WP3: Provenance and Access Policies Giorgos Flouris (FORTH) - Irini Fundulaki (CWI & FORTH) -

Slides:



Advertisements
Similar presentations
RDFTL: An Event-Condition- Action Language for RDF George Papamarkos Alexandra Poulovassilis Peter T. Wood School of Computer Science and Information Systems.
Advertisements

Schema Matching and Query Rewriting in Ontology-based Data Integration Zdeňka Linková ICS AS CR Advisor: Július Štuller.
Operating System Security
CH-4 Ontologies, Querying and Data Integration. Introduction to RDF(S) RDF stands for Resource Description Framework. RDF is a standard for describing.
WP3: Provenance and Access Control Irini Fundulaki Giorgos Flouris Institute of Computer Science-FORTH 1st year review Luxembourg, December 2011.
Workpackage 2: Norms
Open Provenance Model Tutorial Session 2: OPM Overview and Semantics Luc Moreau University of Southampton.
RDF Schemata (with apologies to the W3C, the plural is not ‘schemas’) CSCI 7818 – Web Technologies 14 November 2001 Van Lepthien.
ISBN Chapter 3 Describing Syntax and Semantics.
8.2 Discretionary Access Control Models Weiling Li.
Introduction to Database Management  Department of Computer Science Northern Illinois University January 2001.
Comp 205: Comparative Programming Languages Semantics of Imperative Programming Languages denotational semantics operational semantics logical semantics.
Continuous Compliance Assurance for Trusted Information Sharing: A Research Framework Bonnie W. Morris College of Business & Economics
The Semantic Web – WEEK 5: RDF Schema + Ontologies The “Layer Cake” Model – [From Rector & Horrocks Semantic Web cuurse]
Introduction to CSE 591: Autonomous agents - theory and practice. Chitta Baral Professor Department of Computer Sc. & Engg. Arizona State University.
Let remember from the previous lesson what is Knowledge representation
Describing Syntax and Semantics
Module 2b: Modeling Information Objects and Relationships IMT530: Organization of Information Resources Winter, 2007 Michael Crandall.
XACML By Ganesh Godavari Craig Peltier. Information Sharing Information Sharing relates to the sharing of information between two or more entities. Entities.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Secure Data Storage and Retrieval in the Cloud Bhavani Thuraisingham,
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
TAPP-09 23/02/2009Giorgos Flouris1 On Explicit Provenance Management in RDF/S Graphs Institute of Computer Science Foundation for Research and Technology.
Amarnath Gupta Univ. of California San Diego. An Abstract Question There is no concrete answer …but …
RDF: Concepts and Abstract Syntax W3C Recommendation 10 February Michael Felderer Digital Enterprise.
ONTOLOGY SUPPORT For the Semantic Web. THE BIG PICTURE  Diagram, page 9  html5  xml can be used as a syntactic model for RDF and DAML/OIL  RDF, RDF.
RDF Triple Stores Nipun Bhatia Department of Computer Science. Stanford University.
Semantic Publishing Update Second TUC meeting Munich 22/23 April 2013 Barry Bishop, Ontotext.
FORTH Research Activities PlanetData WP1-3 Meeting (Frankfurt, Nov10) Giorgos Flouris, Irini Fundulaki – FORTH.
SWIM-SUIT Information Models & Services
RCDL Conference, Petrozavodsk, Russia Context-Based Retrieval in Digital Libraries: Approach and Technological Framework Kurt Sandkuhl, Alexander Smirnov,
A Document Format for Expressing Privacy Preferences H. Schulzrinne, J. Morris, H. Tschofenig, J. Cuellar, J. Polk, J. Rosenberg.
1 Dept of Information and Communication Technology Creating Objects in Flexible Authorization Framework ¹ Dep. of Information and Communication Technology,
Pavan Reddiavri (Ebiquity Labs) “R ♫ P” RDF Access control Policies.
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
Metadata. Generally speaking, metadata are data and information that describe and model data and information For example, a database schema is the metadata.
Dimitrios Skoutas Alkis Simitsis
1 Logical Agents CS 171/271 (Chapter 7) Some text and images in these slides were drawn from Russel & Norvig’s published material.
Of 33 lecture 12: propositional logic – part I. of 33 propositions and connectives … two-valued logic – every sentence is either true or false some sentences.
Slide 1 Propositional Definite Clause Logic: Syntax, Semantics and Bottom-up Proofs Jim Little UBC CS 322 – CSP October 20, 2014.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
Q2Semantic: A Lightweight Keyword Interface to Semantic Search Haofen Wang 1, Kang Zhang 1, Qiaoling Liu 1, Thanh Tran 2, and Yong Yu 1 1 Apex Lab, Shanghai.
Using Several Ontologies for Describing Audio-Visual Documents: A Case Study in the Medical Domain Sunday 29 th of May, 2005 Antoine Isaac 1 & Raphaël.
A Systemic Approach for Effective Semantic Access to Cultural Content Ilianna Kollia, Vassilis Tzouvaras, Nasos Drosopoulos and George Stamou Presenter:
Service Service metadata what Service is who responsible for service constraints service creation service maintenance service deployment rules rules processing.
Common Terminology Services 2 CTS 2 Submission Team Status Update HL7 Vocabulary Working Group May 17, 2011.
1 Logical Agents CS 171/271 (Chapter 7) Some text and images in these slides were drawn from Russel & Norvig’s published material.
Logical Agents Chapter 7. Outline Knowledge-based agents Logic in general Propositional (Boolean) logic Equivalence, validity, satisfiability.
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
MyGrid/Taverna Provenance Daniele Turi University of Manchester OMII f2f Meeting, London, 19-20/4/06.
© 2006 University of Kansas An LSID resolver for specimens and a digression into issues raised by the use of GUIDs Steve Perry
DeepDive Model Dongfang Xu Ph.D student, School of Information, University of Arizona Dec 13, 2015.
Sesame: An Architecture for Storing and Querying RDF Data and Schema Inf. Yasser Ganji Saffar When they were out of sight Ali Baba.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Lessons learned from Semantic Wiki Jie Bao and Li Ding June 19, 2008.
1 A Medical Information Management System Using the Semantic Web Technology Networked Computing and Advanced INFORMATION MANAGEMENT, NCM '08. Fourth.
EEL 5937 Content languages EEL 5937 Multi Agent Systems Lecture 10, Feb. 6, 2003 Lotzi Bölöni.
Selected Semantic Web UMBC CoBrA – Context Broker Architecture  Using OWL to define ontologies for context modeling and reasoning  Taking.
Semantic Interoperability in GIS N. L. Sarda Suman Somavarapu.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Policy Systems Presented By: John Paul Dunning Usable Security – CS.
WP3: Data Provenance and Access Control Irini Fundulaki, FORTH December 11-12, 2012, Luxembourg.
Access Control Policy Languages in XML Lê Anh Vũ Võ Thành Vinh
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chapter 8A Semantic Web Primer 1 Chapter 8 Conclusion and Outlook Grigoris Antoniou Frank van Harmelen.
Artificial Intelligence Logical Agents Chapter 7.
Co-funded by the European Union under FP7-ICT Co-ordinated by aparsen.eu #APARSEN Provenance Interoperability and Reasoning Yannis Tzitzikas Assistant.
WP4 Models and Contents Quality Assessment
Dependency Management
Artificial Intelligence: Logic agents
ece 720 intelligent web: ontology and beyond
On Provenance of Queries on Linked Web Data
Presentation transcript:

WP3: Provenance and Access Policies Giorgos Flouris (FORTH) - Irini Fundulaki (CWI & FORTH) -

Slide 2 Part I General Description of WP3

Slide 3 Research Topics, Tasks and Partners Objective: manage annotations of different forms and semantics over data, related to data access Research Topics: Provenance, Access Control, Privacy, Digital Rights Management (DRM), Trust Management Partners : FORTH, EPFL, KIT PROVENANCEACCESS CONTROL DRMPRIVACYTRUST MANAGEMENT Task 3.1 (M1-M36) Task 3.2 (M1-M42) Task 3.3 (M19-M42) FORTH (14 PM)EPFL (2 PM)KIT (3 PM)

Slide 4 Deliverables D3.1 (FORTH, M24): “Access Control Specification Language, Reasoning and Enforcement Mechanisms” D3.2 (FORTH, M36): “Provenance Management and propagation through SPARQL query and update languages” D3.3 (FORTH, M42): “Access Control System and Privacy Aware Language” D3.4 (EPFL, M42): “Trust Management and Inference System” PROVENANCEACCESS CONTROL DRMPRIVACYTRUST MANAGEMENT Task 3.1 (M1-M36 ) Task 3.2 (M1-M42)Task 3.3 (M19-M42) FORTH (14 PM)EPFL (2 PM)KIT (3 PM) D3.2 (M24)D3.1 (M36), D3.3 (M42)D3.4 (M42)

Slide 5 Collaboration (Review Concern) Paper connecting quality assessment and repair from WP2 with provenance and the work done in WP3 (FUB-FORTH) Experiments for access control framework to consider datasets used in the project

Slide 6 Part II Research on WP3: Access Control

Slide 7 Controlling Access to RDF Data Refers to the ability to permit or deny the use of a particular resource by a particular entity Crucial for sensitive content since it ensures the selective exposure of information to different classes of users

Slide 8 Contributions: Access Control Contributions: ◦ Fine-grained, repository independent, portable across platforms access control framework ◦ High-level access control model for RDF data focusing on read-only permissions ◦ Formal semantics ◦ System implementation & experiments

Slide 9 Abstract Versus Concrete Models Standard approach ◦ (t, accessible) Our approach ◦ (t, at 5 ⊙ at 2 ) ◦ Concretize at 5, at 2, ⊙ ◦ Compute at 5 ⊙ at 2 ◦ Determine whether t is accessible or not Advantages ◦ Can experiment with different semantics and access control policies ◦ Faster updating of access control annotations during changes (additions/deletions of triples and/or annotations)

Slide 10 Abstract Access Control Model Access Control Model defined by a set of abstract tokens and abstract operators to model ◦ Computation of access labels of implicit RDF triples ◦ Propagation of access labels ◦ Conflicting and missing access labels Access Control Authorizations associate triples in the RDF/S graph with abstract tokens: quadruples Entailment rules for computing the access labels of implied quadruples Propagation rules to specify how access labels are propagated along the subclassOf and subpropertyOf relations.

Slide 11 Computing Abstract Labels 1. Evaluate the authorizations on the RDFS graph to obtain quadruples (i.e., triples annotated with access labels) 2. Apply RDFS Inference on the set of quadruples to obtain the closure of the RDFS graph 3. Apply the propagation rules to compute the propagated labels 11/16/2015

Slide 12 Example: Input t1:t1: t2:t2: t3:t3: t4:t4: t5:t5: t6:t6: s Student sc Person sc Agent &a&a type Student &a&a firstName Alice &a&a lastNameSmith Agent typeclass RDF triples A 1 : (construct {?x firstName ?y} where {?x type Student }, at1) A 2 : (construct {?x sc ?y}, at2) A 3 : (construct {?x type Student }, at3) A 4 : (construct {?x type class }, at4) A 5 : (construct {?x ?p Person}, at5) Authorizations (Query, Access Token) o p

Slide 13 Example: Authorizations q1:q1: q2:q2: q3:q3: q4:q4: q5:q5: q6:q6: spospo Student sc Person sc Agent &a&a type Student &a&a firstName Alice &a&a lastNameSmith Agent typeclass RDF quadruples l at2 at3 at1 at4 q7:q7: Student sc Person at5  t1:t1: t2:t2: t3:t3: t4:t4: t5:t5: t6:t6: s Student sc Person sc Agent &a&a type Student &a&a firstName Alice &a&a lastNameSmith Agent type class A 1 : (construct {?x firstName ?y} where {?x type Student }, at1) A 2 : (construct {?x sc ?y}, at2) A 3 : (construct {?x type Student }, at3) A 4 : (construct {?x type class }, at4) A 5 : (construct {?x ?p Person}, at5) p o

Slide 14 Example: ⊙ Entailment Operator RDFS Inference: triple-generating rules (A 1, sc, A 2, l 1 )(A 2, sc, A 3, l 2 ) (A 1, sc, A 3, l 1 ⊙ l 2 ) (&r 1, type, A 1, l 1 )(A 1, sc, A 2, l 2 ) (&r 1, type, A 2, l 1 ⊙ l 2 ) q8:q8: q9:q9: q 10 : q 11 : q 12 : spospo Student sc Agent Student sc Agent &a&a type Person &a&a type Agent &a&a type Agent l at2 ⊙ at2 at5 ⊙ at2 at3 ⊙ at2 (at3 ⊙ at2) ⊙ at2 (at5 ⊙ at2) ⊙ at2 q1:q1: q2:q2: q3:q3: spospo Student sc Person sc Agent &a&a type Student l at2 at3 q7:q7: Student sc Person at5

