Copyright ©2001-2004 Norman Sadeh Semantic Web Technologies to Reconcile Privacy and Context Awareness Norman M. Sadeh ISRI- School of Computer Science.

Slides:



Advertisements
Similar presentations
Law Awareness in a Norm-regulated MAS Alberto Sardinha Gustavo Robichez de Carvalho Rodrigo Paes Pedro Cunha.
Advertisements

Norman Sadeh – Carnegie Mellon University – DAML PI Meeting- Feb. 13, 2002 DAML PI Meeting Status Briefing A Semantic Web Environment for Mobile Context-Aware.
Copyright 2006 Digital Enterprise Research Institute. All rights reserved. MarcOnt Initiative Tools for collaborative ontology development.
DELOS Highlights COSTANTINO THANOS ITALIAN NATIONAL RESEARCH COUNCIL.
The 20th International Conference on Software Engineering and Knowledge Engineering (SEKE2008) Department of Electrical and Computer Engineering
A Stepwise Modeling Approach for Individual Media Semantics Annett Mitschick, Klaus Meißner TU Dresden, Department of Computer Science, Multimedia Technology.
1 Distributed Agents for User-Friendly Access of Digital Libraries DAFFODIL Effective Support for Using Digital Libraries Norbert Fuhr University of Duisburg-Essen,
Knowledge Strategy & Leadership Intellectual Capital Management Organizational Culture and Communicaiton Collaboration and Community Building Knowledge.
Using the Semantic Web to Construct an Ontology- Based Repository for Software Patterns Scott Henninger Computer Science and Engineering University of.
1 Intelligent Agents Software analog to human agents real estate agent, librarian, salesperson Perform tasks individually, or in collaboration Static and.
A Context Framework for Ambient Intelligence. Context servers Motivation interoperable Machine processable Security & privacy.
A Semantic e-Wallet to Reconcile Privacy and Context Awareness Fabien L. Gandon & Norman M. Sadeh Mobile Commerce Lab. – Carnegie Mellon University.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Norman M. Sadeh ISR - School of Computer Science Carnegie Mellon University User-Controllable Security and Privacy.
AceMedia Personal content management in a mobile environment Jonathan Teh Motorola Labs.
ReQuest (Validating Semantic Searches) Norman Piedade de Noronha 16 th July, 2004.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
ORBIT NSF site visit - July 14, Location-based Services & data propagation in ORBIT Henning Schulzrinne Dept. of Computer Science.
Click to edit Present’s Name Trends in Location-based Services Muhammad Aamir Cheema.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Context-Aware Middleware for Anytime, Anywhere Social Networks Dario Bottazzi, Rebecca Montanari, and Alessandra Toninelli University of Bologna IEEE Intelligent.
1 10 THE INTERNET AND THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE.
Patterns for Location and Context-based access control
Tim Finin University of Maryland, Baltimore County 29 January 2013 Joint work with Anupam Joshi, Laura Zavala and our students SRI Social Media Workshop.
UMBC iConnect Audumbar Chormale, Dr. A. Joshi, Dr. T. Finin, Dr. Z. Segall.
General Requirements General requirements Theory of Use Design Concept Contextual Studies Task model Design space System specification ImplementationDeployment.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Delivering business value through Context Driven Content Management Karsten Fogh Ho-Lanng, CTO.
Portal Vision and Strategy. Table of Contents Problem statement Solution Sharepoint 2007 features Current Architecture Assessment New portal architecture.
