SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
SWRL-Based Access
Policies for Linked Data
 Hannes Mühleisen, Martin Kost and Johann-Christoph Freytag

             Databases and Information Systems
             Department of Computer Science
              Humboldt-Universität zu Berlin
“Social Web”




  What about the system operator?

        2
Overview

1. Linked Data principles (short)
2. Access policies / data classification
3. “Policy enabled Linked Data Server” concept
4. PeLDS implementation and evaluation



                       3
Linked Data: URLs as identifiers / dereferencing

                                      ex:spouse
                http://
            example.com/bob                            http://
                                                  example.com/alice
                    ex:name       ex:phone




                                                                HTTP Req.
        “Bob Ross”            “+4930123456”



 http://example.com/bob


                                                           “42° 21′ 32″ N            “Alice Ross”
                                                            71° 5′ 34″ W”
Legende                                                                     ex:pos    ex:name

          Resource
                                                                         http://
 asdf     Property                                                  example.com/alice
  “a”     Literal

          Graph                                           http://example.com/alice
                                                    4
Access Policies
•   Set of rules, its evaluation determines whether
    a user can access certain information
•   Different types: DAC, MAC, RbAC
    •   Generic system should support many types

•   Data classification required
    •   Linked Data: classify protected parts of a graph

    •   Different levels of classification conceivable:
        syntax, model, concepts


                                 5
Model-based Classification

•   Data classification on a structure-preserving
    decomposition of the graph (set of triples)
•   Resource, property and value of triples can be
    specified, wildcards select unknown entries.
•   Example:
                           http://
                                         ex:name
                                                   “Bob Ross”
                       example.com/bob



Resource == http://example.com/bob
Property == ex:name
Value == *


                             6
Concept-based Classification

• Data classification on a structure of concepts
  and properties
• Resources and their properties can be
  classified using their affiliation with a concept
• Example:                 http://
                                            ex:name
                                                        “Bob Ross”
                       example.com/bob

                                    rdf:type             http://
                                                      example.com/
                                                       per#Person
 Concept == http://example.com/per#Person


                              7
Concept
  Policy enabled Linked Data Server


• Policy language PsSF
• Policy evaluation algorithms
• Data and policy management operations
• Secure authentication

                    8
Policy Language PsSF
• Description Logic (DL) expressions based
  on the Semantic Web Rule Language
  (SWRL)
• Prolog-style syntax for concise notation
• Additional predicates for model- and
  concept-based data classification:
  •   permit_triple(...), permit_instance(...)


                                9
PsSF Policy Language: Example



      BobPosRule:
      QueryAction(?action) &&
      	 actor(?action, http://example.com/bob)
      =>
      permit_triple(http://example.com/alice,ex:pos,*);




                  “42° 21′ 32″ N        “Alice Ross”
                   71° 5′ 34″ W”
                              ex:pos     ex:name


                              http://
                         example.com/alice



                                   10
Policy evaluation - Query
• For each rule contained in the policy, check
  whether their preconditions are met
• Approve graph elements classified by
  matching rules by adding them to a
  temporary RDF graph for the current user
  only containing authorized graph elements
• Evaluate queries or dereferencing requests
  exclusively on those temporary graphs

                      11
sp
           sp       A
                                         H                   *         ✔
 H                        wp                      nm

      ps
                                Z
                                         *                   *         ✔
                W
nm                                                                Rule 1
     “Bob”                                             Access Policy
                                                                           Step 1
                Secured Graph
                                                        sp         A

                                              H
                                                       nm
           nm
 H                  *      ?                                     “Bob”


                        Query                 Temporary Graph
                                                                           Step 2

                                         nm
                                    R1             “Bob”



                                    12
                                          Query Result
Required Operations

• Definition & modification of access policies
• Publication & modification of RDF graphs
• Querying RDF graphs
• URL dereferencing

                     13
Authentication
• Username/password-combinations are
  unpractical for Linked Data
• Central authority would violate the
  decentralization principle inherent in the
  WWW
• FOAF+SSL enables password-free
  authentication based on SSL certificates

                     14
PeLDS Implementation

• Linked-Data-Server with HTTP API
• Supports PsSF policy language
• FOAF+SSL for user authentication
• Demo: Distributed Address Book

                   15
Demo Application: Distributed Address Book

                                         Bob’s View




                                        Alice’s View




                        16
PeLDS prototype - Performance
                       50
                                   PeLDS                           R! = 0,9943
                                   Joseki / TDB
                                   Joseki / TDB / Pellet
                      37,5
Processing time (s)




