Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam

Slides:



Advertisements
Similar presentations
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Advertisements

Automatic Trust Negotiation 1Dennis Kafura – CS5204 – Operating Systems.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Semantic Web Policies - A Discussion of Requirements and Research Issues SHIVARAMAN RAGHURAMAN SHIVARAMAN RAGHURAMAN MUKESH SUSILKUMAR MUKESH SUSILKUMAR.
Using Multi-Encryption to Provide Secure and Controlled Access to XML Documents Tomasz Müldner, Jodrey School of Computer Science, Acadia University, Wolfville,
A Content Protection Scheme Using MPEG-21 Concepts and Tools Chia-Hsien Lu Feng-Cheng Chang Hsueh-Ming Hang Dept. Electronics Engineering National Chiao.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy and Trust Frameworks/Systems Presented by Zalia Shams Usable Security –
A Review of Trust Management, Security and Privacy Policy Languages Juri Luca De Coi L3S Research Center & Hannover University A Review of Trust Management,
Responding to Policies at Runtime in TrustBuilder Bryan Smith, Kent E. Seamons, and Michael D. Jones Computer Science Department Brigham Young University.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Using Digital Credentials On The World-Wide Web M. Winslett.
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke L3S Research.
Software Design by Dr. Eitan Hadar Web:
C++ for Engineers and Scientists Third Edition
Persistent Identifiers Service WATER FOR A HEALTHY COUNTRY FLAGSHIP SISS Workshop v2.3 Pavel Golodoniuc | Computer scientist 7 May 2013.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Computer Architecture Computational Models Ola Flygt V ä xj ö University
Notes for Chapter 12 Logic Programming The AI War Basic Concepts of Logic Programming Prolog Review questions.
Usability Studies Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech.
TRUST NEGOTIATION IN ONLINE BUSINESS TRANSACTIONS BY CHANDRAKANTH REDDY.
Demonstration of the Software Prototypes PRIME PROJECT 17 December 2004.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Draft-qi-i2nsf-access-network- usecase-00 Author: Minpeng Qi, Xiaojun Zhuang.
1 Chapter 4: Selection Structures. In this chapter, you will learn about: – Selection criteria – The if-else statement – Nested if statements – The switch.
AMPol-Q: Adaptive Middleware Policy to support QoS Raja Afandi, Jianqing Zhang, Carl A. Gunter Computer Science Department, University of Illinois Urbana-Champaign.
CS CS Computing for Business Instructor:David Tucker GTA:Batul Mirza.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: David Shelly Usable Security – CS 6204 – Fall,
Computer Science 5204 Operating Systems Fall, 2011 Dr. Dennis Kafura Course Overview 1.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Logical Agents Logic Propositional Logic Summary
Architecture and Design of Customer Support System using Microsoft.NET technologies Nikolay Pavlov Asen Rahnev.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
Page 1 of ?? Wireless Industry Congress 2003 NCAC Workshop (Ottawa) © Ramiro Liscano 2005 Context-based Coalition Access Control for Spontaneous Networking.
22/01/2004Daniel Olmedilla1 INTEGRATING PROLOG IN TRUST NEGOTIATION Software Project / Summer Semester /04/2004 Daniel Olmedilla L3S / University.
SEMANTIC AGENT SYSTEMS Towards a Reference Architecture for Semantic Agent Systems Applied to Symposium Planning Usman Ali.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
1 Access Control Policies: Modeling and Validation Luigi Logrippo & Mahdi Mankai Université du Québec en Outaouais.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Smart, Secure and Sustainable Home: A Socio-Technological Perspective Aleksandr.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: Matthew Dunlop Usable Security – CS 6204 –
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
Chapter 3 AS3 Programming. Introduction Algorithms + data structure =programs Why this formula relevant to application programs created in flash? The.
1 Token–based Dynamic Trust Establishment for Web Services Zhengping Wu and Alfred C. Weaver Department of Computer Science University of Virginia March.
1 Authorization Sec PAL: A Decentralized Authorization Language.
Computer Science 5204 Operating Systems Fall, 2012 Dr. Dennis Kafura Course Overview 1.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Policy Systems Presented By: John Paul Dunning Usable Security – CS.
Trust Profiling for Adaptive Trust Negotiation
Kent Seamons Brigham Young University Marianne Winslett, Ting Yu
Knowledge Representation and Reasoning
Policy Adaptation and Exchange in Trust Negotiation
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Computer Science 5204 Operating Systems Fall, 2010
Computer Science 5204 Operating Systems Fall, 2010
NAAS 2.0 Features and Enhancements
Public Key Infrastructure from the Most Trusted Name in e-Security
Reactive Policies for the Semantic Web*
Back to “Serious” Topics…
Social Navigation as a Model for Usable Security
A Distributed Tabling Algorithm for Rule Based Policy Systems
Protecting Privacy During On-line Trust Negotiation
Policy Language Requirements for Trust Negotiation
Presentation transcript:

