Enabling Access Control and Privacy through Ontology Mohammad M. R. Chowdhury Dr. Josef Noll UniK - University Graduate Center, Norway Dr. Juan Miguel.

Slides:



Advertisements
Similar presentations
Improving Learning Object Description Mechanisms to Support an Integrated Framework for Ubiquitous Learning Scenarios María Felisa Verdejo Carlos Celorrio.
Advertisements

Design by Contract.
AVATAR: Advanced Telematic Search of Audivisual Contents by Semantic Reasoning Yolanda Blanco Fernández Department of Telematic Engineering University.
Operating System Security
CH-4 Ontologies, Querying and Data Integration. Introduction to RDF(S) RDF stands for Resource Description Framework. RDF is a standard for describing.
Chronos: A Tool for Handling Temporal Ontologies in Protégé
Chapter 6: Modeling and Representation Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
Semantic Web Thanks to folks at LAIT lab Sources include :
The Acquisition and Sharing of Domain Knowledge Contained in Software with a Compliant SIK Architecture by Prof. dr. Vasile AVRAM Academy of Economic Studies.
SELBO Agent Ivan Minov University of Plovdiv “Paisii Hilendarski“
SOFTWARE ENGINEERING ONTOLOGY A DEVELOPMENT METHODOLOGY Projects: eLSE & SELBO Iveta Georgieva.
Chapter 6: Modeling and Representation Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
1 SWE Introduction to Software Engineering Lecture 23 – Architectural Design (Chapter 13)
Sensemaking and Ground Truth Ontology Development Chinua Umoja William M. Pottenger Jason Perry Christopher Janneck.
Data Management I DBMS Relational Systems. Overview u Introduction u DBMS –components –types u Relational Model –characteristics –implementation u Physical.
Semantic Location Based Services for Smart Spaces Kostas Kolomvatsos, Vassilis Papataxiarhis, Vassileios Tsetsos P ervasive C omputing R esearch G roup.
ReQuest (Validating Semantic Searches) Norman Piedade de Noronha 16 th July, 2004.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
From SHIQ and RDF to OWL: The Making of a Web Ontology Language
Terregov: eGovernment interoperability on a semantically driven world Interop-ESA/eGov Interop conference Geneva, February 2005 Santos Vicente, María Pérez,
Peer WLAN Consortium: A P2P Case Study Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens MMAPPS Meeting,
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Domain Modelling the upper levels of the eframework Yvonne Howard Hilary Dexter David Millard Learning Societies LabDistributed Learning, University of.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
Presented to: By: Date: Federal Aviation Administration Enterprise Information Management SOA Brown Bag #2 Sam Ceccola – SOA Architect November 17, 2010.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
SharePoint Server 2013 Features and Scenarios for IT Professionals First Lastname, Title March, 2014 Software Assurance Planning Services.
1 Semantic Technologies: Diamond in the Rough? Unik Graduate Research Center Dr. Juan Miguel Gomez Universidad Carlos III de Madrid.
New trends in Semantic Web Cagliari, December, 2nd, 2004 Using Standards in e-Learning Claude Moulin UMR CNRS 6599 Heudiasyc University of Compiègne (France)
Semantic Web. Course Content
(Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student.
HCI Yonsei University, Korea The Role of Human Computer Interaction (HCI) in the Information Systems (IS) Curriculum Jinwoo.
TOWARDS INTEROPERABILITY IN TRACKING SYSTEMS: AN ONTOLOGY-BASED APPROACH Juan Gómez Romero Miguel A. Patricio Jesús García José M. Molina Applied A.I.
Development of Front End Tools for Semantic Grid Services Dr.S.Thamarai Selvi, Professor & Head, Dept. of Information Technology, Madras Institute of Technology,
SQL Databases are a Moving Target Juan F. Sequeda – Syed Hamid Tirmizi –
Identity-based Service Interaction Mohammad M. R. Chowdhury Ph.D. candidate UniK-University Graduate Center / University of Oslo SWACOM meeting, Stavanger,
The Agricultural Ontology Service (AOS) A Tool for Facilitating Access to Knowledge AGRIS/CARIS and Documentation Group Library and Documentation Systems.
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: David Shelly Usable Security – CS 6204 – Fall,
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Illustrations and Answers for TDT4252 exam, June
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 14 Slide 1 Object-oriented Design.
Semantic Web Constraint Language complement and the editor development in Protégé Piao Guangyuan.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Semantic based P2P System for local e-Government Fernando Ortiz-Rodriguez 1, Raúl Palma de León 2 and Boris Villazón-Terrazas 2 1 1Universidad Tamaulipeca.
1 System Analysis and Design Using UML INSTRUCTOR: Jesmin Akhter Lecturer, IIT, JU.
Information Asset Registers Jo Ellis 12 September 2008.
SKOS. Ontologies Metadata –Resources marked-up with descriptions of their content. No good unless everyone speaks the same language; Terminologies –Provide.
-KHUSHBOO BAGHADIYA.  Introduction  System Description  iCAT in use  Evolution of the system  Evolution of modeling  Evolution of features  Evolution.
ESIP Semantic Web Products and Services ‘triples’ “tutorial” aka sausage making ESIP SW Cluster, Jan ed.
Knowledge Representation. Keywordsquick way for agents to locate potentially useful information Thesaurimore structured approach than keywords, arranging.
1 Class exercise II: Use Case Implementation Deborah McGuinness and Peter Fox CSCI Week 8, October 20, 2008.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Implementation of Ontology Based Context-awareness Framework Ki-Chul Lee, Jung-Hoon Kim International Conference on Multimedia and Ubiquitous Engineering.
Sharing personal knowledge over the Semantic Web ● We call personal knowledge the knowledge that is developed and shared by the users while they solve.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. SOA-RM Overview and relation with SEE Adrian Mocan
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
The Agricultural Ontology Server (AOS) A Tool for Facilitating Access to Knowledge AGRIS/CARIS and Documentation Group Food and Agriculture Organization.
A Context Framework for Ambient Intelligence
Service-Oriented Computing: Semantics, Processes, Agents
Building Trustworthy Semantic Webs
Chapter 2 Database Environment.
Service-Oriented Computing: Semantics, Processes, Agents
Service-Oriented Computing: Semantics, Processes, Agents
Pervasive Computing Happening?
Information system analysis and design
Presentation transcript:

Enabling Access Control and Privacy through Ontology Mohammad M. R. Chowdhury Dr. Josef Noll UniK - University Graduate Center, Norway Dr. Juan Miguel Gomez Universidad Carlos III de Madrid, Spain Nov. 19, Innovations’07, Dubai This is a part of Research (work-in-progress) - ’Identity-based Service Interaction’ under the project SWACOM ( ) with funding from Norwegian Research Council.

Contents Background –Identity: Real world to digital world –Role based identity mechanism Proposed SemID (semantic identity) –Use case scenario –Policies and rules Implementations –Class, subclass, instances and properties –Rules and inference engine Future work Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

Background Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

Identity: Real world to digital world Real world Identities Digital world identities Identity Digital world Passwords everywhere Gartner says (annual IT security summit 2005) 80% of organizations will reach a password breaking point by Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai Managing these Many!!! Reuse, Write down

Based on human roles played in real life, Chowdhury (ICWMC 2007, Guadeloupe) proposed personal, corporate and social identities. Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

Human roles Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

Role based identity mechanism My digital identity –Personal identities (PID): Identify ourselves in our very personal interactions. –My corporate identities (CID): Identify ourselves in our corporate/professional interactions. –My social identity (SID): Identify ourselves in our society/ community/ interpersonal interactions. Very personal mobile phone is the preferred device to access and store ’my digital identity’ … ” user carries mobile phone more often than Wallet these days” Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai ’my digital identity’ - partly placed in the network and - partly in mobile phone SIM card

We proposed to combine capabilities of Semantic Web Technology for representation of corporate and social identities. We designed SemID ( ontology to manage corporate identities (social identities in a parallel work) facilitating access control and privacy support in project oriented corporate environment. Knowledge of the identity management domain needs to be encoded to facilitate understanding and manipulation of computers. This encoding is achieved through specification and utilization of Ontology – formal representation of a domain. In this paper, OWL, Web Ontology Language is used to formalize and define the proposed identity management domain. Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

OWL is a part of the "Semantic Web Vision" - a future where: –Web information has exact meaning –Web information can be processed by computers –Computers can integrate information from different places on the web Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

SemID (Semantic Identity) Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

Use Case scenario Objective: Access control to project resources Maintaining privacy of project oriented group and its members --- based on members’ roles in a project Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

Use case: goals Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

The access control and privacy goals are achieved through policies and rules. Each role has certain policy (or policies). A Policy (P) represents the privilege reserved for each role in a community and expressed through a set of Rules ( ). Therefore Policy, Essentially a Rule is a function that takes an access request as input and results an action (permit, deny or not-application). So, the Rule is simplified as, If Josef Noll is the project leader and he wants to write over a project deliverables, the corresponding rule will be defined as, Policies and Rules Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

We model the ontology of the use case scenario with OWL-DL (sub-language of OWL) using Protègè ontology editor platform. Assume, - Individuals are already authenticated to the project. - Visitors are those whose identity instances are not defined in the ontology Implementation Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

Description of corporate identities (assuming them as ’name’ string) Ensure general visibility of Group Ensure visibility of member details of Group Role definition and its properties Ontology has 4 distinct policies

Lets, visualize the whole ontology using OntovizTab of Protègè. SemID_1.pdf SemID_1.pdf Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

Rules have not been added in this paper (added recently) Rules have been represented using SWRL (Semantic Web Rule Language) There is SWRLTab in Protégé to add rules from our proposed ontology Jess rule engine provides the inference of SWRL rules There is SWRLJessTab in Protégé for this purpose Rules and inference engine Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

Rules Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai It is assumed that requester already authenticated to the project

Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

What is the requester’s Role? What is the corresponding Policy? What is the Action of the Policy and Rule? Which one is the Rule of this policy?

Future research Develop a front-end (software) based on this ontology and rules Develop an ontology which can take care of social community scenarios –Access to community resources based on the relationships (ex. Parents of student who belongs to class 2 of Sogn School) Bear in mind: Project leader of Release 9 project (corporate identity) Parents of a Maria (social identity) Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai

Thank You ? Mohammad M. R. Chowdhury Innovations’07, Nov. 19, Dubai