                       25
                                                                    R! = 0,9959


                      12,5




                             450      1462,5          2475       3487,5          4500
                                                  Triple count
                                                                                        17
Conclusion

• Access policies and comprehensive data
  classifications are possible for Linked Data
• PeLDS enables distributed applications with
  support for access policies
• PeLDS-Implementation is available as open
  source software from www.pelds.org


                     18
SWRL-based Access Policies for Linked Data

Weitere ähnliche Inhalte

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Empfohlen

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

SWRL-based Access Policies for Linked Data

  • 1. SWRL-Based Access Policies for Linked Data Hannes Mühleisen, Martin Kost and Johann-Christoph Freytag Databases and Information Systems Department of Computer Science Humboldt-Universität zu Berlin
  • 2. “Social Web” What about the system operator? 2
  • 3. Overview 1. Linked Data principles (short) 2. Access policies / data classification 3. “Policy enabled Linked Data Server” concept 4. PeLDS implementation and evaluation 3
  • 4. Linked Data: URLs as identifiers / dereferencing ex:spouse http:// example.com/bob http:// example.com/alice ex:name ex:phone HTTP Req. “Bob Ross” “+4930123456” http://example.com/bob “42° 21′ 32″ N “Alice Ross” 71° 5′ 34″ W” Legende ex:pos ex:name Resource http:// asdf Property example.com/alice “a” Literal Graph http://example.com/alice 4
  • 5. Access Policies • Set of rules, its evaluation determines whether a user can access certain information • Different types: DAC, MAC, RbAC • Generic system should support many types • Data classification required • Linked Data: classify protected parts of a graph • Different levels of classification conceivable: syntax, model, concepts 5
  • 6. Model-based Classification • Data classification on a structure-preserving decomposition of the graph (set of triples) • Resource, property and value of triples can be specified, wildcards select unknown entries. • Example: http:// ex:name “Bob Ross” example.com/bob Resource == http://example.com/bob Property == ex:name Value == * 6
  • 7. Concept-based Classification • Data classification on a structure of concepts and properties • Resources and their properties can be classified using their affiliation with a concept • Example: http:// ex:name “Bob Ross” example.com/bob rdf:type http:// example.com/ per#Person Concept == http://example.com/per#Person 7
  • 8. Concept Policy enabled Linked Data Server • Policy language PsSF • Policy evaluation algorithms • Data and policy management operations • Secure authentication 8
  • 9. Policy Language PsSF • Description Logic (DL) expressions based on the Semantic Web Rule Language (SWRL) • Prolog-style syntax for concise notation • Additional predicates for model- and concept-based data classification: • permit_triple(...), permit_instance(...) 9
  • 10. PsSF Policy Language: Example BobPosRule: QueryAction(?action) && actor(?action, http://example.com/bob) => permit_triple(http://example.com/alice,ex:pos,*); “42° 21′ 32″ N “Alice Ross” 71° 5′ 34″ W” ex:pos ex:name http:// example.com/alice 10
  • 11. Policy evaluation - Query • For each rule contained in the policy, check whether their preconditions are met • Approve graph elements classified by matching rules by adding them to a temporary RDF graph for the current user only containing authorized graph elements • Evaluate queries or dereferencing requests exclusively on those temporary graphs 11
  • 12. sp sp A H * ✔ H wp nm ps Z * * ✔ W nm Rule 1 “Bob” Access Policy Step 1 Secured Graph sp A H nm nm H * ? “Bob” Query Temporary Graph Step 2 nm R1 “Bob” 12 Query Result
  • 13. Required Operations • Definition & modification of access policies • Publication & modification of RDF graphs • Querying RDF graphs • URL dereferencing 13
  • 14. Authentication • Username/password-combinations are unpractical for Linked Data • Central authority would violate the decentralization principle inherent in the WWW • FOAF+SSL enables password-free authentication based on SSL certificates 14
  • 15. PeLDS Implementation • Linked-Data-Server with HTTP API • Supports PsSF policy language • FOAF+SSL for user authentication • Demo: Distributed Address Book 15
  • 16. Demo Application: Distributed Address Book Bob’s View Alice’s View 16
  • 17. PeLDS prototype - Performance 50 PeLDS R! = 0,9943 Joseki / TDB Joseki / TDB / Pellet 37,5 Processing time (s) 25 R! = 0,9959 12,5 450 1462,5 2475 3487,5 4500 Triple count 17
  • 18. Conclusion • Access policies and comprehensive data classifications are possible for Linked Data • PeLDS enables distributed applications with support for access policies • PeLDS-Implementation is available as open source software from www.pelds.org 18