Supporting Civil-Military Information Integration in Military Operations Other than War Paul Smart, Alistair Russell and Nigel Shadbolt
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Ontology Summit 2015 Track C Report-back Summit Synthesis Session 1, 19 Feb 2015.
Automated Assistant for Crisis Management Reflective Agent with Distributed Adaptive Reasoning RADAR.
Semantic Web and Policy Workshop Panel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management.
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Context Awareness: From Dream to Reality Norman M. Sadeh School of Computer Science Carnegie Mellon University Research Sponsors: DARPA/DAML, IBM, Boeing,
Creating a European entity Management Architecture for eGovernment CUB - corvinus.hu Id Réka Vas
SEMANTIC AGENT SYSTEMS Towards a Reference Architecture for Semantic Agent Systems Applied to Symposium Planning Usman Ali.
Mar del Plata, Argentina, 31 Aug – 1 Sep 2009 ITU-T Kaleidoscope 2009 Innovations for Digital Inclusion José Simões Fraunhofer Institute FOKUS
Exploitation of Semantic Web Technology in ERP Systems Amin Andjomshoaa, Shuaib Karim Ferial Shayeganfar, A Min Tjoa (andjomshoaa, skarim, ferial,
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
CoOL: A Context Ontology Language to Enable Contextual Interoperability Thomas Strang, Claudia Linnhoff-Popien, and Korbinian Frank German Aerospace Centor.
Application Ontology Manager for Hydra IST Ján Hreňo Martin Sarnovský Peter Kostelník TU Košice.
Computational Policies in a Need to Share Environment Tim Finin University of Maryland, Baltimore County SemGrail workshop, Redmond WA, 21 June 2007.
MDA & RM-ODP. Why? Warehouses, factories, and supply chains are examples of distributed systems that can be thought of in terms of objects They are all.
ShareNet Integrating Trust and Privacy policy Li Ding.
1/14/ :59 PM1/14/ :59 PM1/14/ :59 PM Research overview Koen Victor, 12/2007.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
CIMA and Semantic Interoperability for Networked Instruments and Sensors Donald F. (Rick) McMullen Pervasive Technology Labs at Indiana University
Selected Semantic Web UMBC CoBrA – Context Broker Architecture  Using OWL to define ontologies for context modeling and reasoning  Taking.
MTA SZTAKI Department of Distributed Systems Hogyan mixeljünk össze webszolgáltatásokat, ontológiákat és ágenseket? Micsik András.
1 Web Services for Semantic Interoperability and Integration Tim Finin University of Maryland, Baltimore County Dagstuhl, 20 September 2004
Versatile Information Systems, Inc International Semantic Web Conference An Application of Semantic Web Technologies to Situation.
Automated Assistant for Crisis Management (Reflective Agent with Distributed Adaptive Reasoning) RADAR.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Policy Systems Presented By: John Paul Dunning Usable Security – CS.
Dec 11, Analysis and Design of MLC Services using JADE (1) Oscar Lin.
Enabling Access Control and Privacy through Ontology Mohammad M. R. Chowdhury Dr. Josef Noll UniK - University Graduate Center, Norway Dr. Juan Miguel.
Mechanisms for Requirements Driven Component Selection and Design Automation 최경석.
AGENT SERVICES FRAMEWORK FOR HANDHELD DEVICES SUPERVISOR: DR MUHAMMAD ASLAM Domain: Artificial Intelligence(AI) Muhammad Ali (09-MS-CE-11),
A Context Framework for Ambient Intelligence
Introduction to the Semantic Web example applications
Adaptibility Patterns of Multi-Agent Organizations
System architecture, Def.
Presentation transcript:

