Protune Rule-based Policies on the Semantic Web Daniel Olmedilla L3S Research Center & Hannover University PUC Seminar Aug. 21st, 2007, Rio de Janeiro,

Slides:



Advertisements
Similar presentations
E-shop Workshop Building an electronic storefront for your business.
Advertisements

Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Semantic Web Policies - A Discussion of Requirements and Research Issues SHIVARAMAN RAGHURAMAN SHIVARAMAN RAGHURAMAN MUKESH SUSILKUMAR MUKESH SUSILKUMAR.
Trust, Security and Privacy in Learning Networks Daniel Olmedilla L3S Research Center / Hannover University Learning Networks in Practice 10 th May, 2007.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Minding Your Own Business The Platform for Privacy Preferences Project and Privacy Minder Lorrie Faith Cranor AT&T Labs-Research
Security Controls – What Works
25/10/2009Philipp Kärger1 Reactivity and Social Data: Keys to Drive Privacy Decisions in Social Network Applications* * This work was partially supported.
Policy-Driven Negotiations and Explanations on the Semantic Web Daniel Olmedilla L3s Research Center / Hannover University CSL Seminar, SRI International.
Using Digital Credentials On The World-Wide Web M. Winslett.
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke L3S Research.
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Advanced Semantic Web Policies ____ Preferences and Reactivity Philipp Kärger L3S Research Center, Leibniz University Hannover Research Seminar, DERI Galway,
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Understanding Active Directory
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Cloud Computing Cloud Security– an overview Keke Chen.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Chapter Intranet Agents. Chapter Background Intranet: an internal corporate network based on Internet technology. Typically, an intranet can.
HCIMA Unit 3 The Internet Revolution and Electronic Tools Next slide.
TRUST NEGOTIATION IN ONLINE BUSINESS TRANSACTIONS BY CHANDRAKANTH REDDY.
CS CS 5150 Software Engineering Lecture 18 Security.
Evaluation of a Publish/Subscribe System for Collaboration and Mobile Working Collaborative Advertising over Internet with Agents Independent Study: Wireless.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Auditing Information Systems (AIS)
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check This work by Oshani.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check for a license violation.
Semantic Web and Policy Workshop Panel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
LEGAL ASPECTS OF DIGITAL LIBRARIES By TALWANT SINGH ADDL DISTT. & SESSIONS JUDGE; DELHI.
STASIS Technical Innovations - Simplifying e-Business Collaboration by providing a Semantic Mapping Platform - Dr. Sven Abels - TIE -
Trust-X: A Peer-to-Peer Framework for Trust Establishment Elisa Bertino, et.al. Presented by: Carlos Caicedo.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Semantic Clipboard User Interface is integrated in the Browser Architecture of the Semantic Clipboard Illustration of a license incompliant content reuse.
Microsoft Management Seminar Series SMS 2003 Change Management.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Smart, Secure and Sustainable Home: A Socio-Technological Perspective Aleksandr.
SWE 513: Software Engineering
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Claromentis Digital Workplace An Introduction
SUMS/SUPC Purchase to Pay Workshop Uniac – Managing risk in your P2P process Richard Young 22 nd May 2015 Session structure: Audit involvement The risks.
Non Functional Testing. Contents Introduction – Security Testing Why Security Test ? Security Testing Basic Concepts Security requirements - Top 5 Non-Functional.
ArcGIS for Server Security: Advanced
Identity and Access Management
Module Overview Installing and Configuring a Network Policy Server
Streamline your HR document management processes
Policy Adaptation and Exchange in Trust Negotiation
Privacy of Client Data.
Radius, LDAP, Radius used in Authenticating Users
THE STEPS TO MANAGE THE GRID
SAMMS Secure Authorized Monitored Messaging System
Compliance….GlobalSearch……WHAT?!?!
Reactive Policies for the Semantic Web*
2/24/2019 6:15 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Protecting Privacy During On-line Trust Negotiation
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web Philipp Kärger and Wolf Siberski L3S Research Center, Hannover, Germany.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Protune Rule-based Policies on the Semantic Web Daniel Olmedilla L3S Research Center & Hannover University PUC Seminar Aug. 21st, 2007, Rio de Janeiro, Brazil

