Advanced Semantic Web Policies ____ Preferences and Reactivity Philipp Kärger L3S Research Center, Leibniz University Hannover Research Seminar, DERI Galway,

Slides:



Advertisements
Similar presentations
Serving St. Thomas More School For the school year and beyond.
Advertisements

Overview and Demonstration of declarative workflows in SharePoint using Microsoft SharePoint Designer 2007 Kevin Hughes MCT, MCITP, MCSA, MCTS, MCP, Network+,
RDF Tutorial.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Trust, Security and Privacy in Learning Networks Daniel Olmedilla L3S Research Center / Hannover University Learning Networks in Practice 10 th May, 2007.
National Service Trust Automation Project Training Materials: Members and Alumni Corporation for National & Community Service (CNCS) National Service Trust.
Comergence 3/14/13. What Does Comergence Do? Comergence provides streamlined processing and centralized storage of Correspondent applications nationwide.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Minding Your Own Business The Platform for Privacy Preferences Project and Privacy Minder Lorrie Faith Cranor AT&T Labs-Research
Andrew Courter Texas Tech University CS5331.  PKS Why PKS? STRIPS The Databases Inference Algorithm Extended Features  PKS Examples  Conclusion and.
EAYSO. 2 Player Registration Volunteer Registration Invoicing/Payments Financial Reporting Team Management Game and Referee Scheduling Player Rosters.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
25/10/2009Philipp Kärger1 Reactivity and Social Data: Keys to Drive Privacy Decisions in Social Network Applications* * This work was partially supported.
Using Social Semantic Web Data for Privacy Policies Presentation of the Bachelor Thesis Emily Kigel.
July 11 th, 2005 Software Engineering with Reusable Components RiSE’s Seminars Sametinger’s book :: Chapters 16, 17 and 18 Fred Durão.
ALMA MATER STUDIORUM UNIVERSITY OF BOLOGNA UNIVERSITY OF FERRARA Policy-based reasoning for smart web service interaction Federico Chesani, Paola Mello,
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005.
Workflow In the Office of the Registrar UC Berkeley Cathy Taruskin August 2, 2004.
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke L3S Research.
Exploiting Preference Queries for Searching Learning Resources Fabian Abel, Eelco Herder, Philipp Kärger, Daniel Olmedilla, Wolf Siberski L3S Research.
© 2004, The Trustees of Indiana University 1 OneStart Workflow Basics Brian McGough, Manager, Systems Integration, UITS Ryan Kirkendall, Lead Developer.
Information for students Welcome to the S 3 P system. Login to the system by entering your User ID and password. The User ID is the same as your normal.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Syllamaster Jason Bosyj Dean Campbell Shaam Haffar Jon Kyger Kelly McCourt Jared Medved Matt Reed Gene Steratore.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Rainbow Facilitating Restorative Functionality Within Distributed Autonomic Systems Philip Miseldine, Prof. Taleb-Bendiab Liverpool John Moores University.
Creating Business Workflow Using SharePoint Designer 2007 Presented by Tarek Ghazali IT Technical Specialist Microsoft SQL Server MVP Microsoft SQL Server.
Sage CRM Developers Course
C++ Object Oriented 1. Class and Object The main purpose of C++ programming is to add object orientation to the C programming language and classes are.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
1 Performance Evaluation of Computer Networks: Part II Objectives r Simulation Modeling r Classification of Simulation Modeling r Discrete-Event Simulation.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Demonstration of the Software Prototypes PRIME PROJECT 17 December 2004.
ASG - Towards the Adaptive Semantic Services Enterprise Harald Meyer WWW Service Composition with Semantic Web Services
A GENERIC PROCESS FOR REQUIREMENTS ENGINEERING Chapter 2 1 These slides are prepared by Enas Naffar to be used in Software requirements course - Philadelphia.
Computer Science Department UoC. Outline Emerald Framework Overview Communication pattern Software Requirements Setup sequence Cs566 project objective.
Module Info Web Application and Development Digital Media Department Unit Credit Value : 4 Essential Learning time : 120 hours
Evaluation of a Publish/Subscribe System for Collaboration and Mobile Working Collaborative Advertising over Internet with Agents Independent Study: Wireless.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check for a license violation.
Semantic Web and Policy Workshop Panel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management.
The Switchvox Extend API
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Workshop on Future Learning Landscapes: Towards the Convergence of Pervasive and Contextual computing, Global Social Media and Semantic Web in Technology.
POLICY ENGINE Research: Design & Language IRT Lab, Columbia University.
Protune Rule-based Policies on the Semantic Web Daniel Olmedilla L3S Research Center & Hannover University PUC Seminar Aug. 21st, 2007, Rio de Janeiro,
Semantic based P2P System for local e-Government Fernando Ortiz-Rodriguez 1, Raúl Palma de León 2 and Boris Villazón-Terrazas 2 1 1Universidad Tamaulipeca.
SEMANTIC AGENT SYSTEMS Towards a Reference Architecture for Semantic Agent Systems Applied to Symposium Planning Usman Ali.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
July 14 th SAM 2008 Las Vegas, NV An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing Danfeng (Daphne) Yao Rutgers University,
ISaral EIMS (Education Institute Management Software) iSaral EIMS is a windows based application, developed for smooth handling of administration of education.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Artificial Intelligence, simulation and modelling.
1 Token–based Dynamic Trust Establishment for Web Services Zhengping Wu and Alfred C. Weaver Department of Computer Science University of Virginia March.
Wegus InfoTech Pvt. Ltd. Wegus InfoTech Pvt. Ltd. Inspiring Business Performance SMS for Banks and Insurance Companies.
Service-Oriented Computing: Semantics, Processes, Agents
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
CitiManager Cardholder Self- Registration
Policy Representation & Reasoning
Technology in Action! Windows Workflow Foundation Advanced Techniques
2018 Digital Survey: Feedback & Analysis
Reactive Policies for the Semantic Web*
Protecting Privacy During On-line Trust Negotiation
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web Philipp Kärger and Wolf Siberski L3S Research Center, Hannover, Germany.
Presentation transcript:

