Achieving Traceable Compliance using the Ampersand Method Open University of the Netherlands TouW gathering March 6th 2010 Henriëtte Sangers.

Slides:



Advertisements
Similar presentations
Page 1 Copyright © 2010 Data Access Technologies, Inc. Model Driven Solutions May 2009 Cory Casanave Architecture of Services SOA for E-Government Conference.
Advertisements

Modelling with expert systems. Expert systems Modelling with expert systems Coaching modelling with expert systems Advantages and limitations of modelling.
Privacy By Design Sample Use Case
Configuration management
AVATAR: Advanced Telematic Search of Audivisual Contents by Semantic Reasoning Yolanda Blanco Fernández Department of Telematic Engineering University.
Directory and Trust Services (D&TS) Define an Abstract Model Purpose: Document a common terminology that the group can use between the various tracks Identify.
TU e technische universiteit eindhoven / department of mathematics and computer science Modeling User Input and Hypermedia Dynamics in Hera Databases and.
Privacy By Design Draft Privacy Use Case Template
Lukas Blunschi Claudio Jossen Donald Kossmann Magdalini Mori Kurt Stockinger.
Towards Adaptive Web-Based Learning Systems Katerina Georgouli, MSc, PhD Associate Professor T.E.I. of Athens Dept. of Informatics Tempus.
Bernd Bruegge & Allen Dutoit Object-Oriented Software Engineering: Conquering Complex and Changing Systems 1 Software Engineering September 12, 2001 Capturing.
Organizing Your Argument The Argumentative Essay.
Surfing the Data Standards: Colorado’s Path 2012 MIS Conference – San Diego Daniel Domagala, Colorado Department of Education David Butter, Deloitte Consulting.
Security Controls – What Works
Continuous Compliance Assurance for Trusted Information Sharing: A Research Framework Bonnie W. Morris College of Business & Economics
1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
Systems Analysis Requirements structuring Process Modeling Logic Modeling Data Modeling  Represents the contents and structure of the DFD’s data flows.
Management Information Systems Background Definition of information systems Knowledge needed to succeed.
Quality is about testing early and testing often Joe Apuzzo, Ngozi Nwana, Sweety Varghese Student/Faculty Research Day CSIS Pace University May 6th, 2005.
Overview of the Multos construction process Chad R. Meiners.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
1 Human resources management in NSOs Training workshop for SADC member states. Luanda, 2-6 Dec 2006 Olav Ljones, Deputy Director General, Statistics Norway.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Ontology Development Kenneth Baclawski Northeastern University Harvard Medical School.
Avalanche Internet Data Management System. Presentation plan 1. The problem to be solved 2. Description of the software needed 3. The solution 4. Avalanche.
Healthcare Services as Collective Activity Susan Wakenshaw Xiao MA.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Knowledge representation
CSCI 3140 Module 2 – Conceptual Database Design Theodore Chiasson Dalhousie University.
Spoken dialog for e-learning supported by domain ontologies Dario Bianchi, Monica Mordonini and Agostino Poggi Dipartimento di Ingegneria dell’Informazione.
Assurance Report on Controls at Service Organizations SAE 3402
IST 2006 – 22/11/2006 Aljosa Pasic Atos Origin Security, Dependability and Trust in Service Infrastructures.
Secure Systems Research Group - FAU Using patterns to compare web services standards E. Fernandez and N. Delessy.
IT Requirements Management Balancing Needs and Expectations.
Delivering business value through Context Driven Content Management Karsten Fogh Ho-Lanng, CTO.
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
An Introduction to Software Engineering. Communication Systems.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
NETWORKED EUROPEAN SOFTWARE & SERVICES INITIATIVE Future research challenges in dependability - an industrial perspective from NESSI Aljosa Pasic Atos.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Semantic based P2P System for local e-Government Fernando Ortiz-Rodriguez 1, Raúl Palma de León 2 and Boris Villazón-Terrazas 2 1 1Universidad Tamaulipeca.
The world of autonomous reconfigurable systems Intelligent Interactive Distributed Systems Group Vrije Universiteit Amsterdam /
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
HIPAA Training Workshop #1 Council of Community Clinics – San Diego February 7, 2003 by Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Software reviews Cost impact of software defects Defect amplification model Review metrics and their use – Preparation effort (E p ), assessment effort.
Systems Analyst (Module V) Ashima Wadhwa. The Systems Analyst - A Key Resource Many organizations consider information systems and computer applications.
System A system is a set of elements and relationships which are different from relationships of the set or its elements to other elements or sets.
Metadata Driven Aspect Specification Ricardo Ferreira, Ricardo Raminhos Uninova, Portugal Ana Moreira Universidade Nova de Lisboa, Portugal 7th International.
CASE Tools and their Effect on Software Quality
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Group 9: Matilda Akkola, Reetta Arokoski, Lauri Kokkila, Miikka Laitila CROWDSOURCING: HOW TO BENEFIT FROM (TOO) MANY GREAT IDEAS? “The article gives recommendations.
Information Systems Sarika Agarwal.
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
XACML and the Cloud.
Tools of Software Development
Compliance….GlobalSearch……WHAT?!?!
Data Model.
A Policy-Based Security Mechanism for Distributed Health Networks
Security Mechanisms Network Security.
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Achieving Traceable Compliance using the Ampersand Method Open University of the Netherlands TouW gathering March 6th 2010 Henriëtte Sangers

Different aspects research Compliance Business Ontologies Ampersand Method IT systems development GAP

Mind the Gap Compliance Follow rules Obedience Do the right thing Respect others The limits of our language mean the limits of our world Wittgenstein (1922)

Two Gaps in IT Systems Development 1.Different use of concepts – misunderstandings about desired functionality 2.Wrong implementation of correctly understood desired functionality  Contribute to the bad track record of IT projects

The importance of being… an OU student  Usually you are older…what’s so great about that?  Let’s try: more mature? More experienced? => If you work in IT: you saw the gap  If you really want to know the gap cross it! => Use the opportunities to experience the other side  Chance to get better understanding of mutual dependency Business - IT

Compliance Organisations operating according to rules and regulations set for this type of organisation. Financial World Barings IceSave ING New regulations to restore public trust in the financial system: People, procedures and IT-systems all need to be compliant! - Basel II - SOx - MIFID - CDD Lehman Brothers ABN AMRO => Focus now on ‘getting it right’

Compliance Challenge  Adapt to rapidly changing ruling in a competitive market stay flexible change at low costs  Specific difficulties compliance: translating compliance ruling into measures for organisation many rules and regulations from different sources traceability - ‘proving’ compliance

Compliance Challenge - surveys Mercury US and European businesses expect a large part of IT budgets will go to compliance projects in the coming years Deloitte and Touche Complexity of IT environments is seen as a major impediment in compliance projects Gartner Organisations can experience a competitive advantage by handling compliance issues more efficiently than others

The Ampersand Method I  Rule based Business Process Management Stef Joosten  Formal approach to IT systems development  Succeeds / incorporates: Calculating with Concepts: finding and verifying business rules ADL (A Description Language): capturing business rules  building blocks: Concepts: entities which are important to users Relations: associations between concepts Rules: invariants, represent business logic

The Ampersand Method II  Business processes are derived from business rules, not built with them.  Based on relation algebra, can be used to: Get clarity about specifications (cycle chasing) Specifying and even generating IT systems which can be proven to implement business logic (as in business rules) correctly.

Bridging the Gap: Ontologies  How to represent the real world: ontologies, the silver bullet?  Everybody his own ontology: solving problems or raising misunderstandings to a higher level?  Why use ontologies in IT: Enabling common understanding: sofa/couch, property/attribute Reuse domain knowledge Make domain knowledge explicit, support analysis  Long history in IT Systems Analysis and Design (ISAD), a.o. Bunge-Wand-Weber representation model

Use of Ontologies in IT  Applications: information integration, P2P information sharing, web service composition, ambient intelligence, web navigating and querying (Marktplaats)  Recent developments in the area of automated concept matching and ontology integration

Ampersand, Business Ontologies and Compliance Business (compliance) rules can be used directly, no need to program business processes All business (compliance) logic in one place, easy to check by users and auditors Mathematical prove that functionality matches business (compliance) rules can be provided Business ontologies easy to use with Ampersand, help bridge the gap between compliance ruling and business concepts

Research at Purdue University  CERIAS program: Center for Education and Research in Information Assurance and Security  Articles on: traceable and flexible compliance with privacy ruling use of ontologies to support common understanding of concepts  Computer Science Research group dedicated to: Digital Identity Management and Protection

Articles Purdue University Examples: Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. 6th Workshop on Privacy Enhancing Technologies. Cambridge University UK, Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. IEEE Transactions on Dependable and Secure Computing, January-March 2006

The Case  Federated environment of medical service providers and patients  Automated exchange of patients’ information among service providers  Compliance with patients’ privacy preferences  Breaches of trust need to be traceable  Other requirements: common understanding of concepts (medical, privacy preferences) automated matching of concepts flexibility and traceability

Purdue Solution I 1.Check isMoreStrict 2.A. Privacy preference templates PPx stricter than Ppy if x < y

Purdue Solution II 3. Check logging - trace back 2.B. Customized privacy preferences More complex checks / ordening.

Ampersand Solution Concepts, Relations and Rules Concepts: entities which are important to users CONCEPT "Participant" "party in federated service network, person or service provider." CONCEPT "PrivacyPreference" "a policy statement about how to deal with information" CONCEPT "Data" "the type of data that can be stored of a person." Relations: associations between concepts belongsTo :: PrivacyPreference => Participant subsumes :: PrivacyPreference * PrivacyPreference [TRN,ASY] PRAGMA "" " subsumes, is less strict than “ requestsInformationFrom :: Participant * Participant Rules: invariants, represent business logic requestsInformationFrom -: (hasPrivacyPreference; hasPrivacyPreference~) \/ (hasPrivacyPreference; subsumes~; hasPrivacyPreference~) EXPLANATION "Information can only be requested from a party with an equally or less strict privacy policy."

Ampersand Solution - base x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x xx x x x x x x x x x x x x x x x xx x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x requestsInformationFrom -: (hasPrivacyPreference; hasPrivacyPreference~) \/ (hasPrivacyPreference; subsumes~; hasPrivacyPreference~) possible occurrences allowed occurrences actual occurrences

Ampersand Solution - flexibility x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x xx x x x x x x x x x x x x x x x xx x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x requestsInformation -: ((belongsTo~; hasPurpose; subsPurpose~; hasPurpose~) /\ (belongsTo~; refersToData; subsData~; refersToData~)) \/ (permissionTo~; permissionConcerns) possible occurrences allowed occurrences special permission actual occurrences

Ampersand - ontologies subsPurpose :: Purpose * Purpose [TRN,ASY] PRAGMA "" " subsumes, is less strict than" = [ ("General-purpose", "Treatment") ; ("General-purpose", "Insurance") ; ("General-purpose", "Research") ; ("Research", "Teaching") ; ("Research", "Development") ; ("Research", "Marketing") ].

Ampersand - ontology integration x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x xx x x x x x x x x x x x x x x x xx x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x requestsInformationFrom -: hasPrivacyPreference; hasPurpose; subsPurpose~; hasPurpose~; hasPrivacyPreference~ EXPLANATION "Information can only be requested from a party with an equally or less strict purpose policy." possible occurrences allowed occurrences out of bound occurrences

Ampersand - screen

Solutions Compared AmpersandPurdue programming business processesderiving business processes from rules business logic in systems codingbusiness logic in rule base mathematical prove providedmathematical prove not provided more familiar to most IT staffless well known

Conclusions I  Ampersand method offers advantages in achieving compliance in IT business rules used directly to generate IT system all business logic in one place, easy to check correct implementation can be proven  Business ontologies enhance usability Ampersand easy to integrate with Ampersand / ADL help bridge gap between compliance- and business concepts allow combination of rule patterns / compliance patterns

Conclusions II  Advantages Ampersand method combined with business ontologies reach beyond compliance help get clarity about desired functionality less discussion about implementation issues increase IT developers productivity enhance flexibility

Further Research  Automated matching of business logic and (compliance) ruling, supported by business ontologies  Generating a ‘compliance certificate’ based on correct matching of compliance ruling and business concepts  Integrating Ampersand compliance- and business rule patterns to offer extended functionality in IT systems development

Master Thesis  Choose a subject you like, after all you are stuck with it! QUESTIONS?  Watch out for dependencies  Choose a subject which is doable in the time you want to spend  Combine with job or join existing research, take into account: Level of freedom Academic level Time efficiency  Say good bye to your friends and go for IT!