 Copyright 2008 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute www.deri.ie Uncle-Share: Annotation-Based.

Slides:



Advertisements
Similar presentations
EzScoreboard.com A Fully Integrated Administration Service.
Advertisements

automated single login access to Novell storage resources
Copyright 2008 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute An Annotation-based Access.
IIT Kanpur Web Based Land Records Management System Prof. P.K.Kalra Developed by Department of Electrical Engineering Indian Institute.
Stoimen Stoimenov QA Engineer SitefinityLeads,SitefinityTeam6 Telerik QA Academy Telerik QA Academy.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
 Copyright 2008 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute Anatomy of a Semantic Virus.
 Copyright 2009 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute Extracting and Utilizing.
 Copyright 2006 Digital Enterprise Research Institute. All rights reserved. 1 Tools and Terms for Annotation-Based Access Control Peyman Nasirifard.
Gov 2.0: The Government’s Web 2.0 Platform Ramesh Ramakrishnan Division Director Citizant Ph: (703) x165
Social Media & the Enterprise, Part 1 Social Media 101 An Introduction to User-Driven Communities & Content for Business Leaders Presented by Sean Gallagher.
 Copyright 2009 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute Annotation-Based Access.
SchemaLogic Workshop Part 2 Tools for Enterprise Metadata Management and Synchronization Prepared for the University of Washington Information School Applied.
Usability Inspection n Usability inspection is a generic name for a set of methods based on having evaluators inspect or examine usability-related issues.
From Scenarios to Paper Prototypes Chapter 6 of About Face Defining requirements Defining the interaction framework.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
SOA & BPM Business Architecture, SOA & BPM Learn about SOA and Business Process Management (BPM) Learn how to build process diagrams.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
Test Review. What is the main advantage to using shadow copies?
CONFIDENTIAL – DO NOT DISTRIBUTE Copyright © 2014 Interneer, Inc. All rights reserved. Partner with Professional Services for Success and Configuration.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 1.
‘One Sky for Europe’ EUROCONTROL © 2002 European Organisation for the Safety of Air Navigation (EUROCONTROL) Page 1 VALIDATION DATA REPOSITORY Overview.
 Copyright 2006 Digital Enterprise Research Institute. All rights reserved. Collaborative Building of Controlled Vocabularies Crosswalks Mateusz.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Global Customer Partnership Council Forum | 2008 | November 18 1IBM - GCPC MeetingIBM - GCPC Meeting IBM Lotus® Sametime® Meeting Server Deployment and.
Aegis: A Semantic Implementation of Privacy as Contextual Integrity in Social Ecosystems Imrul Kayes, Adriana Iamnitchi.
AVI/Psych 358/IE 340: Human Factors Web 2.0 November
Copyright © 2013 Curt Hill The Zachman Framework What is it all about?
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
© 2008 IBM Corporation ® Atlas for Lotus Connections Unlock the power of your social network! Customer Overview Presentation An IBM Software Services for.
Indo-US Workshop, June23-25, 2003 Building Digital Libraries for Communities using Kepler Framework M. Zubair Old Dominion University.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
PLoS ONE Application Journal Publishing System (JPS) First application built on Topaz application framework Web 2.0 –Uses a template engine to display.
11 CORE Architecture Mauro Bruno, Monica Scannapieco, Carlo Vaccari, Giulia Vaste Antonino Virgillito, Diego Zardetto (Istat)
Cloud platforms Lead to Open and Universal access for people with Disabilities and for All Cloud4all User Forum and Focus group 30/08/2012.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check This work by Oshani.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Internet Architecture and Governance
A Day of technology Improving upon your technology skills Giving every child the opportunity to learn in a robust digital environment everyday. making.
Semantic Clipboard User Interface is integrated in the Browser Architecture of the Semantic Clipboard Illustration of a license incompliant content reuse.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
CSC350: Learning Management Systems COMSATS Institute of Information Technology (Virtual Campus)
Master Data Management & Microsoft Master Data Services Presented By: Jeff Prom Data Architect MCTS - Business Intelligence (2008), Admin (2008), Developer.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Security Overview Functional security – users, groups, and permissions for sites, lists,
Social Stream, a social network framework
Essentials of OVID Using UML based notation to capture system requirements and design.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
C HAPTER Introduction to Web 2.0 Social Networking Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 5.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
FriendFinder Location-aware social networking on mobile phones.
 Copyright 2006 Digital Enterprise Research Institute. All rights reserved. 1 Annotation-Based Access Control for e-Professionals Authors:
Event-Based Model for Reconciling Digital Entities Ahmet Fatih Mustacoglu Ahmet E. Topcu Aurel Cami Geoffrey C. Fox Indiana University Computer Science.
Copyright © 2007, Oracle. All rights reserved. Managing Items and Item Catalogs.
© Copyright, Ninian Solutions Ltd Confidential.
Website Update and Use of Official accounts Dr.Lasantha Ranwala ( MBBS,MSc-Biomedical Informatics) Medical Officer - Health Informatics RDHS Office.
CREATED BY : ARCHANA L. TULSANI.  What is a Social networking site ?  Different Social networking sites(SNS)  Uses of SNS  Reasons for increasing.
Ontology Engineering and Feature Construction for Predicting Friendship Links in the Live Journal Social Network Author:Vikas Bahirwani 、 Doina Caragea.
Samad Paydar WTLab Research Group Ferdowsi University of Mashhad LD2SD: Linked Data Driven Software Development 24 th February.
JBossWS beyond JAX-WS Heiko Braun Senior Software Engineer
TECHNOLOGY IN ACTION. Chapter 3 Using the Internet: Making the Most of the Web’s Resources.
Kundan Singh Venkatesh Oct 2013
Presented by Edith Ngai MPhil Term 3 Presentation
Unit 27: Network Operating Systems
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web Philipp Kärger and Wolf Siberski L3S Research Center, Hannover, Germany.
Chapter 2: Building a System
Presentation transcript:

