1 DataSpace MIT Decentralized Information Group Tim Berners-LeeDanny Weitzner Lalana KagalGerry Sussman Hal Abelson Visitors: Joe Pato (HP)Latanya Sweeney.

Slides:



Advertisements
Similar presentations
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Advertisements

Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Trustworthy Repository Criteria, Virtual Organizations, and Infrastructure MacKenzie Smith, MIT Libraries NDIIPP Meeting, July 2010.
PlanetLab Federation Development Aaron Klingaman Princeton University.
AIR Policy Language Overview V2. AIR Facts AIR -- Accountability In RDF a policy language for dependency tracking represented in Turtle (an RDF syntax)
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
DARPA Agent Markup Language Ashish Jain University of Colorado at Boulder.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Chapter 7 Database Auditing Models
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
UIS EDEN Workflow Engine Overview of workflow engine for IU’s OneStart portal.
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
XACML Briefing for PMRM TC Hal Lockhart July 8, 2014.
1 1 Interoperating: MIT’s Fusion Center Prototype & JHU/APL’s Back End Attribute Exchange (Identity Management Testbed) January 2013.
High-Speed, High Volume Document Storage, Retrieval, and Manipulation with Documentum and Snowbound March 8, 2007.
Functions of a Database Management System
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Auditing Information Systems (AIS)
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Production Data Grids SRB - iRODS Storage Resource Broker Reagan W. Moore
Rei and Rules Tim Finin, UMBC Lalana Kagal, MIT Tim Finin, UMBC Lalana Kagal, MIT.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check This work by Oshani.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check for a license violation.
1 Feburary 8, 2010 DataSpace 1. HP Labs Research Interests HP Labs have organized its corporate research around 8 major themes that include Information.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Geneva, Switzerland, 17 October 2011 Summary of Session 4: SDP standardization status and requirements Huilan Lu, Ph.D. SG 13 Vice Chairman ITU Workshop.
A Policy Based Approach to Security for the Semantic Web Lalana Kagal, Tim Finin and Anupam Joshi.
Windows Role-Based Access Control Longhorn Update
Daniel J. Weitzner End-to-End Semantic Accountability: Policy and Technology Design Requirements for The Policy Aware Web 25 October 2006 Daniel J. Weitzner.
Semantic Clipboard User Interface is integrated in the Browser Architecture of the Semantic Clipboard Illustration of a license incompliant content reuse.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
Introduction to the Semantic Web and Linked Data
Supervision SICOR Securities, Inc.. Why? NASD 3110 requires the firm to “…establish and maintain a system to supervise the activities of each registered.
Computational Policies in a Need to Share Environment Tim Finin University of Maryland, Baltimore County SemGrail workshop, Redmond WA, 21 June 2007.
Academic Year 2014 Spring Academic Year 2014 Spring.
Coding Compliance Components Writing Custom Policies for Auditing, Expiration and More Jason Morrill Program Manager Windows SharePoint Services.
1 Designing a Privacy Management System International Security Trust & Privacy Alliance.
DSpace System Architecture 11 July 2002 DSpace System Architecture.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
The library is open Digital Assets Management & Institutional Repository Russian-IUG November 2015 Tomsk, Russia Nabil Saadallah Manager Business.
NeOn Components for Ontology Sharing and Reuse Mathieu d’Aquin (and the NeOn Consortium) KMi, the Open Univeristy, UK
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
Selected Semantic Web UMBC CoBrA – Context Broker Architecture  Using OWL to define ontologies for context modeling and reasoning  Taking.
Project Undertaken By, Anita.K Subalakshmi.S Suseela.J.S Guide: Mrs.M.J.Jeyasheela Rakkini AP/CSE Third Review.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
1 Auditing Your Fusion Center Privacy Policy. 22 Recommendations to the program resulting in improvements Updates to privacy documentation Informal discussions.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Semantic Web Technologies Readings discussion Research presentations Projects & Papers discussions.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Building Trustworthy Semantic Webs
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
Joseph JaJa, Mike Smorul, and Sangchul Song
Using Semantic Web Data: Proof
Chapter 18 MobileApp Design
Outline Pursue Interoperability: Digital Libraries
Welcome to online seminar on Oracle Production Scheduling Jan 22,2010
Data Model.
AINTNO: Demonstration of Information Accountability on the Web
Policy reasoning A policy is a set of norms that define optimal behavior of agents in a system What does policy reasoning usually entail ? Proving that.
Managing Private and Public Views of DDI Metadata Repositories
Presentation transcript:

