Rei and Rules Tim Finin, UMBC Lalana Kagal, MIT Tim Finin, UMBC Lalana Kagal, MIT.

Slides:



Advertisements
Similar presentations
ROWLBAC – Representing Role Based Access Control in OWL
Advertisements

Workpackage 2: Norms
ANDREA WESTERINEN CA TECHNOLOGIES APR 28, 2011 Policy Language Overview 1.
Administrative Policies in XACML Erik Rissanen Swedish Institute of Computer Science.
Policy Description & Enforcement Languages Anis Yousefi
Pranam Kolari – Policy 2005 Enhancing Web Privacy Protection Through Declarative Policies Pranam Kolari 1 Li Ding 1, Lalana Kagal 2, Shashi Ganjugunte.
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
George Blank University Lecturer. CS 602 Java and the Web Object Oriented Software Development Using Java Chapter 4.
Dynamic Ontologies on the Web Jeff Heflin, James Hendler.
ReQuest (Validating Semantic Searches) Norman Piedade de Noronha 16 th July, 2004.
1 of 30 Declarative Policies for Describing Web Service Capabilities and Constraints Lalana Kagal Tim Finin Anupam Joshi University of Maryland Baltimore.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
XACML Gyanasekaran Radhakrishnan. Raviteja Kadiyam.
XACML Briefing for PMRM TC Hal Lockhart July 8, 2014.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Pranam Kolari – Policy 2005 Enhancing Web Privacy Protection Through Declarative Policies Pranam Kolari 1 Li Ding 1, Lalana Kagal 2, Shashi Ganjugunte.
Ontology Development Kenneth Baclawski Northeastern University Harvard Medical School.
A Modeling Language to Model Norms Karen Figueiredo Viviane Torres da Silva Universidade Federal Fluminense (UFF)
Intelligent Agents Meet the Semantic Web in Smart Spaces Harry Chen,Tim Finin, Anupam Joshi, and Lalana Kagal University of Maryland, Baltimore County.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications Harry Chen, Filip Perich, Tim Finin, Anupam Joshi Department of Computer Science & Electrical.
Integrated Development Environment for Policies Anjali B Shah Department of Computer Science and Electrical Engineering University of Maryland Baltimore.
Modeling  Conversation  Policies using Permissions  and  Obligations Lalana Kagal and Tim Finin University of Maryland, Baltimore County AAMAS Workshop.
Pervasive software interoperability for the Operating Room of the Future May 10, 2005.
Ontology-based and Rule-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments The Semantic Web and Policy Workshop – ISWC.
Proof Carrying Code Zhiwei Lin. Outline Proof-Carrying Code The Design and Implementation of a Certifying Compiler A Proof – Carrying Code Architecture.
AMPol-Q: Adaptive Middleware Policy to support QoS Raja Afandi, Jianqing Zhang, Carl A. Gunter Computer Science Department, University of Illinois Urbana-Champaign.
Adaptive Hypermedia Tutorial System Based on AHA Jing Zhai Dublin City University.
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
XACML – The Standard Hal Lockhart, BEA Systems. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
POSTECH DP & NM Lab. (1)(1) Policy Driven Management (1)(1) Policy Driven Management for Distributed Systems Mi-Joung Choi
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
A Policy Based Approach to Security for the Semantic Web Lalana Kagal, Tim Finin and Anupam Joshi.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights K. Bhoopalam,K. Maly, R. MukkamalaM. Zubair Old Dominion University.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
September XACML: Consistency analysis Luigi Logrippo Université du Québec University of Ottawa
Computational Policies in a Need to Share Environment Tim Finin University of Maryland, Baltimore County SemGrail workshop, Redmond WA, 21 June 2007.
1 Access Control Policies: Modeling and Validation Luigi Logrippo & Mahdi Mankai Université du Québec en Outaouais.
The Laboratory of Information Integration, Security and Privacy ● University of North Carolina at Charlotte URL: 306, UNC Charlotte.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
Selected Semantic Web UMBC CoBrA – Context Broker Architecture  Using OWL to define ontologies for context modeling and reasoning  Taking.
Rinke Hoekstra Use of OWL in the Legal Domain Statement of Interest OWLED 2008 DC, Gaithersburg.
1 Ontology based Policy Interoperability Dr. Latifur Khan Tahseen Al-Khateeb Mohammad Alam Mohammad Farhan Husain.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Building Trustworthy Semantic Webs
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
What’s changed in the Shibboleth 1.2 Origin
Policies for Autonomy in Open Distributed Systems
Research Challenges in Enterprise Privacy Authorization Language
AT2AI-4 Fourth International Symposium "From Agent Theory to Agent Implementation" An Ontological Approach to Harmonising Security Models for Open Services.
Groups and Permissions
Enhancing Web Privacy Protection Through Declarative Policies
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Presentation transcript:

