Presentation overview Introduction to automated privacy and Identity management. Ontologies: What they are, how they can help Conceptual Mediation: Lawyers,

Slides:



Advertisements
Similar presentations
Dr. Leo Obrst MITRE Information Semantics Information Discovery & Understanding Command & Control Center February 6, 2014February 6, 2014February 6, 2014.
Advertisements

1 Long term changes to P3P Long Term Future of P3P Workshop Giles Hogben Joint Research Centre European Commission.
CH-4 Ontologies, Querying and Data Integration. Introduction to RDF(S) RDF stands for Resource Description Framework. RDF is a standard for describing.
Semantic Web Thanks to folks at LAIT lab Sources include :
SIG2: Ontology Language Standards WebOnt Briefing Ian Horrocks University of Manchester, UK.
Of 27 lecture 7: owl - introduction. of 27 ece 627, winter ‘132 OWL a glimpse OWL – Web Ontology Language describes classes, properties and relations.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Minding Your Own Business The Platform for Privacy Preferences Project and Privacy Minder Lorrie Faith Cranor AT&T Labs-Research
1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
COMP 6703 eScience Project Semantic Web for Museums Student : Lei Junran Client/Technical Supervisor : Tom Worthington Academic Supervisor : Peter Strazdins.
The Semantic Web Week 12 Term 1 Recap Lee McCluskey, room 2/07 Department of Computing And Mathematical Sciences Module Website:
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Outline of Security Introduction Types of constraints Example Challenge Framework Methodology MMCTPN SMIL 2.0 implementation Contribution Future Work.
The RDF meta model: a closer look Basic ideas of the RDF Resource instance descriptions in the RDF format Application-specific RDF schemas Limitations.
From SHIQ and RDF to OWL: The Making of a Web Ontology Language
Introduction to eValid Presentation Outline What is eValid? About eValid, Inc. eValid Features System Architecture eValid Functional Design Script Log.
Course Instructor: Aisha Azeem
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
An OWL based schema for personal data protection policies Giles Hogben Joint Research Centre, European Commission.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
XACML Briefing for PMRM TC Hal Lockhart July 8, 2014.
MDC Open Information Model West Virginia University CS486 Presentation Feb 18, 2000 Lijian Liu (OIM:
Requirements for DSML 2.0. Summary RFC 2251 fidelity Represent existing directory protocols with new transport syntax Backwards compatibility with DSML.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Ontology Development Kenneth Baclawski Northeastern University Harvard Medical School.
Practical RDF Chapter 1. RDF: An Introduction
Okech Odhiambo Faculty of Information Technology Strathmore University
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
INF 384 C, Spring 2009 Ontologies Knowledge representation to support computer reasoning.
The Semantic Web William M Baker
Demonstration of the Software Prototypes PRIME PROJECT 17 December 2004.
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
© 2002 IBM Corporation IBM Zurich Research Laboratory W3C Workshop on the long term Future of P3P | June © 2003 IBM Corporation Shortcomings.
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
©Ferenc Vajda 1 Semantic Grid Ferenc Vajda Computer and Automation Research Institute Hungarian Academy of Sciences.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Activity 7 Ontologies and Privacy Principles Giles Hogben Joint Research Centre giles.hogben at jrc.it.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
SKOS. Ontologies Metadata –Resources marked-up with descriptions of their content. No good unless everyone speaks the same language; Terminologies –Provide.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
OWL Representing Information Using the Web Ontology Language.
User Profiling using Semantic Web Group members: Ashwin Somaiah Asha Stephen Charlie Sudharshan Reddy.
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
The RDF meta model Basic ideas of the RDF Resource instance descriptions in the RDF format Application-specific RDF schemas Limitations of XML compared.
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
Dr. Bhavani Thuraisingham September 24, 2008 Building Trustworthy Semantic Webs Lecture #9: RDF and RDF Security.
Towards End-to-End Privacy Control in the Outsourcing of Marketing Activities: A Web Service Integration Patrick C. K. HungDickson K.W. Chiu W.W. FungWilliam.
THE SEMANTIC WEB By Conrad Williams. Contents  What is the Semantic Web?  Technologies  XML  RDF  OWL  Implementations  Social Networking  Scholarly.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Formal Specification: a Roadmap Axel van Lamsweerde published on ICSE (International Conference on Software Engineering) Jing Ai 10/28/2003.
Dr. Bhavani Thuraisingham September 18, 2006 Building Trustworthy Semantic Webs Lecture #9: Logic and Inference Rules.
Application Report: An extensible policy editing API for privacy and identity management policies Giles Hogben jrc. It European Commission.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
WonderWeb. Ontology Infrastructure for the Semantic Web. IST Project Review Meeting, 11 th March, WP2: Tools Raphael Volz Universität.
CMPE 494 Service-Oriented Architectures and Web Services Platform for Privacy Preferences Project (P3P) İDRİS YILDIZ
Semantic Web. P2 Introduction Information management facilities not keeping pace with the capacity of our information storage. –Information Overload –haphazardly.
OWL (Ontology Web Language and Applications) Maw-Sheng Horng Department of Mathematics and Information Education National Taipei University of Education.
Building Trustworthy Semantic Webs
ece 720 intelligent web: ontology and beyond
Ontologies and Model-Based Systems Engineering
Lecture #6: RDF and RDF Security Dr. Bhavani Thuraisingham
Presentation transcript:

Presentation overview Introduction to automated privacy and Identity management. Ontologies: What they are, how they can help Conceptual Mediation: Lawyers, Users, Businesses Ontologies and reasoning: Anonymizing access control Reasoning in Access Control Demo

A typical human readable privacy policy ( )

Automating privacy protection: Scenario 1:Client Side Architecture

Example XML Statement in P3P Policy

Example P3P Rule

Automating Privacy Protection: Scenario 2: Enterprise Architecture Privacy Based Access Policies Security Policies Privacy Layer Security Layer Data Flow Ontology GUI Rules & Rule Engine

Scenario 3:Automated Identity Management Single Sign On Access Control Personalization Management Directory Services Workflow Automation Policies & Profiles Delegated Administration APPLICATIONSFRAMEWORK USERS

Automated Identity Management Based on Credentials Single Sign On Access Control Personalization Management Directory Services Workflow Automation Policies & Profiles Delegated Administration APPLICATIONSFRAMEWORK Tokens/Credentials User

XML based policies describe Business practices (Enterprise Policies) User preferences Obligations Access conditions Audit logs

Automated Privacy – Stakeholders End Users E.g. My mother Law enforcement E.g. Police, Data Protection Authorities, Article 29 Working group Business Privacy Concerns Cost eCommerce $15 Billion a yr – Forrester Research Application developers E.g. Browser developers, EPAL implementations

4 Key Problems 1. Each group of stakeholders speaks a completely different language –E.g. Many users have never heard of identity management, they just want to sign onto multiple web sites. 2. Enterprises need to be user friendly, but at the same time control liability. 3. Existing languages are not expressive or extensible enough to model all aspects of data protection. 4. The law says you should only collect the minimum data required to carry out the service. BUT - How to work out the minimum data required? Applications are not yet intelligent enough to know what to ask for.

Ontologies Ornithology: the study of birds Oncology: the study of cancer Onychology: study of fingernails and toenails. Ontology: a formal, machine readable specification of terms and their relationships in a specific domain..

How Ontologies can Help Automated Privacy and IDM Machine readable description of concepts and relationships between –Data Protection Law –User-metaphors –Enterprise business rules –Application logic  Can translate between legal-ese, user-ese, business-ese and java/c++:

Ontology Rule Systems Program Logic Developers End-Users Legal Alignment of Legal, User and Technical Models Enterprise

How Ontologies can Help Automated Privacy and IDM Richly Expressive, Precise and Interoperable policy languages Reasoning capabilities  more powerful policy evaluation: –e.g. To figure out what is the minimum data required, to accept flexible credentials. Standard language used in user interfaces so businesses can trust policy translations

How Ontologies can Help Automated Privacy and IDM Extensible to include other ontologies (e.g. geographical ontology for location based services) Language independence (privacy  riservatezza) Separate Business Logic, Conceptual Models and Program Logic  more efficient development