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Outline Introduction Policy Specification Integration of Actions  Legacy Systems  Evidences Negotiations  Filtering Cooperativeness & Verbalization Conclusions & Further Work

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Outline Introduction Policy Specification Integration of Actions  Legacy Systems  Evidences Negotiations  Filtering Cooperativeness & Verbalization Conclusions & Further Work

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Warning Policy examples Policies specify the behavior of a system and may be applied to many different areas: security, privacy, conversations, business rules, quality of service, etc. The most common application scenario is security. It covers most of the requirements from other areas. Although many of the examples used in this presentation focus on security, it should be clear all the time that its application is not restricted only to security.

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Introduction Warming Up: Problem Institutions and companies need to control the way they Make business Take decisions Offer their assets Etc … Generally, they need to control how decisions and actions are taken

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Introduction Policies Are Everywhere B2B contracts  e.g. quantity flexible contracts, late delivery penalties, etc. Negotiation  e.g. rules associated with auction mechanisms Security  e.g. access control policies Privacy  Information Collection Policies (aka “ P3P Privacy Policies”)  Obfuscation Policies Workflow management  What to do under different sets of conditions Context aware computing  What service to invoke to access a particular contextual attribute  Context-sensitive preferences [ by Norman Sadeh, Semantic Web Policy Workshop panel, ISWC 2005 ]

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Introduction Main Challenges Provide a framework where Behavior is flexible  Can be changed/updated -without re-coding, re-compiling, re-installing, etc… -In a costless manner Can be managed by administrators/users without needing to be computer experts Can be understood by normal users Covers as many different policies as possible

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Outline Introduction Policy Specification Integration of Actions  Legacy Systems  Evidences Negotiations  Filtering Cooperativeness & Verbalization Conclusions & Further Work

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Policy Specification A broader notion of Policy The term policy covers: Security/Privacy policies, Trust management Business rules Quality of Service directives Service-level agreements and more...

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Policy Specification Examples Give customers younger than 26 a 20% discount on international tickets Up to 15% of network bandwidth can be reserved by paying with an accepted credit card Customers can rent a car if they are 18 or older, and exhibit a driving license and a valid credit card

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Policy Specification Context-Sensitive Privacy & Security Pervasive Computing “My colleagues can only see the building I am in and only when they are on company premises” Enterprise Collaboration “Only disclose inventory levels to customers with past due shipments” DoD Scenarios (e.g., coalition forces) “Only disclose ship departure time after the ship has left” “Only disclose information specific to the context of ongoing joint operations” Homeland Security & Privacy (e.g., video surveillance) “Only allow for facial recognition when a crime scene is suspected” [ by Norman Sadeh, Semantic Web Policy Workshop panel, ISWC 2005 ]

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Policy Specification Benefits from Rule Based languages Importance of declarative policy languages  To avoid ambiguous or ill-defined policies  To separate policies and mechanisms  To enable automated policy validation Proposed logic-based policy languages  To improve readability and maintenance  High-level formulation, more natural for untrained user  To express / integrate different policies (flexibility) [Bonatti, Samarati. Logics for Authorizations and Security. Logics for emerging applications of Databases, 2003 ]

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Policy Specification Protune Example Policy (I) allow(rent(Car,Type)) ← credential (DL), DL.type:driving_license, DL.age > 18, available(Car,Type). Abbreviation Predicate Decision Predicate available(car1, ’Ford Focus’). available(car2, ’VW Polo’). available(car3, ’Opel Corsa’). Constraint Predicate Abbreviation Predicate Definition [ Bonatti, Olmedilla. Driving and Monitoring Provisional Trust Negotiation with Metapolicies. IEEE Policies for Distributed Systems and Networks, 2005 ] Evidence Constraint Predicate

