260 likes | 276 Views
Explore the use of conceptual structures and inference engines for security constraint processing in data and applications. Learn about the inference problem and its application in various domains.
E N D
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Inference Problem - II September 24, 2010
Outline • Security Constraint Processing • Use of Conceptual Structures
Security Constraint Processing • Security Constraints are rules that assign security levels to the data • MLS/DBMS is augmented with an Inference Engine • Inference Engine is the Inference Controller • Integrated Architecture for Security Constraint processing • Query, Update and Database design operations
Use of Conceptual Structures • Use conceptual structures to model the application • E.g., semantic data models, semantic nets, conceptual graphs, etc. • Use the reasoning strategy of the conceptual structure and determine if security violation via inference can occur
Complex Multilevel Semantic Net Italy Destination 20 years India Mediterranean Sea Skills Location REAGAN Smith Captain Date 16 June 2000 Skills Carries SUN Explosive Battle Passengers Management Type
AKO AKO AKO AKO WATER WATER SHIPS SHIP SHIP SHIPS VEHICLE VEHICLE WEAPONS WEAPONS VEHICLE VEHICLE (a) (a) AKO AKO AKO AKO Has Captain Has Captain WATER WATER SHIPS SHIP SHIP SHIPS VEHICLE VEHICLE WEAPONS WEAPONS PERSON PERSON (b) (b) Has Captain Has Captain ISA AKO REAGAN SHIPS SHIP WATER WEAPONS VEHICLE (c) ISA Example Rules - II
ISA ISA Has Captain Has Captain SHIP SHIP SHIPS SHIPS REAGAN REAGAN WEAPONS WEAPONS PERSON PERSON (d) (d) Has Captain Has Captain Destination ISA India SHIPS REAGAN WEAPONS COUNTRY (e) Destination Example Rules - II
Applying Transfer Rules India Destination Mediterranean Sea India Mediterranean Sea (b) Location REAGAN Location REAGAN Smith Carries (a) Carries Skills Type SUN Explosive Type Battle SUN Explosive Management Destination India Mediterranean Sea Location REAGAN Smith (c) Combines (a) and (b) Carries Skills Type Battle SUN Explosive Management
Security Constraints Carries Carries SHIPS SHIPS REAGAN REAGAN WEAPONS SUN SUN WEAPONS (a) (a) Mediterranean Mediterranean Location Carries Carries SHIPS SHIPS REAGAN REAGAN SUN SUN (b) (b) Destination Destination COUNTRY COUNTRY
Matching and Binding India Destination Location Mediterranean SHIP: ALL X (a) Destination Carries New Delhi India Mediterranean Sea Explosive WEAPONS: SOME Y Destination Capital Capital Type Location REAGAN Smith Captain (b) FLORIDA FLORIDA New Delhi India Skills Mediterranean Sea Destination Carries Carries Capital Carries Battle Location SUN Explosive MOON MOON REAGAN Management Smith Type Type Captain Type FLORIDA Skills Carries (c ) Results from (a) and (b) (c ) Results from (a) and (b) Carries Battle SUN Explosive MOON Management Type Type
Refutation LOCATION FLORIDA REAGAN SHIPS SHIPS WEAPONS REAGAN Pacific Ocean WEAPONS DESTINATION DESTINATION (a) (b) Australia Australia WEAPONS WEAPONS FLORIDA FLORIDA REAGAN REAGAN WEAPONS WEAPONS SHIPS SHIPS DESTINATION REAGAN SHIPS Australia WEAPONS LOCATION DESTINATION X X Pacific Ocean Pacific Ocean (c ) Australia Australia WEAPONS WEAPONS (d) FLORIDA SHIPS WEAPONS REAGAN LOCATION DESTINATION Australia Pacific Ocean WEAPONS WEAPONS (e)
Directions • Inference problem is still being investigated • Census bureau still working on statistical databases • Need to find real world examples in the Military world • Inference problem with respect to medial records • Much of the focus is now on the Privacy problem • Privacy problem can be regarded to be a special case of the inference problem