
Finite State Machines (FSM) OR Finite State Automation (FSA) - are models of the behaviors of a system or a complex object, with a limited number of defined.
Introduction to design and analysis algorithm
Write a function rule for a graph EXAMPLE 3 Write a rule for the function represented by the graph. Identify the domain and the range of the function.
Understanding Naturally Conveyed Explanations of Device Behavior Michael Oltmans and Randall Davis MIT Artificial Intelligence Lab.
© University of Manchester Creative Commons Attribution-NonCommercial 3.0 unported 3.0 license Quality Assurance, Ontology Engineering, and Semantic Interoperability.
Domain: a set of first elements in a relation (all of the x values). These are also called the independent variable. Range: The second elements in a relation.
1 Introduction to design and analysis algorithm. 2.
1 Provenance-Based Access Control (PBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair April 15, 2016
Pierre Kerboriou Chocolate Fairy Cake Less than 30min preparation time.
RECIPE FOR 1 CAKE 2 Cups Flour 2 Eggs 1 Cup Sugar 1 Tbs Baking Powder
Functions and relations
Chapter 1 Connections to Algebra Review
Computer Science Department
Input/Output tables.
Objective – To use tables to represent functions.
Graph Coverage Criteria CS 4501 / 6501 Software Testing
Division with negative numbers:
Inverses Inverse Relations & Inverse Functions
RELATIONS AND FUNCTIONS
Additive and Multiplicative Relationships
Linear Functions SOL 8.14, SOL 8.16, SOL 8.17.
Functions and relations
Systems of Inequalities
Michael Shuffett Virginia Tech Blacksburg, VA
How would you use your calculator to solve 52?
1-7 Function Notation Aim: To write functions using function notation.
ADDITIVE VS. MULTIPLICATIVE RELATIONSHIPS
Cookie Chemistry Ms. Chang.
Objective- To use an equation to graph the
Writing Expressions.
How would you use your calculator to solve 52?
If r = 9, b = 5, and g = −6, what does (r + b − g)(b + g) equal?
ALGEBRA 1.6 Inequalities.
EXPLICIT RULES: INPUT-OUTPUT FORMULAS
Objective- To graph a relationship in a table.
2.5 Basic Differentiation Properties
P 72 (PDF 76) Figure 32 Information item name Rules in columns
Presentation transcript:

What legal inferences in OPM OPM Workshop Luc Moreau

A1A2P1 P2 used(R3) wasGene- ratedBy(R2) used(R1) wasTriggeredBy wasDerivedFrom Acc1 Acc3 Acc2 usedwasGeneratedBy wasDerivedFrom

Problem This rule leads to unexpected inferences

100g Flour 100g Sugar 2 eggs Bake bad Cake 100g Butter wasGeneratedBy(cake) used(flour) used(sugar) used(egg) used(butter) 1 egg wasGeneratedBy(unused)

Using this rule, we can infer that the – Unused egg was derived from the flour!

Origin of the Problem (1) Definition 5 [Artifact Used by Process]: In a graph, connecting a process to an artifact by a used edge is intended to indicate that the process required the availability of the artifact to complete its execution. When several artifacts are connected to a same process by multiple used edges, all of them were required for the process to complete.

Origin of the Problem (2) Definition 6 [Artifacts Generated by Processes] In a graph, connecting an artifact to a process by an edge wasGeneratedBy is intended to mean that the process was required to initiate its execution for the artifact to be generated. When several artifacts are connected to a same process by multiple wasGeneratedBy edges, the process had to have begun, for all of them to be generated.

Origin of the Problem (3) Inferring that an output was derived from a process input is therefore not valid

Solution to the Problem (1) PASOA model allows only one input per process and relationships are between 1 input and all the inputs that were required for the derivation to take place

Solution to the Problem (2) Rename wasDerivedFrom into mayHaveBeenDerivedFrom Very weak semantics

Solution to Problem (3) Strength definitions 5 – Definition 5: inputs need to be available for the process to begin (as opposed to complete)

Solution to Problem (4) Use time annotations to restricted permitted inferences Problem: we thought that provenance could be timeless Time is no longer really an annotation Causality implies time, but time does not imply causality!