1 DataSpace MIT Decentralized Information Group Tim Berners-LeeDanny Weitzner Lalana KagalGerry Sussman Hal Abelson Visitors: Joe Pato (HP)Latanya Sweeney (CMU) Collaborators: Joan Feigenbaum (Yale) Jim Hendler & Deb McGuinness (RPI) Wendy Hall & Nigel Shadbolt (Southampton)

3 Policy Awareness on the World-Wide Web Problem: – Maintaining data use policies (privacy, security, ownership, compliance) becomes infeasible as data bases become increasingly interconnected via the Web Idea – Tag information on the web with metadata that expresses policy –Use Semantic Web infrastructure so that metadata schemes are open an extensible – Develop rules and reasoning mechanisms that check for adherence with policy – Evaluate policies with reference to user preferences, user data, Web data, operating context Benefits – Enables flexible, decentralized approach to policy management – Permits local control (vs. global authorities) – Can deal with contexts where access control is insufficient.

4 Information Accountability: When information has been used, it should to possible to determine what happened, and to pinpoint use that is inappropriate

5 Augmenting information architecture to support accountability Information is annotated with provenance that identifies its source. Data transfers and uses are logged so that chains of transfers have audit trails Databases and data providers supply machine-readable policies that govern permissible uses of the data. Automated reasoning engines use policies to determine whether data use is appropriate. Reasoning preserves context information and justifications supported by truth-maintenance systems. As data items are combined, the usage rules governing the combinations are automatically deduced by means of a data-purpose algebra Users of manipulate information via policy-aware interfaces that can enforce policies and/or signal non-compliant uses.

6 Use Case: Sharing of Data in Fusion Centers Sender: Mia Analysa of Commonwealth Fusion Center Data: Request for Information regarding Robert Guy Receiver: Fedd Agenti of DHS Is this allowed under policies of involved parties ?

7 Policy reasoning result in Justification UI

8 Exploring Policy Reasoning Results

9

10 AIR: A Policy Language for Usage Rules :Rule1 a air:Belief-rule; air:variable :U2; air:variable :P2; air:variable :AP; air:label "FirstAIRRule"; air:pattern { :U2 a air:UseEvent; :refers-to [ a mit:ProxCardEvent ]; :purpose P2; :UseEvent :allowed-purposes :AP. :P2 is-member-of :AP }; air:assert { :U2 :validPurpose :P2 }.

MIT enforces privacy policy at constraint:.... :CU0002UserPrivacy a policy:Policy; policy:context :MITLibrariesPrivacyPolicy; policy:grants :UserProvdePersonalInfo; policy:grants :UsePersonalInfo; policy:grants :DoNotDisclosePersonalInfo; policy:grants :DoRemovePersonalInfo. :UserProvidePersonalInfo a deontic:Obligation; deontic:actor :varPerson; deontic:action :ProvidePersonalInfo; deontic:context :EventParticipationAndAlertSubscription; policy:desc "DSpace requires users to provide personal information if they: 1. are involved in the submission of DSpace content and metadata 2. subscribe to the DSpace alerting service". :ProvidePersonalInfo a action:Action; a history:ModifyMetadata; action:actor :varPerson; action:target :varPersonInfo; policy:desc "Provide Personal Information is the act of supplying the metadata recorded as an EPerson's object in DSpace.". A snippet of DSpace policy, expressed in REI