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Quick Facts of Logic /Deductive Language. Predicates: p and q  True, False Is p OR q  ⇔ NOT( (NOT p) AND (NOT q)) ?  Yes!  With “logical NOT” and “logical AND” You can make any logic statement. Positive Rules or Horn clause.  No NOT Statement  Only “Logical AND” Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Demo of PROTUNE hannover.de:9080/policyFramework/protune/de mo.html

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech No Registration Needed: How to use Declarative Policies an Negotiation to access Sensitive Resources on the Semantic Web. Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons Marianne Winslett

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Overview Problem Solution Trust Negotiation Guarded Distributed Logic Programs “PeerTrust” execution environment. Application Scenario.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Problems In Web Resource Access  Registration, Login/Password No Automation Trust based on Shared Information of Service  One Way of Trust. Two Way Trust / Conditional Disclosure. Multiple Levels of Trust. Validity of Information, No Standards.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Proposal/Solution: Policy based access control. Automated Trust negotiation.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Trust Negotiation Digital Credentials.  Credential Issuer X.509 certificates Anonymous credentials/ Zero Knowledge  Simplest Form. Signed XML statements.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Trust Negotiation Vs Traditional Trust Mutual Trust with Digital credentials. Resources protected by ACL  Includes Services, Roles, Credentials. Policies, Capabilities. Equivalent Peer to Peer Trust.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Goal Resource “R” and Credentials “C”. R  C 1 AND C 2 …. AND C k

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech PeerTrust Guarded Distributed Logic Program PeerTrust Logic Program Distributed Logic Program Guarded Logic Program

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech PeerTrust Logic Program Its Horn’s Clause. No Negative Rules.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Distributed Logic Program References to Other Peers.  Issuer argument Delegation of the Rule Evaluation to the Peer/Third Party. ( Like RPC – Remote Procedure Call) Nested References ( Like Nested RPC). Attached to Evaluation part of String.  Requester argument Nested References. Attached to Result Part of String.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Distributed Logic Program Local Rules  ACL rules  Party specific rules  Cached rules  (Needs Signed Rules) Signed Rules  Rules can be signed.  Reference Rules Should/Must be signed.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Guarded Logic Guards  Precedence Order of Rules  In Parallel Logic Programming Systems. Public and Private Predicates  Object Oriented Rules.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Execution Environment Dynamic Policy for each resource.  Act on Meta-Data Security Infrastructure.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Conclusion The problem of explicit registration is solved. Guarded Distributed Logic Programs is Developed.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech A Flexible Policy-Driven Trust Negotiation Model. De Coi, J. L. and Olmedilla, D.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Overview Problem Negotiation Requirements Negotiation Model Conclusion

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Problem Numerous Trust Negotiation Software  Dissimilar Features  Dissimilar scenarios Need for a Generic Model.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Negotiation Requirements Negotiation Actors + External Actions + Notifications +Local Actions + Action Selection Function + Policy Policy Filtering - Termination Algorithm - Explanation -

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Negotiation Model Policy  Set of Rules  No Negation applied to any predicate Negotiation Message  Policy  Notifications Negotiation History  To provide an explanation.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Negotiation Model Negotiation State Machine  To identify the next steps. Bilateral Negotiation  No Empty Negotiations. Empty = No New Info.  Monotonic : Any Other Rules added will not change from False to True..

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Conclusion Summarized the Main features any Trust Negotiation Software Should follow.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Discussion Semi Automatic Negotiations?  Users Will Have Better Control But It will be visible to user and How easy would be the Usability? No Usability Tests done?  What could be the possible Usability tests?

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech THANK YOU