Rei and Rules Tim Finin, UMBC Lalana Kagal, MIT Tim Finin, UMBC Lalana Kagal, MIT

2 of 16 Outline  Motivation  Rei : a policy specification language  Rei 4.0  Conclusions

3 of 16 Motivation  Objective: We want to influence, constrain and control the behavior of autonomous programs, services and agents in open, heterogeneous, dynamic environments  E.g.: web services, pervasive computing environments, collaboration tools, Grid services, multiagent systems, …  Problem: Conventional identity/authentication ap- proaches to access control & authorization lacking  Approach: Agents reason about policies expressed in a declarative language in support of decision making, trust evaluation and enforcement.

4 of 16 An Early Policy for Agents 1 A robot may not injure a human being, or, through inaction, allow a human being to come to harm. 2 A robot must obey the orders given it by human beings except where such orders would conflict with the First Law. 3 A robot must protect its own existence as long as such protection does not conflict with the First or Second Law. - Handbook of Robotics, 56th Edition, 2058 A.D.

5 of 16 It’s policies all the way down  In Asimov’s stories the robots didn’t always follow the policy  Unlike traditional “hard coded” rules like DB access control & OS file permissions  Policies define “norms of behavior”  We use policies to govern the failure to adhere to other policies!  So, it’s natural to worry about …  How agents governed by multiple policies can resolve conflicts among them  How to deal with failure to follow policies – sanctions, reputation, trust, etc.  Whether policy engineering will be any easier than software engineering 1 A robot may not injure a human being, or, through inaction, allow a human being to come to harm. 2 A robot must obey the orders given it by hu- man beings except where such orders would conflict with the First Law. 3 A robot must protect its own existence as long as such protection does not conflict with the First or Second Law. - Handbook of Robotics, 56th Edition, 2058 A.D.

6 of 16 Policies are the new black  Machine understandable policies have been around forever; think of file permissions and DBMSs.  But, there are many new domains that want policies: DRM, content filtering, web services, Grid, P2P extensions, etc.  … and a desire for better policy languages  Lots of work going on:  WS-*, SAML, XACML, EPAL, Ponder, KeyNote, etc.  Policy languages grounded in OWL: KAoS & Rei  KAoS has a (pure) DL approach  Rei’s approach uses DL + rules

7 of 16 hppt://

8 of 16 Rei Policy Spec Language  Rei is a product of Lalana Kagal’s 2004 dissertation  An OWL based declarative policy language  Models deontic concepts of permissions, prohibitions, obligations and dispensations  Uses meta policies for conflict resolution  Uses speech acts for dynamic policy modification  Used to model different kinds of policies  Security; privacy; team formation/ collaboration/maintenance; conversation constraints

9 of … Applications – past, present & future  Coordinating access in supply chain management system (EECOMS - IBM lead)  Authorization policies in a pervasive computing environment (UMBC)  Policies for team formation, collaboration, information flow in multi-agent systems (Genoa II (Topsail) - GITI lead)  Security in semantic web services (UMBC, SRI, CMU)  Privacy and trust on the Internet (UMBC)  Enforcing domain policies on handhelds in pervasive computing environments (UMBC, NIST)  Privacy in a pervasive computing environment (UMBC)  Task Computing (Fujitsu)

10 of 16 Rei Specifications Rei Ontologies  Core specs  Policy  Granting  Deontic Object  …  Action  Speech Act  …  Meta Policy  Constraint  Authoring aid specs  Analysis

11 of 16 Constraint  Simple Constraints  Triple(Subject, Predicate, Object)  Example : Group of entities that are affiliated to the LAIT lab  Boolean Constraints : And, Or, and Not

12 of 16 Four Aspects to Meta Policy  Behavior  ExplicitPermImplicitProh – what’s not permitted is forbidden.  ImplicitPermExplicitProh – what’s not forbidden is permitted.  ExplicitPermExplicitProh – no default  Priority  Priority between rules in the same policy  Priority between policies  e.g., Department policy overrides University policy  Modality precedence  e.g., Positive modality holds precedence over negative for CSDept policy  Meta policy default  CheckModalityPrecFirst  CheckPriorityFirst