Copyright © Norman Sadeh Semantic Web Technologies to Reconcile Privacy and Context Awareness Norman M. Sadeh ISRI- School of Computer Science Carnegie Mellon University Pittsburgh, PA - USA

Copyright © Norman Sadeh Mobility Challenge Can no longer assume the user’s undivided attention Can no longer assume the user’s undivided attention Time critical nature of many tasks Time critical nature of many tasks Limited input/output functionality Limited input/output functionality

Copyright © Norman Sadeh Context Awareness …All this argues for: …All this argues for:   Higher levels of automation   Context awareness   …True also in fixed Internet scenarios

Copyright © Norman Sadeh Sources of Contextual Information A user’s context information is distributed across a number of disparate resources A user’s context information is distributed across a number of disparate resources  Calendar  Location tracking  Address book  Buddy lists  Weather Available resources vary from one user to another Available resources vary from one user to another  …and over time  e.g. roaming across different networks

Copyright © Norman Sadeh Vision A growing collection of context-aware agents that users can buy or subscribe to A growing collection of context-aware agents that users can buy or subscribe to Personal resources modeled as Semantic Web services Personal resources modeled as Semantic Web services  Service profile Each user has a Semantic eWallet Each user has a Semantic eWallet  Automated identification and access of a user’s personal resources subject to privacy preferences

Copyright © Norman Sadeh Semantic Web Approach Ontologies to explicitly represent and reason about: Ontologies to explicitly represent and reason about:  Personal/Contextual Resources  Location tracking, calendar, organizational resources, messaging resources, preferences, etc.  Contextual attributes  e.g. location, calendar activities, social or organizational context, etc.  Preferences, incl. privacy preferences:  Access control preferences  “Obfuscation” rules  Web services  Automated service identification and access

Copyright © Norman Sadeh Personal Resource Ontology: An Example Personal Resource Activity Information Resource Location Information Resource List of Friends Sprint PCS Location Tracking CMU Location Tracking Microsoft Outlook Calendar IS-A INSTANCE

Copyright © Norman Sadeh MyCampus Project Motivation: Motivation:  Campus as “everyday life microcosm” Objective: Objective:  Enhance campus life through context-aware services accessible over the WLAN Methodology: Methodology:  Involve stakeholders in the design  Students and other members of the community  Evaluate and extrapolate to other environments  Mobile Commerce, Mobile Enterprise, etc.

Copyright © Norman Sadeh Overall Architecture Wireless LAN Calendar Location Tracking Internet and Intranet Semantic Web-enabled Services Task-Specific Agents e-Wallet User’s Personal Environment Social Context Preferences Semantic Web-enabled Context Resources Personal Resource Directory (incl. Privacy Pref.) Personal Resource Ontologies Contextual Ontologies Personal Preference Ontologies Service Ontologies Semantic Web Service Directory

Copyright © Norman Sadeh Semantic eWallet Context-independent knowledge Context-independent knowledge  Name, address, context-independent preferences Context-dependent knowledge Context-dependent knowledge  “When driving, I don’t want to receive instant messages” Service invocation rules Service invocation rules  Automated service identification and access  Map contextual attributes onto different resources (personal and public) Privacy rules Privacy rules  Access control rules  “Only my classmates can see my location”  Obfuscation rules  “My classmates can only see the building I am in but not the actual room”

Copyright © Norman Sadeh Location Tracking as Web Service Location Tracking as a Web Service

Copyright © Norman Sadeh e- Asserting elementary needs for authorized information Pre-check access rights Post-check access rights Fetch useful static knowledge Application of obfuscation rules Query context assertion Query Assertion of authorized knowledge Result Call relevant external services Example : Query from John inquiring about Mary’s location the sender of the query is John the sender of the query is John John’s query requires accessing Mary’s location John’s query requires accessing Mary’s location 1. Is John allowed to see Mary’s location given what we know about the context of the query? 2. Mary said she only allows colleagues to see her location when she is on campus 3. John is a colleague of Mary Access location tracking functionality or Mary’s calendar Access location tracking functionality or Mary’s calendar Is Mary on campus? Is Mary on campus? Mary is willing to disclose the building but not the room she is in Mary is willing to disclose the building but not the room she is in Mary is in Smith Hall Mary is in Smith Hall

Copyright © Norman Sadeh FIPA ACL messages and OWL Content JADE platform User Interaction Agent Directory Facilitator Agent (FIPA) Agent Management Agent (FIPA) e-Wallet Manager Agent Ontologist Agent Task-Specific Agents

Copyright © Norman Sadeh Directory Facilitator Agent (FIPA) Agent Management Agent (FIPA) FIPA ACL messages and OWL Content User Interaction Agent HTTP Request e-Wallet Manager Agent Ontologist Agent Task-Specific Agents JADE platform

