Presentation is loading. Please wait.

Presentation is loading. Please wait.

PEP Similarity Credential Repository Gossip protocol Access request Credential request Reputation-based Similarity Evaluator AC Policy Request Decision.

Similar presentations


Presentation on theme: "PEP Similarity Credential Repository Gossip protocol Access request Credential request Reputation-based Similarity Evaluator AC Policy Request Decision."— Presentation transcript:

1 PEP Similarity Credential Repository Gossip protocol Access request Credential request Reputation-based Similarity Evaluator AC Policy Request Decision TM Policy Predicate Layer Constraint rules Global OntologyLocal Ontology PDP Semantic Web Library TM algorithm

2 What is done PDP SWI-Prolog (http://www.swi-prolog.org/) Credential repository PostgreSQL (http://www.postgresql.org/)http://www.postgresql.org/ Request Format XACML + SAML Profile (http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml)

3 SWI Prolog PEP Similarity Credential Repository Gossip protocol Access request Credential request Reputation-based Similarity Evaluator AC Policy Request Decision TM Policy Predicate Layer Constraint rules Global OntologyLocal Ontology PDP Semantic Web Library TM algorithm SWI Prolog PostgreSQL Project 1a XACML Project 2a Project 1b&2b Project 3a Project 3b

4 Project 1a (2 persons) PEP and interface with PDP Component that waits for requests (also from other computers) and forwards the requests to the PDP Interface between this component and PDP – Translate XML requests into Prolog queries – Return decision made by the PDP to the PEP Requirements Format of request (XACML-based) to PEP – Ac: Subj, obj, action, list of creds. – Cred: Subj, Attr, list of creds. Interface Java/Prolog – e.g., JPL (http://www.swi- prolog.org/packages/jpl/java_api/index.html)

5 Project 2a (2 persons) TM Algorithms Chain Discovery (RT algorithms) Simulations in Distributed Systems Requirements Java interface between Prolog engines No requirements on the msg exchange format at this stage of the project Reference Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security, volume 11, number 1, pp. 35-86, February 2003.

6 Project 1b&2b (4 persons) Integrate 1a and 2a  Integrate the TM Algorithm into the PEP-PDP  Request of remote credentials specified as XACML/SAML requests  Credential Issuing XACML/SAML

7 Project 3a (3 persons) Extend the PDP with a component for reputation- based decisions Component for assessing the similarity between two concepts Retrieve similarity credentials from the repository Implement similarity metrics Interface between PDP and this component

8 Project 3b (3 persons) Design a protocol for the exchange of similarity credentials among peers. Gossip protocols Reference A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Stuygis, D. Swinehart, D. Terry, “Epidemic algorithms for replicated database maintenance”, Proc. ACM Symp. on Principles of Distributed Computing, 1987. S. Hedetniemi, S. Hedetniemi, A. Liestman, “A survey of gossiping and broadcasting in communication networks”, Networks 18(1988).


Download ppt "PEP Similarity Credential Repository Gossip protocol Access request Credential request Reputation-based Similarity Evaluator AC Policy Request Decision."

Similar presentations


Ads by Google