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Policy Specification Protune Example Policy (& II) Specify type with metapolicies allow(rent(Car,Type)).type:decision. available(Car,Type).type:abbreviation. Simplifies the policy Controls how the policy is used Easy extensibility More on metapolicies later

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Outline Introduction Policy Specification Integration of Actions  Legacy Systems  Evidences Negotiations  Filtering Cooperativeness & Verbalization Conclusions & Further Work

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Integration of Actions Exploiting “external” systems Decisions need data, information, and knowledge Each organization has its own  Already available through legacy software and data  A realistic solution must interoperate with them Third parties  Credit card sites for validity checking  Credential repositories Variety of web resources

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Integration of Actions Policies are not (only) passive objects Policies may specify Event logging  Failed transactions must be logged  Log downloads of new articles for one week Communications and notifications  Notify the administrator about repeated login failures Workflow triggering  such as (partly) manual registration procedures i.e. Policies may specify actions To be interleaved with the decision process

Daniel Olmedilla Aug. 21st, 2007PUC Seminar allow(rent(Car,Type)) ← driving_license(DL), DL.age > 18, check_availability(Car,Office), notify(“New Reservation”, Car, Type, Office). check_availability(Car,Office) ← in(available(Car,Office), rdbms:query( “SELECT car, office FROM Available_Cars WHERE Type = ” & Type, “car_database”) ). notify(_,_,_,_)->actor:self. notify(Subject,Car,Type,Office)->action:“ Integration of Actions Example Package Action: database access Who performs it? Action definition Provisional Action: send a notification

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Integration of Actions Evidences allow(rent(Car,Type)) ← credential (DL), DL.type:driving_license, DL.age > 18, available(Car,Type). credential(C)->type:provisional. credential(C)->actor:peer. Evidence Implies that the requester discloses an evidence The actor in this case is the requester

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Integration of Actions Strong, Soft, and Lightweight Evidence How can individuals prove their eligibility? Strong evidence (credentials)  e.g. digital credentials (id, credit cards, subscriptions) Soft evidence  e.g. numerical reputation measures  PGP, eBay,... Lightweight evidence (declarations)  e.g. “accept buttons” (copyright/license agreements)  e.g. “web forms” (authentication, registration) They should be integrated for balancing:  trust level  risk level  computational costs  usability (fetching credentials, personal assistants) E.g. micropayments vs. buying plane tickets

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Outline Introduction Policy Specification Integration of Actions  Legacy Systems  Evidences Negotiations  Filtering Cooperativeness & Verbalization Conclusions & Further Work

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations Access Control in open systems (I)

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations Access Control in open systems (II) Assumption: I already know you you have a local account! Not a member?

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations Scalability and usability issues In the absence of more flexible methods Web services have to keep accounts for all customers  Possibly >1 for some customers  Some accounts are used very few times Users have to create accounts all the time  Many passwords vs. reuse (highly vulnerable)  Needs automated password management Articulated business policies are discouraged  Because they would require continuous user intervention

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations Privacy issues Credentials may be sensitive  Credit card numbers, SSN,... Servers cannot be trusted, in general  New services, unknown responsibles,... Credential release may be subject to server certifications Seal programs (self regulation): agree to  Follow precise practices for protecting information  Be subject to audit procedures  TRUSTe, BBBOnLine, WebTrust Seal program membership can be certified with electronic credentials

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations Bilateral and iterative process Step 1: Alice requests a service from Amazon Step 5: Alice discloses her VISA card credential Step 4: Amazon discloses its BBB credential Step 6: Amazon grants access to the service Service BobAlice Step 2: Amazon discloses its policy for the serviceStep 3: Alice discloses her policy for VISA [Winsborough, Seamons, Jones. Automated trust negotiation. DARPA Information Survivability Conference and Exposition, IEEE Press, Jan 2000 ]

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations Characteristics Every party can define policies to control outsiders’ use of its resources  Service access control (security)  Credential disclosure control (privacy)  Business rules Decisions are based on parties’ properties Properties are established iteratively and bilaterally by the disclosure of certificates and declarations, i.e. negotiations