Copyright © Norman Sadeh privacy query answer Design of an e-Wallet Three-layer architecture: security through typing Three-layer architecture: security through typing  Core knowledge: User static & context- sensitive knowledge  Service Layer: Automatic identification and invocation of external sources of knowledge (e.g. public web services and and personal resources)  Privacy layer: Enforces privacy rules access control & obfuscation All facts represented in OWL All facts represented in OWL Backward chaining migration rules: privacy rules, service rules, static migration rules Backward chaining migration rules: privacy rules, service rules, static migration rules service Core Know- ledge

Copyright © Norman Sadeh privacy query answer e- Design of an e-Wallet Three-layer architecture: security through typing Three-layer architecture: security through typing  Core knowledge: user static & context- sensitive knowledge  Service Layer: automatic identification and invocation of personal and public semantic web services  Privacy layer: enforces privacy rules access control obfuscation rules Asserting elementary needs for authorized information Pre-check access rights Post-check access rights Fetch useful static knowledge Application of obfuscation rules Query context assertion Query Assertion of authorized knowledge Result Call relevant external services service Core Know- ledge

Copyright © Norman Sadeh Implementation Details OWL Meta-model in CLIPS OWL Meta-model in CLIPS Ontology in OWL Ontology in OWL Annotation in OWL Annotation in OWL Rule in (R)OWL Rule in (R)OWL Services in (W)OWL Services in (W)OWL Privacy in (S)OWL Privacy in (S)OWL Query in (Q)OWL Query in (Q)OWL Ontology stylesheet Ontology stylesheet & Annotation stylesheet Annotation stylesheet & Rule stylesheet Rule stylesheet & Service stylesheet Service stylesheet & Privacy stylesheet Privacy stylesheet & Query stylesheet Query stylesheet & Ontology in CLIPS Ontology in CLIPS Annotation in CLIPS Annotation in CLIPS Rule in CLIPS Rule in CLIPS Service rule in CLIPS Service rule in CLIPS Privacy rule in CLIPS Privacy rule in CLIPS Query rules in CLIPS Query rules in CLIPS XSLT Engine Result in OWL Result in OWL JESS

Copyright © Norman Sadeh Visualizing & Editing Preferences Visualizing & editing a privacy rule

Copyright © Norman Sadeh Editing Based on Existing Ontologies

Copyright © Norman Sadeh Obfuscation Example User location finder User location finder City block level City level level

Copyright © Norman Sadeh Slide Projector Agent

Copyright © Norman Sadeh Empirical Evaluation Initial prototype working on Carnegie Mellon’s campus Initial prototype working on Carnegie Mellon’s campus  Restaurant concierge agent, message filtering agent, etc.  Integration with calendar, location tracking, user profile, etc. Evaluation Evaluation  Context awareness adds value  Requires access to a broad range of resources/attributes  Privacy concerns have to be addressed Additional validation on context-aware enterprise and DoD applications Additional validation on context-aware enterprise and DoD applications

Copyright © Norman Sadeh Concluding Remarks Context awareness helps overcome the limitations of mobile devices and the time criticality of mobile scenarios Context awareness helps overcome the limitations of mobile devices and the time criticality of mobile scenarios Context awareness makes privacy even more critical Context awareness makes privacy even more critical Our experiments indicate that user preferences are often complex Our experiments indicate that user preferences are often complex  Incl. context-sensitive preferences Capturing these preferences is far from trivial Capturing these preferences is far from trivial  Default profiles, learning, dialogs,  How far can we go? Semantic Web approach Semantic Web approach  Allows for policies that refer to concepts introduced in any number of domain-specific ontologies Opportunities for reconciliation with P3P/APPEL Opportunities for reconciliation with P3P/APPEL

Copyright © Norman Sadeh Q&A Source: 4_9/odlyzko/index.html