Computational Policies in a Need to Share Environment Tim Finin University of Maryland, Baltimore County SemGrail workshop, Redmond WA, 21 June 2007.

Slides:



Advertisements
Similar presentations
ROWLBAC – Representing Role Based Access Control in OWL
Advertisements

International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences Paul Smart, Ali.
Policy based Cloud Services on a VCL platform Karuna P Joshi, Yelena Yesha, Tim Finin, Anupam Joshi University of Maryland, Baltimore County.
Policy Description & Enforcement Languages Anis Yousefi
SmartER Semantic Cloud Sevices Karuna P Joshi University of Maryland, Baltimore County Advisors: Dr. Tim Finin, Dr. Yelena Yesha.
Pranam Kolari – Policy 2005 Enhancing Web Privacy Protection Through Declarative Policies Pranam Kolari 1 Li Ding 1, Lalana Kagal 2, Shashi Ganjugunte.
1 Department of Computer Science and Engineering, University of South Carolina Issues for Discussion and Work Jan 2007  Choose meeting time.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
From SHIQ and RDF to OWL: The Making of a Web Ontology Language
ICAICT202A - Work and communicate effectively in an IT environment
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
1 of 30 Declarative Policies for Describing Web Service Capabilities and Constraints Lalana Kagal Tim Finin Anupam Joshi University of Maryland Baltimore.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Semantics for Big Data (,) Security and Privacy Tim Finin and Anupam Joshi University of Maryland, Baltimore County Baltimore MD NSF Workshop on Big Data.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
1 1 Interoperating: MIT’s Fusion Center Prototype & JHU/APL’s Back End Attribute Exchange (Identity Management Testbed) January 2013.
Anupam Joshi and Tim Finin Ebiquity UMBC
Pranam Kolari – Policy 2005 Enhancing Web Privacy Protection Through Declarative Policies Pranam Kolari 1 Li Ding 1, Lalana Kagal 2, Shashi Ganjugunte.
Intelligent Agents Meet the Semantic Web in Smart Spaces Harry Chen,Tim Finin, Anupam Joshi, and Lalana Kagal University of Maryland, Baltimore County.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications Harry Chen, Filip Perich, Tim Finin, Anupam Joshi Department of Computer Science & Electrical.
Tim Finin University of Maryland, Baltimore County 29 January 2013 Joint work with Anupam Joshi, Laura Zavala and our students SRI Social Media Workshop.
UMBC iConnect Audumbar Chormale, Dr. A. Joshi, Dr. T. Finin, Dr. Z. Segall.
1 Virtualisation and Validation of Smart City Data Dr Sefki Kolozali Institute for Communication Systems Electronic Engineering Department University of.
Emerging Semantic Web Commercialization Opportunities Ken Baclawski Northeastern University.
1 DataSpace MIT Decentralized Information Group Tim Berners-LeeDanny Weitzner Lalana KagalGerry Sussman Hal Abelson Visitors: Joe Pato (HP)Latanya Sweeney.
Modeling  Conversation  Policies using Permissions  and  Obligations Lalana Kagal and Tim Finin University of Maryland, Baltimore County AAMAS Workshop.
Ontology-based and Rule-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments The Semantic Web and Policy Workshop – ISWC.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Ontology Summit 2015 Track C Report-back Summit Synthesis Session 1, 19 Feb 2015.
Samad Paydar Web Technology Lab. Ferdowsi University of Mashhad 10 th August 2011.
Rei and Rules Tim Finin, UMBC Lalana Kagal, MIT Tim Finin, UMBC Lalana Kagal, MIT.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check This work by Oshani.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check for a license violation.
Semantic Web and Policy Workshop Panel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management.
Nigel Koay, Pavandeep Kataria, and Radmilla Juric, Dipl.-Ing. University of Westminster, London, United Kingdom Telemedicine and e-Health.
Advanced Decision Architectures Collaborative Technology Alliance Regulating the Exchange of Tactical Information Using the KAoS Policy Services Framework.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
©Ferenc Vajda 1 Semantic Grid Ferenc Vajda Computer and Automation Research Institute Hungarian Academy of Sciences.
Using Several Ontologies for Describing Audio-Visual Documents: A Case Study in the Medical Domain Sunday 29 th of May, 2005 Antoine Isaac 1 & Raphaël.
The world of autonomous reconfigurable systems Intelligent Interactive Distributed Systems Group Vrije Universiteit Amsterdam /
A Policy Based Approach to Security for the Semantic Web Lalana Kagal, Tim Finin and Anupam Joshi.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Semantic Clipboard User Interface is integrated in the Browser Architecture of the Semantic Clipboard Illustration of a license incompliant content reuse.
Ontology Mapping in Pervasive Computing Environment C.Y. Kong, C.L. Wang, F.C.M. Lau The University of Hong Kong.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
Temporal Ontology Shervin Daneshpajouh ce.sharif.edu/~daneshpajouh.
Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes.
1/14/ :59 PM1/14/ :59 PM1/14/ :59 PM Research overview Koen Victor, 12/2007.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
1 Nov. 2, 2005 Design and Application of Rule Based Access Control Policies Huiying Li, Xiang Zhang, Honghan Wu & Yuzhong Qu Dept. Computer.
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
CIMA and Semantic Interoperability for Networked Instruments and Sensors Donald F. (Rick) McMullen Pervasive Technology Labs at Indiana University
Selected Semantic Web UMBC CoBrA – Context Broker Architecture  Using OWL to define ontologies for context modeling and reasoning  Taking.
1 Web Services for Semantic Interoperability and Integration Tim Finin University of Maryland, Baltimore County Dagstuhl, 20 September 2004
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. SOA-RM Overview and relation with SEE Adrian Mocan
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Scaling the Wall: Experiences adapting a Semantic Web application to utilize social networks on mobile devices Evan W. Patton 1 ( ) &
OPM/S: Semantic Engineering of Web Services
Data and Applications Security Developments and Directions
Policy based Cloud Services on a VCL platform
Pervasive Computing Happening?
Policy reasoning A policy is a set of norms that define optimal behavior of agents in a system What does policy reasoning usually entail ? Proving that.
Service-Oriented Computing: Semantics, Processes, Agents
AT2AI-4 Fourth International Symposium "From Agent Theory to Agent Implementation" An Ontological Approach to Harmonising Security Models for Open Services.
Data and Applications Security Developments and Directions
Presentation transcript:

Computational Policies in a Need to Share Environment Tim Finin University of Maryland, Baltimore County SemGrail workshop, Redmond WA, 21 June 2007

Introduction Comments on the role of and require- ments for computational policies in today’s environment –Web, 9/11, pervasive computing, … Ideas in development in collaboration with colleagues from UT Dallas, GMU, and MIT

Background We’ve been working on computational policies since about 1999 –Started with XML encoded horn clauses for supply chain mgmt & pervasive computing Moved policy research to the Semantic Web in ~2002 –Lalana Kagal developed Rei in her dissertation Applications have varied –Also enhanced P3P, service matching and selection, collaborative teams, RDF store access, and distributed router configuration.

Policy-based Automated Wide-Area Network Configuration and Management Goal: self configuring network routers running in a coalition envi- ronment demonstrating constraints on border gateway protocol

General approach A computational policy describes a system’s actions or behavior “Describes” can be –Specifies: whenever X, do Y –Constrains: doing X is permitted –Advises: whenever X, doing Y is preferred to doing Z Public policies and common policies foster interoperability and cooperation

Some lessons learned Most of the work in developing a policy is in developing the domain ontology –Often the constraints are simple, e.g., “For faculty use only” Sharing policies means sharing domain models –The Semantic Web offers a sound and practical approach for shared domain models

Some lessons learned Several approaches to encoded the rules or constraints part of policies –Descriptions of permitted, forbidden and obliged classes of actions (KAOS) –Using rule extensions to RDF (Rei, Rein) Some approaches are problematic –E.g., uncertainty, probabilities, defaults But OWL can do the heavy lifting in reasoning about the terms –Is Mary a full-time faculty member from a higher- educational institution? What’s the evidence?

New Requirements 9/11 and related events illustrated problems in how sensitive information is managed Managing information and services on the Web with appropriate security and privacy and simplicity is increasingly important and challenging Autonomous devices like mobile phones, routers and medical equipment need access too.

Need to Know, Need to Share Traditional information security frame- works are based on “need to know” Unless you can prove that you have a pre- arranged right to this information, you can’t have it The 9/11 commission recommended moving from this to “need to share” I think this information may be important for you to accomplish your mission and would like to share it with you

Need to Know, Need to Share Traditional information security frame- works are based on “need to know” Unless you can prove that you have a pre- arranged right to access this information, you can’t have it The 9/11 commission recommended moving from this to “need to share” I think this information may be important for you to accomplish your mission and would like to share it with you

Just a slogan? For “need to share” to be more than just a political slogan, we need to under- stand what it might mean technically … and to explore its feasibility and desirability … and the risks and benefits

Required Capabilities Semantic Interoperability Unknown principals Context Speech acts and negotiation Adjustable privacy Usage control, enforcement, accountability Explanations and provenance Ramifications

Semantic Interoperability Having a shared policy requires that the parties agree on –The semantics of the policy language (e.g., is everything not explicitly forbidden allowed?) –The semantics of the domain ontology (e.g., who’s a faculty member?) The Semantic Web is a big win here.

Unknown Principles Standard access control is based on authentication –I have a list of who can do what. Just prove to me which of these people you are In open environments (Web, pervasive computing) this won’t work We can control access based on their their (provable) attributes –Prove you’re a current UMBC student to use the printer

Context What’s forbidden in a normal situation may be allowed in a life-threatening emergency Context descriptions (e.g., tags) can identify the current situation Policy rules can be conditioned by context –E.g., as guards on rules or by enabling/ disabling policy modules

Adjustable privacy One way to enforce privacy is to not divulge information Another is to provide general answers Where’s John? –[ , ] –In Redmond –In Washington state –On travel Policies can control the granularity of answers given to different queries

Usage control and accountability Enforcing policies can be a difficult issue in open, distributed systems MIT’s policy aware approach is exploring accountability for use –Policy violations can be detected in logs There’s lots more to usage constraints –E.g., DRM policies constrain how often you can perform certain operations on an object Systems need to reason about there own behavior as well as that of others

Explanations and provenance Explaining why a policy decision holds or doesn’t hold can be important –Explaining why a constraint does not hold continues to be a difficult task The explanation may involve provenance, citing the source for the facts and policy constraints used

Utility and Ramifications In some environments, the utility of data may be a factor in whether to share or not –This requires reasoning about the requestor’s tasks, the data’s relevance to them and the availability of alternate data This may also require Bayesian reasoning –What’s the likelihood that the patient might have diabetes? In general, a system might reason about the risks and benefits of sharing vs.. not sharing the data

Planned Architecture Policy Engine OWL Reasoner Utility Reasoner Policy Ontology Util Ont Bayes Ont Domain Ontology OWL Policy Rules Instance Data RDF SPARQL

Conclusion Managing information in open, distributed environments with appropriate security and privacy is increasingly important Computational policies can help Semantic Web technologies offer a way to share common policy concepts, policies, and domain models Other representation and reasoning compo- nents will be needed for many application domains.