Transcript CoSAR-TS
CoSAR-TS
Coalition Search and Rescue
Task Support
Demo – 2003-04-08
DARPA DAML Program
AIAI/IHMC
Artificial Intelligence Applications Institute, University of Edinburgh
Institute for Human & Machine Cognition, University of West Florida
1
Binni SAR Scenario
SAR Joint Publications
Artificial Intelligence Applications Institute, University of Edinburgh
Institute for Human & Machine Cognition, University of West Florida
3
CoSAR-TS Demo Architecture
Domain & Policy Management Tools
CoABS Grid Manager
KAoS Policy Admin. Tool
Task Support Tools
Activity Editor
Process Panel
Domain Editor
Messenger
I-Space
CoABS Grid
KAoS Policy Admin. