1 T. Hill Review of: ROWLBAC – Representing Role Based Access Control in OWL T. Finin, A. Joshi L. Kagal, B. Thuraisingham, J. Niu, R. Sandhu, W. Winsborough.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY April Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Advertisements

ROWLBAC – Representing Role Based Access Control in OWL
CH-4 Ontologies, Querying and Data Integration. Introduction to RDF(S) RDF stands for Resource Description Framework. RDF is a standard for describing.
Dr. Bhavani Thuraisingham February 18, 2011 Building Trustworthy Semantic Webs RDF and RDF Security.
CS570 Artificial Intelligence Semantic Web & Ontology 2
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
Tod Sedbrook Richard Newmark University of Northern Colorado PROCESSING EVIDENCE DOCUMENTS WITH SEMANTIC WEB TECHNOLOGIES.
Policy Description & Enforcement Languages Anis Yousefi
SmartER Semantic Cloud Sevices Karuna P Joshi University of Maryland, Baltimore County Advisors: Dr. Tim Finin, Dr. Yelena Yesha.
The Web of data with meaning... By Michael Griffiths.
Ontologies and the Semantic Web by Ian Horrocks presented by Thomas Packer 1.
COMP 6703 eScience Project Semantic Web for Museums Student : Lei Junran Client/Technical Supervisor : Tom Worthington Academic Supervisor : Peter Strazdins.
Intelligent Systems Semantic Web. Aims of the session To introduce the basic concepts of semantic web ontologies.
From SHIQ and RDF to OWL: The Making of a Web Ontology Language
1 Technologies and Modelling Frameworks XML ontology RDF taxonomy OWL thesaurus Semantic Web.
1 DCS861A-2007 Emerging IT II Rinaldo Di Giorgio Andres Nieto Chris Nwosisi Richard Washington March 17, 2007.
1 of 30 Declarative Policies for Describing Web Service Capabilities and Constraints Lalana Kagal Tim Finin Anupam Joshi University of Maryland Baltimore.
Ontologies: Making Computers Smarter to Deal with Data Kei Cheung, PhD Yale Center for Medical Informatics CBB752, February 9, 2015, Yale University.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
Chapter 6 Understanding Each Other CSE 431 – Intelligent Agents.
Intelligent Agents Meet the Semantic Web in Smart Spaces Harry Chen,Tim Finin, Anupam Joshi, and Lalana Kagal University of Maryland, Baltimore County.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
INF 384 C, Spring 2009 Ontologies Knowledge representation to support computer reasoning.
OWL 2 in use. OWL 2 OWL 2 is a knowledge representation language, designed to formulate, exchange and reason with knowledge about a domain of interest.
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
Rei and Rules Tim Finin, UMBC Lalana Kagal, MIT Tim Finin, UMBC Lalana Kagal, MIT.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Semantic Web - an introduction By Daniel Wu (danielwujr)
1 What is an Ontology? n No exact definition n A tool to help organize knowledge n Or a way to convey a theory on how to represent a class of things n.
Scalable and E ffi cient Reasoning for Enforcing Role-Based Access Control Tyrone Cadenhead Murat Kantarcioglu, and Bhavani Thuraisingham 1.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
updated ’08CmpE 583 Fall 2008Introduction- 1 CmpE 583- Web Semantics: Theory and Practice Atilla ELÇİ Computer Engineering Department Eastern.
Grid Computing & Semantic Web. Grid Computing Proposed with the idea of electric power grid; Aims at integrating large-scale (global scale) computing.
A Policy Based Approach to Security for the Semantic Web Lalana Kagal, Tim Finin and Anupam Joshi.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
1 Artificial Intelligence Applications Institute Centre for Intelligent Systems and their Applications Stuart Aitken Artificial Intelligence Applications.
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Medical Roles/Permissions Ontology Ping Wang Tetherless World Constellation Rensselaer Polytechnic Institute.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Metadata Common Vocabulary a journey from a glossary to an ontology of statistical metadata, and back Sérgio Bacelar
Ontology Engineering Lab #2 – September 9,
Ontology Engineering Lab #5 – September 30, 2013.
Practical RDF Chapter 12. Ontologies: RDF Business Models Shelley Powers, O’Reilly SNU IDB Lab. Taikyoung Kim.
Semantic Web for the Working Ontologist Dean Allemang Jim Hendler SNU IDB laboratory.
1 Nov. 2, 2005 Design and Application of Rule Based Access Control Policies Huiying Li, Xiang Zhang, Honghan Wu & Yuzhong Qu Dept. Computer.
Service Oriented Architecture in the presence of information structure (audio of this talk)audio of this talk Presenter: Paul S Prueitt, PhD:
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
OWL Web Ontology Language Summary IHan HSIAO (Sharon)
Enable Semantic Interoperability for Decision Support and Risk Management Presented by Dr. David Li Key Contributors: Dr. Ruixin Yang and Dr. John Qu.
Selected Semantic Web UMBC CoBrA – Context Broker Architecture  Using OWL to define ontologies for context modeling and reasoning  Taking.
Scalable and E ffi cient Reasoning for Enforcing Role-Based Access Control Tyrone Cadenhead Advisors: Murat Kantarcioglu, and.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
The Semantic Web By: Maulik Parikh.
Knowledge Representation Part II Description Logic & Introduction to Protégé Jan Pettersen Nytun.
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Semantic Event-based Service Oriented Architecture
Internet of Things: Security Challenges
Ontology.
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Linking Guide Michel Böhms.
Service-Oriented Computing: Semantics, Processes, Agents
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Data and Applications Security Developments and Directions
Knowledge Representation Part VII Protégé / RDFS / OWL / ++
Assured Information Sharing
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Data and Applications Security Developments and Directions
Presentation transcript:

1 T. Hill Review of: ROWLBAC – Representing Role Based Access Control in OWL T. Finin, A. Joshi L. Kagal, B. Thuraisingham, J. Niu, R. Sandhu, W. Winsborough 10/13/2008 Problem: Using the hierarchy diagram below, describe how OWL (Web Ontology Language) can be used to specify the following RBAC security model access control functions; assign the role of Person and two sub-class roles of Citizen and Visitor, assign to Citizen the permitted actions of Vote, Work, Jury, assign to Visitor a prohibited action of Work. Make Alice an active Citizen and Bob an active Visitor. [note - general descriptive language is acceptable, exact RDF/OWL syntax is not necessary]. Motivation Applications – sophisticated, intelligent, open and dynamic environments Future – Grid computing, intelligent agents, negotiate exchange of information Security – of future applications, regardless of infrastructure, including the cloud Bring together two parallel themes Access Control Models – RBAC96, NIST Standard, RT, Usage Control Policy Languages – XACML, Ponder, Rei, KAoS

2 ROWLBAC – Semantic Web and OWL Semantic Web Berners-Lee vision Knowledge published so humans and computers can understand and reason Technology W3C standards RDF (Resource Description Framework) triple //..html has a creation-date whose value is August 16, 1999 Description Logic

3 ROWLBAC – Roles as Classes, Permissions, Activation, Enforcing Hierarchy of roles Citizen rdfs:subclassOf Person. Visitor rdfs:subClassOf Person. BobVisitor a rbac:ActivateRole; rbac:subject data:Bob; rbac:object ex:Visitor. Associating permissions with roles PermittedVoteAction a rdfs:Class; rdfs:subClassOf rbac:PermittedAction; owl:equivalentClass [ a owl:Class; owl:intersectionOf ( Vote [ a owl:Restriction; owl:allValuesFrom ex:ActiveCitizen; owl:onProperty rbac:subject ] ) ] Assigning roles and activation in a session Enforcing RBAC activation rule { ?ACTION a ActivateRole; subject ?SUBJ; object ?ROLE. ?SUBJ a ?ROLE. ?ROLE activeForm ?AROLE. ?AROLE rdfs:subClassOf ActiveRole. } => { ?ACTION a PermittedRoleActivation; subject ?SUBJ; object ?ROLE. ?SUBJ a ?AROLE }. AliceCitizen a rbac:ActivateRole; rbac:subject data:Alice; rbac:object ex:Citizen.

4 ROWLBAC – A Proposed Solution Problem: Using the hierarchy diagram below, describe how OWL (Web Ontology Language) can be used to specify the following RBAC security model access control functions; assign the role of Person and two sub-class roles of Citizen and Visitor, assign to Citizen the permitted actions of Vote, Work, Jury, assign to Visitor a prohibited action of Work. Make Alice an active Citizen and Bob an active Visitor. [note - general descriptive language is acceptable, exact RDF/OWL syntax is not necessary]. Proposed solution: 1. Use RDF/OWL to define Citizen as a subclass of Person and Visitor as a subclass of Person 2. Use RDF/OWL to define Vote as a permitted action of Citizen and Work as a permitted action of Citizen and Jury as a permitted action of Citizen And Work as a prohibited action of Visitor 3. At run time, set Alice as an active Citizen and Bob as an active Visitor Person Citizen Permitted: Vote, Work, Jury Visitor Prohibited: Work Alice active Bob active