Slide 15 Example:  Propagation Operator  (  ( l 1 )) =  ( l 1 ) ( idempotence ) Propagating labels: no new triples are created (A 1, type, class, l 1 )(&a, type, A 1,  ( l 1 ))(&a, type, A 1, l 2 ) q6:q6: q 11 : spospo Agent type Agent &a type class l at4 (at3 ⊙ at2) ⊙ at2 q 13 : spospo &a type Agent l  at4

Slide 16 Concrete Access Control Policy (1) How do you determine the accessibility of a triple? ◦ Need to evaluate the abstract label(s) associated with said triple Concrete access control policy ◦ Set of concrete Tokens (e.g., true-false, high-medium-low, etc) ◦ Mapping from abstract to concrete tokens (e.g., at4  false) ◦ Concrete operators (i.e., implementation of abstract ones, e.g., ⊙ =  ) ◦ Conflict resolution operator (used when more that one abstract labels are associated with the same triple to resolve ambiguity) ◦ Access function (to decide whether a triple is accessible, depending on the evaluation result)

Slide 17 Concrete Access Control Policy (2) Example: ◦ Set of concrete tokens: L P = { true, false} ◦ Mapping: at1, at2, at3  true, at4, at5  false ◦ Entailment operator ⊙ :  al1 ⊙ al2 = ◦ Propagation operator  :  al = al al 1  al 2 if al1 and al2 are different from  al i if al i = , al j different from   if al 1, al 2 equal to 

Slide 18 Concrete Access Control Policy (3) ◦ Conflict resolution operator:  If a token is assigned n labels: al 1,…,al n, then:   {al 1,...,al n } = ◦ Access function: triples with label true are accessible, otherwise, inaccessible false if false is in {al 1,...,al n } true if false is not in {al 1,...,al n }, but true is  if neither false nor true are in {al 1,...,al n }

Slide 19 Example: Evaluation Process Is (&a, type, Agent) accessible? Find all labels of (&a, type, Agent), i.e., all quadruples involving said triple: ◦ (&a, type, Agent, (at3 ⊙ at2) ⊙ at2 ) ◦ (&a, type, Agent, (at5 ⊙ at2) ⊙ at2 ) ◦ (&a, type, Agent,  at4) Evaluate them: ◦ (&a, type, Agent, true) ◦ (&a, type, Agent, false) Resolve conflicts (i.e., “combine” labels): ◦ (&a, type, Agent, false) Run access function to determine accessibility: ◦ Not accessible

Slide 20 Implementation 11/16/2015 Implementation: ◦ Use of a relational schema to store the quadruples ◦ Quad(qid, s, p, o, propop, inferop, label)  inferop, propop : boolean values indicating whether the label is obtained through propagation or inference ◦ LabelStore(qid, qid_uses)  Stores the access label of a triple ◦ qid : the quadruple whose label is stored ◦ qid_uses: the quadruple used by quadruple with qid to compute the label of the latter.

Slide 21 Experiments: Description Experiment 1: annotation time (the time required to compute the inferred triples with their labels and the propagated labels) Experiment 2: evaluation time (a) (the time needed to compute for a concrete policy, the concrete access label all the RDF triples) Experiment 3: evaluation time (b) (the time needed to compute for a concrete policy, the concrete access label of a % of the RDF triples in a graph)

Slide 22 Experiments: Setting and Process MonetDB/Postgresql to store the quadruples Stored Procedures to ◦ Compute the abstract access labels (complex expressions) ( Experiment 1 ) ◦ Given a concrete policy, to compute the concrete access labels of triples ( Experiments 2 and 3 ) Datasets: ◦ Synthetic schemas produced with Powergen ◦ CIDOC & GO ontologies

Slide 23 Experiments: Results Annotation time increases linearly with respect to implied triples ◦ 45 secs for 900K implied triples (MonetDB) Evaluation time increases linearly with respect to the number of triples evaluated ◦ 60 secs for 30K evaluated triples (MonetDB) MonetDB is faster than Postgresql Working on improved schemata to get better performance

Slide 24 References Flouris G., Fundulaki I., Michou M., Antoniou G. Controlling Access to RDF Graphs. In FIS Flouris G., Fundulaki I., Michou M., Papakonstantinou V., Antoniou G. Access Control for RDFS Graphs Using Abstract Models. To appear in SACMAT /16/2015

Slide 25 Thank you !