13 of 16 Modality Precedence  Example : To state that negative modality holds for the CSDept and in case of conflict modality precedence should be checked before priorities <policy:defaultModality rdf:resource="&metapolicy;NegativeModalityPrecedence"/> <policy:metaDefault rdf:resource="&metapolicy;CheckModalityPrecFirst"/>

14 of 16 From Rules to DL and Back  Rei 1.0 started out ~1999 with a rule-based approach implemented via a Prolog meta-interpreter  Subsequently translated to CommonRules XML format for interchange and interoperability  Rei 2.0 used RDF to ground policies in sharable ontologies  Rei 3.0 embraced a DL approach to take advantage of subsumption reasoning using F-OWL  Retained rule-like constraints for greater expressivity  Students permitted to use printers in labs with which their advisors are association  Rei 4.0 may will revise its rule like aspects now that SWLR is available  Motivations: formalization, flexibility, simplicity, understandability, …

15 of 16 To Be Explored  Simplify and reduce to essential form  Develop a solid formal semantics  Model/implement using Courteous Logic  Compile Rei policies to SWRL or RuleML to obviate need for meta-interpreter  Additional features  Support static conflict detection  Provide explanation facility, including explanations for “failed” expectations  Build on initial primitive Policy IDE  Interoperation with or translation between {Rei, KAoS, …}

16 of 16 Summary  Declarative policies are useful for constraining autonomous behavior in open, distributed systems  Important for security, privacy and trust  These should be grounded in semantic web languages (OWL!) for semantic interoperability  Rei and KAoS have provided a good base for exploring this approach  SWRL and RuleML open interesting opportunities for new declarative, rule oriented policy languages  Rei 4.0 will explore

17 of 16 For more information

18 of 16 backup slides

19 of 16 Implementation Details  XSB  Flora : F-logic over XSB  F-OWL : is a reasoner for RDF, OWL  Java wrapper XSB FLORA YAJXB USER JAVA API FOWL Image adapted from Mohinder Chopra REI REI INTERFACE

20 of 16 Priority  Example : To specify that the Federal policy has higher priority that the State policy  Priorities for policies and rules must be acyclic (it is possible to check this but currently not implemented)  Rei does not allow  University policy overrides department policy  Department policy overrides lab policy  Lab policy overrides university policy

21 of 16 Analysis  Use Cases (known as test cases in Software Engineering)  Define a set of use cases that must always be satisfied in order for the policies to be correct  E.g. The dean of the school must always have access to all the grad labs  WhatIf  To check the effects of changes to the policy or ontology before actually committing them  E.g If I remove Perm_StudentPrinting from the GradStudentPolicy, will Bob still be able to print ?

22 of 16 Speech Acts  Speech Acts  Delegation, Revocation, Request, Cancel  Properties : Sender, Receiver, Content (Deontic object/Action), Conditions  Used to dynamically modify existing policies  Speech acts are valid only if the entities that make them have the appropriate permissions

23 of 16 Policy  Properties : Context, Grants, Default Policy, Priorities  A Policy is applicable if the Context is true  Example <policy:defaultBehavior rdf:resource="&metapolicy;ExplicitPermExplicitProh"/> <policy:defaultModality rdf:resource="&metapolicy;PositiveModalityPrecedence"/> <policy:metaDefault rdf:resource="&metapolicy;CheckModalityPrecFirst"/>

24 of 16 Granting  Links deontic rules to policies with additional constraints  Allows for reuse of deontic objects with different constraints  Encourages modularity  Deontic objects and constraints can be defined by technical staff  Policy administrator can drag and drop appropriate deontic objects and add constraints

25 of 16 Granting  Example : Same permission used in Policy example with extra constraints

26 of 16 Deontic Object  Deontic objects  Permissions, Prohibitions, Obligations, Dispensations (waiver for obligations)  Common Properties : Actor, Action, Constraint {StartingConstraint, EndingConstraint}  StartingConstraint subproperty of Constraint

27 of 16 Action  Two kinds of actions : Domain Actions and Speech Acts  Domain Actions  Properties : Actor, Target, Effects, PreConditions  Action(Actor, Target, PreConditions, Effects)  Action can be performed on Target only when the PreConditions are true and oncce performed the Effects are true.  Example : Based on Rei

28 of 16 Action  Example :