Technical Details of Ontologies

Description Logics Are languages for describing concepts, and their properties and relations. E.g. -OWL (W3C Standard) -RDFS (W3C Standard) -DAML+OIL ( Knowledge Base (e.g. Privacy Policy)

Semantics Semantics specify the connection between terms (names) and concepts (meaning) (see e.g. Fodor, Chomsky, RDF Semantics: )

What is an ontology? Description Logics describe: -Concepts  Classes and Subclasses -E.g. Data, health data, data controller -Properties  Describe features and attributes -E.g. is Collected by -Restrictions on Properties and Concepts -E.g. If a person is Italian and has a driving license, they are over 18, -health Data is a subclass of Data

RDF OWL uses RDF – a graph description language which is very well suited to describing concepts Based on a very simple graph modelling language (The core RDF specification only 2-3 pages long!) "Triple" - a statement [Subject - Predicate – Object] [Religious data – is of type – Sensitive Data] RDF (in contrast to XML) can describe arbitrarily complex statements and relationships. Sensitive Data Is in category

OWL uses RDF to describe relationships between concepts Sensitive Data AddressReligion Data Controller Subclass of 1 Number of Must specify Related/Unrelated Subject Data Collects About Contact Data Subclass of

Policies are expressed in RDF (but XML may also be used for backward compatibility) Via Enrico Fermi Contact details of Data Controller * Data Object Is in category Data Subject Performed By Transfers Third Party Marketing Purpose of Is in category Street Name

How ontologies standardize application semantics Via Enrico Fermi Contact details of Data Controller Data Object Is in category Data Transfer Event Performed By Transfers Third Party Marketing Purpose of Is in category Street Name DP Ontology Based on P3P Data Typing Ontology Based on P3P

Ontology Development Tools

Ontology Development Tools: Java Libraries Jena, developed by HP labs, provides a complete suite of Java tools for processing RDF, OWL, and reasoning using OWL and prolog style rules. Downloadable from

Ontology Capture Processes The most important factor in the success of an ontology Methodologies: Each concept is defined by a traceable and repeatable process. Text analysis: Automated or semi-automated analysis of key documents (e.g. legislation) Interviews and group exercises (e.g. Legal modelling) Conflict resolution methodologies – describe and resolve situations where groups disagree. Alignment of different ontologies covering similar domains.

Formal and Informal Ontologies XML languages such as P3P and XACML are Informal Ontologies -Semantics of terms is informally defined E.g. P3P: = current purpose with human readable definition -XML:not a rigorous or complete framework for semantics but has a high adoption level Informal ontologies represent a huge body of work towards conceptual consensus.

Example Scenarios for Privacy and IDM Conceptual mediation between users, lawyers and businesses Access control: credential reasoning Demo

Users Need to –Specify Preferences –Receive Warnings –Understand policies Using Simple metaphors – e.g. town/house metaphor

Lawyers Need to –Ensure that business policies are compliant with legislation –Ensure that users have preferences that are compliant with the law. –Provide tools for businesses for checking legal compliance. Using Precise, unambiguous language

Enterprises Need to –Create privacy policies –Enforce privacy policies –Communicate good practice to users –Collect and store consent –Protect against liabilities Using Precise, unambiguous business-process concepts

Application developers Need to –Implement enterprise policies consistently –Implement user preferences –Translate user metaphors into real practise –Easily updateable applications Using Pragmatic:Java/C++/UML/ Prolog String rules = "[(?d rdf:type eg:studentdoctor) (?n rdf:type eg:nurse) ->(?d eg:superiorTo ?n) (?n eg:subordinateTo ?d)]"; rules +="[(?d rdf:type eg:surgeon) (?n rdf:type eg:studentdoctor) ->(?d eg:superiorTo ?n) (?n eg:subordinateTo ?d)]"; rules +="[(?d eg:canShowCredential eg:drivinglicense) -> (?d eg:hasAge ?n) (?n eg:greaterThan 18)]";

Example 1 Policy states: Company X DISCLOSES data about ADDRESS To UNRELATED THIRD PARTIES Without CONSENT Ontology + Rules can then translate this into descriptions and actions which are appropriate to the context:

Example 1 :Conceptual Alignment Data which might lead to spam ADDRESSSensitive Data USERSAPPLICATIONREGULATORS