Advanced Semantic Web Policies ____ Preferences and Reactivity Philipp Kärger L3S Research Center, Leibniz University Hannover Research Seminar, DERI Galway, Ireland, July 31 st 2008

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Outline Semantic Web Policies  what are they?  what do they serve for? Preferences and Policies  Why should there be preferences? A Trust Negotiation scenario.  Preferences used in two ways for solving the problem Reactive Policies  Why should they be reactive? A communication scenario.  Combing a reactivity framework and a policy framework

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Me and the intention of this talk three weeks research visit at DERI This talk should provide you with some background in Semantic Web policies ideas of past and planned research not too many details, rather general for questions, please interrupt! my project context:  REWERSE  OKKAM  TENCompetence

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity What is a policy? In a very broad way, a policy is defined as a statement defining the behaviour of an entity.

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Policies - Examples  “If customers are younger than 26 give a 20% discount on goods subclassing ‘educational item’.”  “Up to 15% of network bandwidth can be reserved if payment is done with an accepted credit card”  “Move s sent by my FOAF-friends to the folder ‘private’.”

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Policies are everywhere  Business rules, B2B contracts  e.g. quantity flexible contracts, late delivery penalties  Negotiation  e.g. rules associated with auction mechanisms  Security  e.g. access control policies  Privacy  Information Collection Policies (“ P3P Privacy Policies”)  Workflow management  What to do under different sets of conditions  Context aware computing  Context-sensitive preferences [ by Norman Sadeh, Semantic Web Policy Workshop panel, ISWC 2005 ]

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Policies on the Semantic Web Build Semantic Web applications/systems/agents where  Behaviour can depend on Semantic Web knowledge, that is  events,  facts,  relation between concepts,  messages exchanged, etc.  e.g., “You can get access if you are a FOAF of mine.”

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Policies on the Semantic Web: Benefits  Reasoning about agent behavior  Behaviour can be changed/updated  without re-coding, re-compiling, re-installing, etc.  in a costless manner  Explicit license for autonomous behavior  Reusability  Extensibility  Context-sensitivity  Verifiability  Support for simple as well as sophisticated agents  Protection from poorly-designed, buggy agents

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Trust Negotiation: Policies in Action Aliceon-line book shop Disclose CreditCard IF Requestor has BBB certificate Disclose Book IF Requestor discloses valid CredidCard Disclose BBB certificate to any requestor request for a book “for the book I need a CreditCard” “for the CreditCard I need a BBB cert.” policy:

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Trust Negotiation: used for … Trust Negotiation is used for  Access control  Dynamic contracts  E.g., in web service composition  Autonomic computing  Pervasive environments  E.g., sensor networks  Service-level agreements  e.g., more service for certain requestors  Etc.

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Protune – Rule-based Policies on the Semantic Web  a policy framework developed at L3S Research Center and Naples University  provides a logic-based, declarative policy language  features include  trust negotiation  external actions  access to relational databases,  RDF stores,  file system requests,  time and location-aware packages  policy explanations  “You cannot access because …” (in contrast to just “Access denied.”) Demo at:

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Let’s talk about advanced policies … Current Semantic Web policy frameworks miss two important features: 1. Preferences  2. Reactivity

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Policies and Preferences What if a policy evaluation has more than one result? Aliceon-line book shop Disclose CreditCard IF Requestor has BBB certificate Disclose bank account information IF Requestor has BBB certificate request for a book “for the book I need a CreditCard or your bank account information” Which Credential? CreditCard or bank account information?  exploit user preferences in the negotiation process to decide

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Preference handling a preference is an order of values having a decreasing preference  “I prefer green to red and my last option is brown.”  “I prefer English but German is also fine.” preferences are known from:  databases: preference queries  [Werner Kießling: Preference SQL: design, implementation, experiences. 2002]  [Jan Chomicki: Preference formulas in relational queries. 2003]  logic programming: preferring answer set  [Gerhard Brewka, Thomas Eiter: Preferred Answer Sets for Extended Logic Programs. 1999] 1 2

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Preferences in Policies - the database approach Idea: exploit user preferences over the credentials: generate all possible next steps in the negotiation and select the optimal step according to these preferences  like selecting the optimal entry in a database with a preference query for example { , date of birth, passport, credit card } is preferred to { name, ID, bank account } according to the above preferences.

