120 likes | 126 Views
This presentation discusses the challenges of enforcing context-sensitive privacy and security policies in various scenarios such as pervasive computing, enterprise collaboration, and homeland security. It introduces a semantic web approach to model and specify these policies and explores the architecture of a policy enforcing agent.
E N D
Semantic Web and Policy WorkshopPanel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management Laboratory Director, Mobile Commerce Laboratory Co-Director, COS PhD Program
Policies Are Everywhere • B2B contracts • e.g. quantity flexible contracts, late delivery penalties, etc. • Negotiation • e.g. rules associated with auction mechanisms • Security • e.g. access control policies • Privacy • Information Collection Policies (aka “ P3P Privacy Policies”) • Obfuscation Policies • Workflow management • What to do under different sets of conditions • Context aware computing • What service to invoke to access a particular contextual attribute • Context-sensitive preferences 2005 AAAI Fall Symposium- Slide 2
Context-Sensitive Privacy & Security Policies • Pervasive Computing • “My colleagues can only see the building I am in and only when they are on company premises” • Enterprise Collaboration • “Only disclose inventory levels to customers with past due shipments” • DoD Scenarios (e.g. coalition forces) • “Only disclose ship departure time after the ship has left” • “Only disclose information specific to the context of ongoing joint operations” • Homeland Security & Privacy (e.g. video surveillance) • “Only allow for facial recognition when a crime scene is suspected” 2005 AAAI Fall Symposium- Slide 3
Challenges in Enforcing Context-Sensitive Policies • Sources of contextual information: • May not be known ahead of time • May change from one entity to another • May change over time • Examples: • Different sources of location information depending on who & where the subject is • Different sources of information to determine when supplies will arrive, depending on who the supplier is and the particular mode of transportation 2005 AAAI Fall Symposium- Slide 4
Pervasive Computing Instantiation: MyCampus Each entity has its own set of policies & policy evaluation agents 2005 AAAI Fall Symposium- Slide 5
Semantic Web Approach • Interleave reasoning about policies with the dynamic identification of sources of contextual information • Both explicit delegation & dynamic discovery • Sources of contextual information modeled as Semantic Web Services • Service profiles & context-sensitive policies refer to shared ontologies 2005 AAAI Fall Symposium- Slide 6
Specifying Context-Sensitive Policies 2005 AAAI Fall Symposium- Slide 7
-Is Mary allowed to ask this? -Is there a service to find Bob’s current location? Bob 4 Mary What room is Mary in? Mary’s User Agent 1 Personal Service Directory Service Which building is Bob in right now? 3 Company XYZ 2 Is Bob on Mary’s team today? Personal Agent Directory Service Privacy Agents What is the street address for Bob’s current location? Information Disclosure Agent 5 Only people on my team can see the room I am in and only when we are in the same building Task-Specific Agents Cell Phone Operator Policy Repository Service Notification Agent Public Agent Directory Service Public Service Directory Service White Pages Directory Service Motivating Scenario 2005 AAAI Fall Symposium- Slide 8
Meta-Model for Query Processing • Monitoring query processing progress • Including satisfaction of relevant policies • Meta-model information: • Whether/which policy elements have (not) been verified • What facts are still missing • To verify relevant policies/answer the query • What sources of information are available • Local vs. external, whether they have been identified, whether queries have been submitted and answers received • Etc. 2005 AAAI Fall Symposium- Slide 9
Policy Enforcing Agent: Architecture 2005 AAAI Fall Symposium- Slide 10
So, Where Do We Start? • Usability Challenges • “Low Hanging Fruits” • B2B • Easier to invest time in specifying policies • Virtual Enterprise scenarios • Contracting, security, workflow management, pricing, and plenty of other corporate policies • Open Mobile & Pervasive Computing • There’s no other way • Roaming, complexity of Mobile Internet value chain, etc. • Challenges: • Moving away from highly scripted trust management protocols, usability challenges, expressiveness & computational tradeoffs, etc. 2005 AAAI Fall Symposium- Slide 11
Q&A 2005 AAAI Fall Symposium- Slide 12