Example 1:Conceptual Alignment I ticked a box ConsentConsent to data processing USERSAPPLICATIONSREGULATORS

Example 1:Conceptual Alignment Remember my details CookiesClickstream data USERSAPPLICATIONSREGULATORS

Example 1:Conceptual Alignment Private Information religion Sensitive Data USERSAPPLICATIONSREGULATORS Medical dataCriminal record

Example 1: the same concepts in the policy are translated by the rules: Users: Display a warning in language users can understand, “Warning – submitting this form could cause Spam” Lawyers: Alert service about illegal practices Application: Don’t submit any data to this company – or create a pseudonymous address. Warn policy creator of illegal practices (E.g. JRC Policy Editor) Business: Change data handling practices (E.g. display legal language to users e.g. for collecting consent)

Architectural note: All this can be done with programme logic. BUT: if you encode this knowledge in an ontology (e.g. -address leads to spam), you can reuse it share it standardize it. Put it under the control of the stakeholders.

Ontologies Reasoning for Access Control Access control applications need to be able to minimize the information required to authenticate an access request. E.g. instead of asking for my age to access a service (e.g. gambling service), it could check whether I can prove I have a driving license.

Example 2: Anonymizing access control I want to access a service, but I do not want to reveal my age. The service however, needs to know that I am over 18 to satisfy legal requirements. The service already knows that I have a driving license

Example 2: anonymizing access control Suppose the service has access to an ontology which contains (e.g.) the following concepts and relationships : Concepts: –DRIVERS LICENSE –CREDENTIAL –PERSON Properties: –HOLDS CRENDENTIAL (can exist between Persons and Credentials – e.g. Giles Hogben Holds a British Passport) –HAS AGE (can exist between Persons and integers – e.g. Giles Hogben HAS AGE XXXX(X is an integer) ) Restrictions: –If a Person HOLDS CREDENTIAL a DRIVERS LICENSE  that person HAS AGE age > 18

Example 2 Using the above Ontology, the access control application can allow me access, without asking me what my age is, because it can deduce what it needs to know from the fact that I have a driving license.

Example 3: anonymizing access control I am a doctor and I want to access the medical records of a certain patient. In order to have access, I must be a health professional with grade superior to a nurse. I can present a credential which certifies that I am a surgeon

Example 3: anonymizing access control Suppose the service has access to an ontology which contains (e.g.) the following concepts and relationships : Concepts: –StudentDoctor (is a doctor) –Surgeon (is a doctor) –Nurse (is a Health Professional) –Doctor (is a Health Professional) –Health Professional Properties: –SuperiorTo (can exist between Persons) Restrictions: –SuperiorTo is Transitive (i.e. if x SuperiorTo y and y SuperiorTo z then x SuperiorTo z) –Student Doctors are Superior to Nurses –Surgeons are Superior to Student Doctors

Example 3 Using the above ontology and only the fact that I can prove I am a surgeon, the application can allow me access to the patient’s records See Java App

What do these examples show? Ontologies can translate between different views of the world – i.e. users, lawyers, enterprises and developers. Flexible use of credentials and easy reasoning E.g. Ability to allow credential with greater anonymity. Further developed ontology could make judgements about level of anonymity of a credential to select the most anonymous one.

Questions ? (giles.hogben att jrc.it)

Ontology based architecture Policy contains data specific to the individual or enterprise (may also contain rules) Ontology defines general concepts and relationships Application Logic contains generic rules All 3 may contain rules Ontologies are Rules which are valid for the whole domain (e.g. one controller per data collection act) and rules which are specific to the enterprise PolicyOntologyApplication Logic

Ontologies and XML XML Provides informal ontological semantics (e.g. tag nesting==sub- classing etc…) Existing software can parse and search XML Easy for the techie to be read Many informal ontologies exist in XML (e.g. P3P) Not all ontological concepts can be expressed (e.g. Sameindividualas, disjointwith, complementOf etc…) No formal semantics Not suited to reasoning OWL/RDF (became W3C Official Spec on Feb 10 th ) Much Richer Syntax (e.g. disjoint, complete, sameas etc…) Formal Semantics – more suited to reasoning Almost impossible to read by eye even for techies. No parsers incorporated in current software