 Copyright 2008 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems Peyman Nasirifard and Vassilios Peristeras The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, Nov , 2008

Digital Enterprise Research Institute Introduction Annotation-Based Access Control Use Case Scenario Prototype  Widget: Uncle-Share Conclusion and Future Work Outline

Digital Enterprise Research Institute Current Access Control Sharing data/resources:  Shared Workspaces (BSCW, NetWeaver, SharePoint, etc.)  Social Networking Sites (Flickr, YouTube, del.icio.us, etc.) Sharing needs access control Current approaches:  Access control lists ( contacts)  Role-based access control (root, admin, user)  Social-based access control (friends)

Digital Enterprise Research Institute Problems with Current Access Control Problems with current approaches:  Coarse-grained: – Private vs. Public, share with ‘friends‘  Fixed vocabulary, no flexibility  Access control at application not at resource level  Not context-aware To move from messaging to sharing:  Social-awareness based access-control

Digital Enterprise Research Institute Real-Life Access Control We share resources based on social relationships we attribute to people  We may share our credit card details with our parents, but not with our friends. We mentally annotate people, meaning of term may differ between people  parent, supervisor, friend, close friend, director, etc. Real life model can be applied to online model  Annotation-Based Access Control – more natural and flexible

Digital Enterprise Research Institute Annotation-Based Access Control Model

Digital Enterprise Research Institute Three Entities and Two Concepts A Person is an entity with the RDF type Person. A Person is connected to zero or more other Persons. A Person owns zero or more Resources. A Person defines zero or more Policies. An Annotation is a term or a set of terms that are connected together and aims to describe the Person. Each connection between Persons can be annotated with zero or more Annotations. A Resource is an entity with the RDF type Resource and is owned by (isOwnedBy) one or more Persons. Resources are in the form of URIs, URLs, and/or short messages. A Policy is an entity with the RDF type Policy. A Policy is defined by (isDefinedBy) one Person and belongs to (belongsTo) one Resource. A Policy has one Annotation and one Distance. A Distance is a numerical value which determines the depth that the Policy is valid. The depth is actually the shortest path among two Persons with consideration of Annotations.

Digital Enterprise Research Institute Meta-policies (Rules) Rule 1: A Person acquires access to a Resource, if and only if (iff) s/he meets all policies that have been defined by Resource owner for that Resource. It means that the Person has been already annotated with the Annotations which are defined in the Policies and s/he is also in the scope of the Policies (i.e. Distance criteria).  Multiple Policies that are defined by a Resource owner for a Resource are ORed, if they have different Distances, otherwise the Policies are ANDed. Rule 2: Only the Resource owner is eligible to define Policies for that Resource. Rule 3: If a Person acquires access to a Resource, s/he may copy/add the Resource to his/her Resources. In this case, s/he will be the Resource owner. (The original Resource owner will also keep the ownership as well.) Rule 4: A private Resource has zero or more Policies, whereas a public Resource has at least one Policy. Rule 5: The default Distance for Policies is one.

