Data and Applications Security Developments and Directions

Slides:



Advertisements
Similar presentations
Building Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Semantic web technologies for secure interoperability and.
Advertisements

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Inference Problem - II.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Dr. Bhavani Thuraisingham September 2006 Building Trustworthy Semantic Webs Lecture #5 ] XML and XML Security.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem - I September.
Dr. Bhavani Thuraisingham September 24, 2008 Building Trustworthy Semantic Webs Lecture #9: RDF and RDF Security.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Security for Distributed Data Management.
Dr. Bhavani Thuraisingham September 18, 2006 Building Trustworthy Semantic Webs Lecture #9: Logic and Inference Rules.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem March 4, 2011.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Inference Problem - I.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #11 Secure Heterogeneous.
Data and Applications Security
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Lecture #6: RDF and RDF Security Dr. Bhavani Thuraisingham
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security
Presentation transcript:

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Inference Problem - II September 23, 2009

Outline Security Constraint Processing Use of Conceptual Structures

Security Constraint Processing Security Constraints are rules that assign security levels to the data MLS/DBMS is augmented with an Inference Engine Inference Engine is the Inference Controller Integrated Architecture for Security Constraint processing Query, Update and Database design operations

Inference Engine Approach

Constraint Generation

Query Processor

Update Processor

Database Design Tool

Integrated Architecture

Release Control Management

Use of Conceptual Structures Use conceptual structures to model the application E.g., semantic data models, semantic nets, conceptual graphs, etc. Use the reasoning strategy of the conceptual structure and determine if security violation via inference can occur

Multilevel Semantic Nets

Complex Multilevel Semantic Net Italy Destination 20 years India Mediterranean Sea Skills Location REAGAN Smith Captain Date 16 June 2000 Skills Carries SUN Explosive Battle Passengers Management Type

ISA/AKO Links

Example Rules - II SHIPS WEAPONS (a) SHIP WATER VEHICLE AKO (c) REAGAN ISA (b) PERSON Has Captain

Example Rules - II SHIPS WEAPONS (d) REAGAN SHIP ISA PERSON Has Captain (e) India Destination COUNTRY

Applying Transfer Rules India Destination Mediterranean India Sea Mediterranean Sea (b) Location Location REAGAN REAGAN Smith (a) Carries Carries Skills Type SUN Type Explosive SUN Explosive Battle Management Destination India Mediterranean Sea Location Smith REAGAN (c) Combines (a) and (b) Skills Carries Battle Type SUN Management Explosive

Security Constraints Carries Carries REAGAN REAGAN SHIPS SHIPS WEAPONS SUN SUN WEAPONS (a) (a) Mediterranean Mediterranean Location Carries Carries REAGAN REAGAN SHIPS SHIPS SUN SUN (b) (b) Destination Destination COUNTRY COUNTRY

Security Constraint Violation - I

Security Constraint Violation - II

Universal and Existential Conditionals

Matching Vectors

Matching and Binding India Destination Location Mediterranean SHIP: ALL X (a) Destination Carries New Delhi India Mediterranean Explosive Sea WEAPONS: SOME Y Capital Capital Destination Type Location REAGAN Smith Captain New Delhi India (b) FLORIDA FLORIDA Mediterranean Skills Sea Capital Destination Carries Carries Carries Location Battle REAGAN Management SUN Explosive MOON MOON Smith Captain Type Type Type Skills FLORIDA Carries (c ) Results from (a) and (b) (c ) Results from (a) and (b) Carries Battle Management SUN Explosive MOON Type Type

Negative Statements

X X Refutation LOCATION REAGAN SHIPS FLORIDA SHIPS WEAPONS Pacific Ocean WEAPONS REAGAN DESTINATION (a) DESTINATION (b) Australia Australia WEAPONS WEAPONS FLORIDA FLORIDA DESTINATION SHIPS SHIPS WEAPONS REAGAN WEAPONS REAGAN REAGAN SHIPS Australia WEAPONS LOCATION DESTINATION X X (c ) Pacific Ocean Pacific Ocean Australia Australia WEAPONS WEAPONS (d) FLORIDA SHIPS REAGAN WEAPONS DESTINATION LOCATION Australia Pacific Ocean WEAPONS (e) WEAPONS

Directions Inference problem is still being investigated Census bureau still working on statistical databases Need to find real world examples in the Military world Inference problem with respect to medial records Much of the focus is now on the Privacy problem Privacy problem can be regarded to be a special case of the inference problem