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations How to formulate requests (I) One by one? Slow  More messages (as opposed to one global request) Bad w.r.t. privacy  Not known what the next request will be  Unnecessary disclosures  After submitting n credentials you realize you miss the next Example  After submitting your id you realize your credit card is not accepted by the server

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations How to formulate requests (II) All alternatives at once? Less messages (good!) Combinatorial explosion:  one id and one credit card  -Passport + VISA -Passport + Mastercard Student card + VISA -Student card + Mastercard SSN + VISA -SSN + Mastercard -...

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations How to formulate requests (& III) Send the policy! As a compact representation of all alternatives  To download paper XY.pdf do one of the following: 1)Submit an Amazon card 2)Submit a valid id and an accepted credit card The client can  Verify that the whole condition can be satisfied  Choose the best option  Minimizing the sensitivity of disclosed information

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations Protune Example Policy (I) allow(download(Resource)) ← public(Resource). allow(download(Resource)) ← authenticated(User), hasSubscription(User). authenticated(User) ← credential(C), C.type:’id’. authenticated(User) ← declaration([ user=User, password=P ]), passwd(User,P). hasSubscription(‘Alice’). hasSubscription(‘John’). passwd(‘Alice’,’$1234ab3’). passwd(‘John’, ‘8%&ca’). Soft evidence Private information Hard evidence Private information

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations Policy Filtering allow(download(‘file1234.pdf’)) ? AliceAmazon allow(download(Resource)) ← authenticated(User), hasSubscription(User). authenticated(User) ← credential(C), C.type:’id’. authenticated(User) ← declaration([ user=User, password=P ]), passwd(User,P). hasSubscription(‘Alice’). hasSubscription(‘John’). passwd(‘Alice’,’$1234ab3’). passwd(‘John’, ‘8%&ca’). allow(download(Resource)) ← public(Resource). allow(download(Resource)) ← public(Resource). allow(download(Resource)) ← authenticated(User), hasSubscription(User). authenticated(User) ← credential(C), C.type:’id’. authenticated(User) ← declaration([ user=User, password=P ]), passwd(User,P). Alice does not know what authenticated means Only shared predicates blurred( ) ‘file1234.pdf’ is not public Semantic Policy Information. Usable for explanations (see later)

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Negotiations Protune filtering metapolicies allow(download(Resource)) ← public(Resource). allow(download(Resource)) ← authenticated(User), hasSubscription(User). authenticated(User) ← credential(C), C.type:’id’. authenticated(User) ← declaration([ user=User, password=P ]), passwd(User,P). hasSubscription(‘Alice’). hasSubscription(‘John’). passwd(‘Alice’,’$1234ab3’). passwd(‘John’, ‘8%&ca’). passwd(User,Pwd)->sensitivity:private. hasSubscription(User)->sensitivity:private.

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Outline Introduction Policy Specification Integration of Actions  Legacy Systems  Evidences Negotiations  Filtering Cooperativeness & Verbalization Conclusions & Further Work

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Cooperativeness & Verbalization User Lacks Lack of awareness  Users ignore the policies applied by the systems they use Lack of control  Users don't know how to personalize their policies Lack of technical competence

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Cooperativeness & Verbalization Widespread security A recent experiment: Several computers connected to the network  Different platforms and configurations With default policies: intrusion in <5 min.  Bias towards functionality With personalized policies: safe for 2 weeks  Till the end of the experiment [Avantgarde. ]

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Cooperativeness & Verbalization User awareness and control Explain policies and system decisions  Make rules & reasoning intelligible to the common user Encourage people to personalize their policies  Make it easy for users to write their own rules Use natural language?  “Academic users can download the files in folder historical_data whenever their creation date precedes 1942”  Suitably restricted to avoid ambiguities  Fortunately, users spontaneously formulate rules

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Cooperativeness & Verbalization Cooperative policy enforcement Crucial for the success of a web service  Never say (only) “no”!  Encourage first-time users  Who don't know how to use your service Explain policy decisions  Especially failures  Advanced queries: Why not Guide users  Advanced queries: How-to, What-if You can't open this door, but you can ask Alice for permission

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Cooperativeness & Verbalization Motivation Suppose Alice's request is rejected She may want to ask questions like: Why didn't you accept my credit card? Other possible queries How-to queries What-if queries  Would I get the special discount on financial products X if I were locally employed?

