A Formal Foundation for ODRL What’s ODRL?  An XML-based language for writing software licenses. Language specification includes:  syntax  English interpretation.

Slides:



Advertisements
Similar presentations
Artificial Intelligence
Advertisements

© 2006 Open Grid Forum OGF19 Federated Identity Rule-based data management Wed 11:00 AM Mountain Laurel Thurs 11:00 AM Bellflower.
ITU WORKSHOP ON STANDARDS AND INTELLECTUAL PROPERTY RIGHTS (IPR) ISSUES Session 5: Software copyright issues Dirk Weiler, Chairman of ETSI General Assembly.
Creating Institutional Repositories Stephen Pinfield.
The impact of the UK Freedom of Information Act on records management Dr Elizabeth Shepherd Department of Information Studies, University College London.
The International Security Standard
Authorization Policies Vicky Weissman
SIG2: Ontology Language Standards WebOnt Briefing Ian Horrocks University of Manchester, UK.
ISBN Chapter 3 Describing Syntax and Semantics.
CSE 425: Logic Programming I Logic and Programs Most programs use Boolean expressions over data Logic statements can express program semantics –I.e., axiomatic.
A Formal Foundation for XrML Vicky Weissman Joint work with Joe Halpern.
A Formal Foundation for XrML Vicky Weissman Joint work with: Joseph Halpern.
Extensible Semantics for XrML Vicky Weissman Joint work with Joe Halpern.
Where are the Semantics in the Semantic Web? Michael Ushold The Boeing Company.
The Lumina Center Grantseeking Workshop Series Presents Outcomes & Evaluations April 20, 2006.
Using First-order Logic to Reason about Policies Vicky Weissman Joint work with: Joseph Halpern and Carl Lagoze.
RDF Kitty Turner. Current Situation there is hardly any metadata on the Web search engine sites do the equivalent of going through a library, reading.
Types of Requirements  Functional Requirements  Descriptions of actions or processes that create or update information.  Outlines of reports or on-line.
A logic for reasoning about digital rights Riccardo Pucella, Vicky Weissman Cornell University.
Towards a policy language for humans and computers Vicky Weissman Joint work with Carl Lagoze.
Rights management Vicky Weissman
Describing Syntax and Semantics
1 Relational Algebra and Calculus Yanlei Diao UMass Amherst Feb 1, 2007 Slides Courtesy of R. Ramakrishnan and J. Gehrke.
Copyright in Cyberspace Copyright Law Larry Lessig David Post Eugene Volokh
Meaningful Modeling: What’s the Semantics of “Semantics”? David Harel, Weizmann Institute of Science Bernhard Rumpe, Technische Universität Braunschweig.
THE INTELLECTUAL PROPERTY OF SOURCE CODE Michael Musick.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Knowledge Mediation in the WWW based on Labelled DAGs with Attached Constraints Jutta Eusterbrock WebTechnology GmbH.
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
1 ©2013 Open Grid Forum OGF Working Group Sessions Security Area – FEDSEC Jens Jensen, OGF Security Area.
How Well Do You Know Copyright? Connie Murphy Hylton High School Library 2008.
RDF (Resource Description Framework) Why?. XML XML is a metalanguage that allows users to define markup XML separates content and structure from formatting.
Project.  Topic should be: Clear and specific Practical and meaningful, this means the results of your research must have some implications in real life.
Outcome Based Evaluation for Digital Library Projects and Services
Ming Fang 6/12/2009. Outlines  Classical logics  Introduction to DL  Syntax of DL  Semantics of DL  KR in DL  Reasoning in DL  Applications.
Benjamin Gamble. What is Time?  Can mean many different things to a computer Dynamic Equation Variable System State 2.
An Algebra for Composing Access Control Policies (2002) Author: PIERO BONATTI, SABRINA DE CAPITANI DI, PIERANGELA SAMARATI Presenter: Siqing Du Date:
Author: Graham Hughes, Tevfik Bultan Computer Science Department, University of California, Santa Barbara, CA 93106, USA Source: International Journal.
Workflows in Webdam Victor Vianu UC San Diego & INRIA/Webdam.
Pattern-directed inference systems
Advanced Topics in Propositional Logic Chapter 17 Language, Proof and Logic.
1 Logical Agents CS 171/271 (Chapter 7) Some text and images in these slides were drawn from Russel & Norvig’s published material.
Slide 1 Propositional Definite Clause Logic: Syntax, Semantics and Bottom-up Proofs Jim Little UBC CS 322 – CSP October 20, 2014.
Formal Verification Lecture 9. Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems.
1 Relational Algebra and Calculas Chapter 4, Part A.
Relational Algebra.
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy.
Ontology-Based Computing Kenneth Baclawski Northeastern University and Jarg.
1. 2 Preface In the time since the 1986 edition of this book, the world of compiler design has changed significantly 3.
1 Logical Agents CS 171/271 (Chapter 7) Some text and images in these slides were drawn from Russel & Norvig’s published material.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
DEDUCTION PRINCIPLES AND STRATEGIES FOR SEMANTIC WEB Chain resolution and its fuzzyfication Dr. Hashim Habiballa University of Ostrava.
© 2006 Open Grid Forum FEDSEC-CG Andrew Grimshaw and Jens Jensen.
Architectural Design Architect Walk Copyright © Texas Education Agency, All rights reserved. 1.
Chapter 11 Introduction to Computational Complexity Copyright © 2011 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.
Daniel Kroening and Ofer Strichman 1 Decision Procedures An Algorithmic Point of View Basic Concepts and Background.
MOPS: an Infrastructure for Examining Security Properties of Software Authors Hao Chen and David Wagner Appears in ACM Conference on Computer and Communications.
1 Ontological Foundations For SysML Henson Graves September 2010.
Artificial Intelligence Logical Agents Chapter 7.
Knowledge Representation Lecture 2 out of 5. Last Week Intelligence needs knowledge We need to represent this knowledge in a way a computer can process.
CS 4700: Foundations of Artificial Intelligence
CIS 842: Specification and Verification of Reactive Systems
OGSA Service Classifications
CS 4700: Foundations of Artificial Intelligence
Unit 6: Application Development
Logic: Top-down proof procedure and Datalog
Schema translation and data quality Sven Schade
Bottom Up: Soundness and Completeness
An information flow model FM is defined by
Representations & Reasoning Systems (RRS) (2.2)
Presentation transcript:

A Formal Foundation for ODRL What’s ODRL?  An XML-based language for writing software licenses. Language specification includes:  syntax  English interpretation of the syntax  Language is freely available. (No copyright or patent restrictions!)  Language has been endorsed by nearly 20 organizations including:  Nokia, a multi-industry conglomerate focused on mobile communications;  DAFNE, a research project funded by the Italian government to develop a prototype of the national infrastructure for electronic publishing; and  RoMEO, a research project investigating the rights management of ‘self- archived’ research in UK academic community. Bottom Line: ODRL has a significant widespread impact on rights management. Problem: No formal semantics = Language is ambiguous ODRL is ambiguous.  In ODRL, we can write `if Alice is not permitted to download file A, then she may download file B’. Suppose Alice is neither explicitly permitted nor explicitly forbidden from downloading file A, may she download file B?  In ODRL, we can write `Alice may download file A, if she does actions a 1 and a 2 in order and does actions a 3 and a 4 in any order. Suppose Alice does the action sequence a 2, a 1, a 3, a 4, a 2. May Alice download file A?  In ODRL, we can write that Alice may download file C, if neither of the above policies hold. What does this mean?  The ODRL document says that the language supports revocation, but doesn’t say who may revoke what. Bottom Line: ODRL is under specified. As a result, implementations won’t all agree and the benefits of having a standard are lost. Our Approach: Translate ODRL licenses into formulas in a logic (that has formal semantics). Using First-order Logic to Reason about Policies Background: Policies say what is and what is not permitted. Sample policies include: `All information on this site may be copied.’ `The tickets may not be refunded.’ Goals: To create a logic that 1. can easily capture the policies that many people want to discuss 2. can efficiently determine what is allowed and what is forbidden 3. is accessible to non-logicians Why bother?: We want to promote the dissemination of ideas, while still respecting intellectual property rights. To do this, we must be able to state what should be shared (i.e. what’s permitted) and what constitutes a violation of a person’s rights (i.e. what’s not permitted). Our Approach: A policy says what is (or what is not) permitted. A policy has the form:  x 1,…,  x m (f  (  ) Permitted(t ag, t ac )) where  f is a conjunction of literals;  t ag is an agent, t ac is an action, both are terms;  Permitted(t ag, t ac ) means t ag may do t ac Encoding Policies The environment (env) gives basic facts about the world.  An environment is a conjunction of  ground literals e.g. Student(Alice)  universal formulas; e.g.  x (Man(x)  Woman(x)) Encoding the Environment Assume an environment E and a policy set P = {p 1,…, p n }, is c 1 allowed/forbidden to do c 2 ? Is E  p 1  …  p n  (  ) Permitted(c 1, c 2 ) a valid formula? Encoding Queries 1 2  2 literals l and l ’ are unifiable if . l  = l ’ .  A literal l is bipolar in a formula f (in CNF) if l is in f and there is a literal l ’ in f such that l and  l ’ are unifiable, (assume no shared variables). Key Idea: BipolarityComplexity If  the env. E has only ground literals,  for the policy set P = {p 1,…, p n } there are no bipolars in p 1  …  p n,  no variable is only on a policy’s lhs, Then our queries take |P||E| time to ans.  If the variable restriction isn’t met, then problems are NP in the number of variables in any one policy.  Under reasonable assumptions, answering queries takes quadratic time, even if the env. has universal formulas. Relaxing Restrictions From Spring 2003… Since then: Paper appears in the Proceedings of the 16 th IEEE Computer Security Foundations Workshop, Research by: Riccardo Pucella and Vicky Weissman, work presented at WITS ’04. Which Logic?  ODRL statements are of the form `if , then  ’   is a conjunction of constraints (facts that are outside the user’s influence), conditions (constraints that must not hold), and requirements (facts that the user controls).  E.g., `If Alice is over 21 years old, she has paid the cover charge, and the policy `Alice may not enter the bar’ does not hold, then Alice may enter the bar’.  These statements are readily captured in first-order logic. Bottom Line: We translate ODRL licenses to formulas in first-order logic. Benefits of using first-order logic  Can compare ODRL with license languages in the formal methods community (which are often fragments of first-order logic).  Can compare ODRL with XrML, since we have translated both to fol.  Complexity is an open problem, but we are hopeful that applying well- known results for first-order logic will yield (at least) an upper bound.  We intend to apply our results from last spring to extend ODRL and, if needed, find tractable fragments.