Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: David Shelly Usable Security – CS 6204 – Fall,

Slides:



Advertisements
Similar presentations
1 Ontolog OOR Use Case Review Todd Schneider 1 April 2010 (v 1.2)
Advertisements

Intelligent Technologies Module: Ontologies and their use in Information Systems Revision lecture Alex Poulovassilis November/December 2009.
Chapter 1: Introduction to Scaling Networks
From Ontology Design to Deployment Semantic Application Development with TopBraid Holger Knublauch
New Challenges for Access Control April 27, Improving Usability and Expressiveness with Dynamic Policies and Obligations Dennis Kafura Markus Lorch.
Provenance in Open Distributed Information Systems Syed Imran Jami PhD Candidate FAST-NU.
Understanding Active Directory
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
1 Draft of a Matchmaking Service Chuang liu. 2 Matchmaking Service Matchmaking Service is a service to help service providers to advertising their service.
1 Attribute Based Communications University of California, Irvine Presented By : Ala Khalifeh (Note: Presented)
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Understanding Active Directory
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Medical Applications Tejinder Judge Usable Security – CS 6204 – Fall, 2009 – Dennis.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy Preferences Edgardo Vega Usable Security – CS 6204 – Fall, 2009 – Dennis.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
1 Semantic Technologies: Diamond in the Rough? Unik Graduate Research Center Dr. Juan Miguel Gomez Universidad Carlos III de Madrid.
TOWARDS INTEROPERABILITY IN TRACKING SYSTEMS: AN ONTOLOGY-BASED APPROACH Juan Gómez Romero Miguel A. Patricio Jesús García José M. Molina Applied A.I.
Knowledge based Learning Experience Management on the Semantic Web Feng (Barry) TAO, Hugh Davis Learning Society Lab University of Southampton.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
A Distributed Clustering Framework for MANETS Mohit Garg, IIT Bombay RK Shyamasundar School of Tech. & Computer Science Tata Institute of Fundamental Research.
Speed-R : Semantic Peer to Peer Environment for Diverse Web Services Registries Kaarthik Sivashanmugam Kunal Verma Ranjit Mulye Zhenyu Zhong Final Project.
AMPol-Q: Adaptive Middleware Policy to support QoS Raja Afandi, Jianqing Zhang, Carl A. Gunter Computer Science Department, University of Illinois Urbana-Champaign.
Identity-based Service Interaction Mohammad M. R. Chowdhury Ph.D. candidate UniK-University Graduate Center / University of Oslo SWACOM meeting, Stavanger,
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
Ontology Summit 2015 Track C Report-back Summit Synthesis Session 1, 19 Feb 2015.
Minor Thesis A scalable schema matching framework for relational databases Student: Ahmed Saimon Adam ID: Award: MSc (Computer & Information.
Policy-Based Management: Bridging the Gap Mi-Joung Choi DP&NM Lab. POSTECH, Pohang Korea Tel:
A School of Information Science, Federal University of Minas Gerais, Brazil b Medical University of Graz, Austria, c University Medical Center Freiburg,
Protection Models Yeong-Tay Timothy Sun September 27, Dennis Kafura – CS5204 – Operating Systems.
Scalable and E ffi cient Reasoning for Enforcing Role-Based Access Control Tyrone Cadenhead Murat Kantarcioglu, and Bhavani Thuraisingham 1.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
Semantic based P2P System for local e-Government Fernando Ortiz-Rodriguez 1, Raúl Palma de León 2 and Boris Villazón-Terrazas 2 1 1Universidad Tamaulipeca.
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Ontology Mapping in Pervasive Computing Environment C.Y. Kong, C.L. Wang, F.C.M. Lau The University of Hong Kong.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
81th IETF, QuebecMTMA Multicast Tree Mobility Anchor (MTMA) Juan Carlos Zúñiga, Akbar Rahman InterDigital Luis M. Contreras, Carlos J. Bernardos Universidad.
Shridhar Bhalerao CMSC 601 Finding Implicit Relations in the Semantic Web.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Policy Authoring Matthew Dunlop Usable Security – CS 6204 – Fall, 2009 – Dennis.
Application Ontology Manager for Hydra IST Ján Hreňo Martin Sarnovský Peter Kostelník TU Košice.
ShareNet Integrating Trust and Privacy policy Li Ding.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Smart, Secure and Sustainable Home: A Socio-Technological Perspective Aleksandr.
An answer to your common XACML dilemmas Asela Pathberiya Senior Software Engineer.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Semantic Data Extraction for B2B Integration Syntactic-to-Semantic Middleware Bruno Silva 1, Jorge Cardoso 2 1 2
Scalable and E ffi cient Reasoning for Enforcing Role-Based Access Control Tyrone Cadenhead Advisors: Murat Kantarcioglu, and.
Implementation of Ontology Based Context-awareness Framework Ki-Chul Lee, Jung-Hoon Kim International Conference on Multimedia and Ubiquitous Engineering.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Policy Systems Presented By: John Paul Dunning Usable Security – CS.
Juan Carlos Zúñiga Akbar Rahman Luis M. Contreras Carlos J. Bernardos Ignacio Soto IETF 79, November 2010 Dedicated Multicast LMA.
Design for a generic knowledge base for autonomic QoE optimization in multimedia access networks September 9, 2008 Bong-Kyun Lee Dept. of Information and.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Enabling Access Control and Privacy through Ontology Mohammad M. R. Chowdhury Dr. Josef Noll UniK - University Graduate Center, Norway Dr. Juan Miguel.
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
Semantic Web Foundations
Dedicated Multicast-LMA (M-LMA)
Introduction to Wireless Sensor Networks
Design Unit 26 Design a small or home office network
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Securing Home IoT Environments with Attribute-Based Access Control
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Data and Applications Security Developments and Directions
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Data and Applications Security Developments and Directions
Mark Quirk Head of Technology Developer & Platform Group
Presentation transcript:

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: David Shelly Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Topics SemID Ontology Distributed Service Deployment Web Services Performance Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

SemID (Semantic ID) Ontology Mohammad M. R. Chowdhury Josef Noll Juan Miguel Gomez UniK- University Graduate Center, Kjeller, Norway Universidad Carlos III de Madrid, Madrid, Spain

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Introduction Problems Addressed:  Access control in distributed and dynamic systems  Privacy issues in project oriented corporate networks Ontology Solution:  Secure access to project resources  Maintain privacy of members “Ontologies are [the Semantic Web’s] cornerstone technology, providing structured vocabularies that describe a formal specification of a shared conceptualization.”

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Roles

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Use case: Rel9 Project

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Functional Architecture Formalize the semantics of roles, policies, and rules  Role – Has certain policy or policies assigned to it  Policy – Represents the privilege reserved for each role in a community and expressed through a set of Rules (R 1, R 2,… R n ) P = {R 1, R 2,… R n }  Rules – Takes an access request as an input and results in an action (permit, deny, or not-application) R = {S, R, A}

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Example Rules R = {JosefNoll, Deliverables, Permit } R = {GeirEgeland, Deliverables, Deny}

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Protégé Example

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Web Ontology Language (OWL) SemID Ontology has 10 properties  domain – classes to which a property is attached  range – allowed classes for properties

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Implementation Four different policies  Administrator  FinalApproval  Read  Read/Write

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Implementation Four instances of role  Project Leader  Supervisor  Project member  Visitor

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Implementation Four properties in Identity Instance  hasGroup  hasVisibility  hasRole  hasSupervisor

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Discussion Advantages of SemID over permissions schemes used in Windows/Linux? Is the SemID scheme usable? Will companies continuously update projects, roles, and permissions?

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Distributed System Deployment Artin Avanes Johann-Christoph Freytag Christof Bornhovd Humboldt-Universitat zu Berlin Berlin, Germany SAP Labs, LLC Palo Alto, California

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Introduction Advantages of Distributed Service Deployment  Higher system scalability  Better system response time  Higher data accuracy New Challenges  Increased Dynamics  Limited Resource Capabilities  Limited Reliability  Higher Demand for Scalability

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Service Classes Three Major Service Classes  Business Logic Services  Aggregation Services and Data Management Services  Basic Infrastructure Services

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Tiered System Architecture

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Service Deployment Service Mapping Context-Aware Determination of Service Requirements Group-Based Resource Tracking Priority Assignment and Query Processing Distributed Service Injection

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Service Deployment Service Mapping  Mapping Function Context-Aware Determination of Service Requirements Group-Based Resource Tracking Priority Assignment and Query Processing Distributed Service Injection

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Service Deployment Service Mapping Context-Aware Determination of Service Requirements  Translation Process Group-Based Resource Tracking Priority Assignment and Query Processing Distributed Service Injection

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Service Deployment Service Mapping Context-Aware Determination of Service Requirements Group-Based Resource Tracking  Group-Based Retrieval Algorithm Priority Assignment and Query Processing Distributed Service Injection

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Group-Based Retrieval Algorithm

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Service Deployment Service Mapping Context-Aware Determination of Service Requirements Group-Based Resource Tracking Priority Assignment and Query Processing  Two major request classes  Three strategies to determine priorities Distributed Service Injection

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Priority Assignment and Query Processing

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Service Deployment Service Mapping Context-Aware Determination of Service Requirements Group-Based Resource Tracking Priority Assignment and Query Processing Distributed Service Injection  Pair matching

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech OSGi Prototype Implementation Example Scenario: “ A wireless sensor network measures the temperature in specific areas of a warehouse, whereas the current temperature values are periodically forwarded to the display of a worker’s PDA. Each worker is equipped with such a PDA and can immediately react if the temperature exceeds a certain threshold to avoid damage of goods or machines.”

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Performance Evaluation List Topology ≤ O(N) + O(N 2 + N * H) →«O(n 2 + n * H) (no packet merging) ≤ O(N) + O(N) →« O(n) (with packet merging) Star Topology « O(n) Binary Tree Topology → O(lnN * N ln(2) ) ≤ O(lnN * N 0.7 ) « O(ln n * n 0.7 )

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Discussion How could using a Distributed System Deployment in Mobile Ad-Hoc Networks apply to usable security? What privacy issues are at risk in distributed system deployment schemes?