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Why-not demo Sample screenshot

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Why-not demo Sample screenshot

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Why-not demo After one more step...

Daniel Olmedilla Aug. 21st, 2007PUC Seminar I CAN’T PROVE THAT it is allowed to download paper14.pdf BECAUSE Rule [r3] is not applicable: THERE IS NO User SUCH THAT User is authenticated [details] AND Rule [r4] is not applicable: THERE IS NO User SUCH THAT User is authenticated [details] MOREOVER THERE IS NO User SUCH THAT User has paid for paper14.pdf [details] FILTERED POLICY [r3]: allow(download(Resource)) ← authenticated(User), blurred( hasSubscription(User) ). [r4]: allow(download(Resource) ← authenticated(User), paid(User,Resource). METAPOLICY allow(download(Resource)).explanation: “It is allowed to download “ & Resource. public(Resource).explanation: Resource & “ is public”. authenticated(User).explanation: User & “ is authenticated”. hasSubscription(User).explanation: User & “ has subscription”. paid(User,Resource).explanation: User & “ has paid for “ & Resource. Cooperativeness & Verbalization Why-Not Queries [ Bonatti, Olmedilla, Peer. Advance policy explanations on the web. ECAI 2006, pages , Riva del Garda, Italy, Aug-Sep IOS Press. ]

Daniel Olmedilla Aug. 21st, 2007PUC Seminar I CAN’T PROVE THAT it is allowed to download paper14.pdf BECAUSE Rule [r3] is not applicable: THERE IS NO User SUCH THAT User is authenticated [details] AND Rule [r4] is not applicable: THERE IS NO User SUCH THAT User is authenticated [details] MOREOVER THERE IS NO User SUCH THAT User has paid for paper14.pdf [details] FILTERED POLICY [r3]: allow(download(Resource)) ← authenticated(User), blurred( hasSubscription(User) ). [r4]: allow(download(Resource) ← authenticated(User), paid(User,Resource). METAPOLICY allow(download(Resource)).explanation: “It is allowed to download “ & Resource. public(Resource).explanation: Resource & “ is public”. authenticated(User).explanation: User & “ is authenticated”. hasSubscription(User).explanation: User & “ has subscription”. paid(User,Resource).explanation: User & “ has paid for “ & Resource. Pruning: User is not authenticated so it makes no sense to inspect her subscriptions “authenticated” depends on a credential. “hasSubscription” depends on “authenticated” Cooperativeness & Verbalization Why-Not Queries: pruned or full

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Outline Introduction Policy Specification Integration of Actions  Legacy Systems  Evidences Negotiations  Filtering Cooperativeness & Verbalization Conclusions & Further Work

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Conclusions & Further Work Summary Protune is a framework where Behavior is flexible  Can be changed/updated -without re-coding, re-compiling, re-installing, etc… -In a costless manner Covers as many different policies as possible Policies are rule based Allows for semantic and privacy aware negotiations  No previous shared knowledge required Produce verbalizations in order to increase user understanding

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Conclusions & Further Work Implemented prototype Prototype available (in alpha state) Freely distributed All in java  Easily configurable, multi-thread  Legacy systems integration: RDBMS, LDAP, RDF repositories, …

Daniel Olmedilla Aug. 21st, 2007PUC Seminar Conclusions & Further Work Further Work Natural language policy specification Policy Engineering Tools  Specification  Validation  Visualization Stable release We search for new application scenarios and real policies !!

Thanks! Questions? -