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Preferences in Policies - the database approach (2) drawbacks of this approach:  non-preferred disclosure sets are first created although they will be thrown away later  conditional preferences can not depend on arbitrary conditions  e.g., “A is preferred to B only if it is sunny in Galway.”  preferences are defined on grounded literals (representing credentials)  i.e., preference statements with variables are impossible  e.g., “ X is preferred to Y only if age( X ) > age( Y ).” Solution: defining the preferences as parts of the policies.

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Preference and Policies – a log. progr. approach A policy with preferences: If possible: Disclose bank account Otherwise: Disclose credit card IF Requestor has BBB certificate inspired by Answer Set Programming with Ordered Disjunctions: advantage:  variables in preferences  arbitrary conditions for preferences  non-preferred solutions (here answer sets) are not created so far no partial order preferences possible  requires extensions

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Let’s talk about advanced policies … Current Semantic Web policies miss two important features: 1. Preferences 2. Reactivity 

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Reactive Policies While doing valuable research … Notify me if one of my contacts has birthday and goes online. If someone phones me while I am on a call, deny the call and open a chat instead. Show my date of birth only to family members. Automatically accept “share contact dates” for DERI members and for the contacts of my family. Always accept files sent by DERI members but only if it’s not an exe file. My students can call me only on Wednesday morning. After the semester, deny their calls. DERI members can only call me during business hours.

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Reactive Policies vs. Current Policies Current policies define under which circumstances conditions are true. for example,  who exactly gets access  why we grant access  what is needed to get access

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Reactive Policies vs. Current Policies But what is missing in current policy frameworks? When is the policy evaluated?  Triggering Events What exactly happens if a policy is evaluated to true or false?  Actions (as reactions to events) IF EVENT “call comes in” HAPPENS AND “I am on another call” HOLDS PERFORM ACTION “deny call and open chat” If someone phones me while I am on a call, deny the call and open a chat instead. Reactivity!

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Reactive Policies - Applications applications for Reactive Semantic Web Policies: react to changes in the Semantic Web  notifications of changes  propagation of events and updates  automated re-crawling of Semantic Web resources making applications Semantic Web driven (e.g., communication in messengers)

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Research on Reactivity Reactivity in Databases: “Active Database Systems”, Book, 1995 many more Reactivity on the web: “An Event Condition Action Language for XML”, WWW2002 EDBT 2006 Workshop “Reactivity on the Web” REWERSE Work Package “Evolution and Reactivity” some more

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Reactive Policies - Approach Claim: We need policies that allow for reactivity. Solution: Reactive Policies also called Event Condition Action Policies

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Event Condition Action Policies -inspired by Event Condition Action Rules (ECA rules) -always three components: -Event: when is the rule evaluated -Condition: what has to be satisfied -Action: what is the reaction to the event ON a call comes in IF I am on another call DO deny call and open chat If someone phones me while I am on a call, deny the call and open a chat instead.

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Reactive Policies – An Implementation Idea: Combining a Reactive Framework and a Policy Framework: r³ and Protune

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Reactive Policies r 3 – Resourceful Reactive Rules r 3 – Resourceful Reactive Rules (developed at the AI Center, Universida de Nova de Lisboa (Portugal)) (Semantic) Web Rule Engine for Reactive Rules evaluates rules of the form: myEventLanguage:SkypeCallComesIn(User) myConditionLanguage:isNotTrusted(User) myActionLanguage:denyCall(User) plugging in arbitrary languages makes it really flexible

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Reactive Policies - Combining r 3 and Protune L3S Research Seminar Protune external actions any event language (e.g., XChange, Prova) myEventLanguage:SkypeCallComesIn(User) PROTUNE:isNotTrusted(User) PROTUNE:denyCall(User) Protune goals

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Reactive Policies - Benefits Protune allows for negotiations, information exchange provides explanations allows for (external) actions r³ allows for arbitrary event languages evaluates Event Condition Action rules handles the binding across events, conditions, actions making policies reactive enhance reactivity with policies

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Summary Semantic Web Policies  used to define automated behavior  Policies in action: Trust Negotiation  a Semantic Web policy framework: Protune Preferences in Policies  needed for adequate representation of user intention  two approaches inspired by Databases and Log. Progr. ECA policies  enhance policies with events and actions  needed for many Semantic Web applications  combining r³ and Protune merges policies and reactivity L3S Research Seminar

Philipp Kärger, L3S Research Center DERI Galway, July 31 st, Advanced Semantic Web Policies – Preferences and Reactivity Thank you for your attention. Please let me know if there are any questions. Philipp Kärger