Digital Enterprise Research Institute Benefits of Annotation-Based Approach Close to real-life model Simple  We tried to keep the model as simple as possible – Resources have (currently) no annotations – The main focus of this model is annotating contacts rather than resources Flexible  Fixed terms & Open Vocabularie Semantics helps for further reasoning Distance among users may be calculated All relationships are private  Users can freely publish their realtionships

Digital Enterprise Research Institute Use Case Scenario

Digital Enterprise Research Institute Who Will Access What? Alice has access to her three resources and via Bob, because is accessible to the Bob's contacts that have been annotated as student and have maximum distance one to Bob and Alice fulfils this policy. Bob has access to his two resources and also two of Alice's resources: and Tom has access to which was shared via Bob to him and also which was shared via Alice to him. Mary will see the short message from Alice: I_need_to_talk_to_you_please.

Digital Enterprise Research Institute Prototype: Uncle-Share Widget Login: User login or registration, including full name, user name, and password. Person: User may add, modify, and annotate contact list. Resources: User may add resources (URI/short message) and assign them policies. Shared: User may see the resources that have been shared with him by others. The distance may be set in order to increase or decrease the scope of the shared resources. Settings: User and server configuration. Help: Provides a tutorial video and some technical and contact information regarding the platform.

Digital Enterprise Research Institute Features Widget  Can be embedded into any Web page or widget platform  Syndication, flexibility, portability, and customization. Service-Oriented-Architecture (SOA)  All functionalities are wrapped as services Ontology-based and RDF-based AJAX (i.e. No additional interations with the server) Suggest box  Suggests annotations to end users  Currently the suggestions come from the RELATIONSHIP ontology We used free and open source tools

Digital Enterprise Research Institute Embedded Widget (iGoogle and BSCW)

Digital Enterprise Research Institute Uncle-Share Architecture

Digital Enterprise Research Institute Uncle-Share Services Handle Object: This service enables end users to register themselves to the system and/or change their passwords. Handle Connection: This service enables end users to add connections between persons; persons and resources; and persons and policies. This service enables also end users to annotate those connections with closed and/or open terms. Get Connection: This service enables end users to get who/what is connected to a specific person. Get Registered Users: This service returns the list of the registered users. Get Social Network: This service returns the social network of authenticated user in RDF. Get Available Resources: This service returns the available resources to a specific person based on the Distance input.

Digital Enterprise Research Institute Extended Work: Experimental Evaluation We asked 16 people to participate in an experimental evaluation  Name at least 5 persons that they know  Assign at least 3 annotations for each of their contacts Results  8 participants confirmed that the task was pretty easy – They use various sorts of annotations: hasADog, likesHorrorMovies, laughALot, writePaperWith, goingOutWith, worksWith, discussIdeasWith, etc.  4 participants found its difficulty medium  4 participants found it difficult – They never annotate somebody on a paper or with a software tool, however they did it „mentally“ before – They tried to be over-cautious, as they were worried that their annotations might be further distributed (privacy issues)

Digital Enterprise Research Institute Comparisons and Evaluations Role-Based Access Control (RBAC), Generalized RBAC (G-RBAC), etc.  Roles and permissions are pre-defined by role engineers – Users get permissions through roles and/or role hierarchy  We do not have predefined roles and permissions  We have annotations – User-centric approch – May not be roles (from semantics point of view) – From RBAC perspective: Annotations can be seen as „user-defined“ roles.  We have graph-like connected people rather than hierarchy – Distance among two persons can be calculated and used  Semantics can be used for reasoning Logic-Based Access Control Frameworks (like PROTUNE)  Very powerful, but too complex for personal usage No Percentage for relationships (e.g. friend 80%)  We do not label our friendships and contacts with percentages in real-life

Digital Enterprise Research Institute Future Work Run an extended evaluation exercise in the context of the Ecospace IP project (Living Labs) Extend the model to include context-aware information  perhaps using micro-blogs (e.g. Twitter) Using the Open Social API to integrate the widget with existing social networking platforms, such as MySpace and Orkut Prioritizing policies Context-aware term recommendations  Based on statistics Social network analysis  Using this analysis in access control

 Copyright 2008 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute Thank you for your attention! 20 of 4 Peyman Nasirifard and Vassilios Peristeras Try Uncle-Share yourself: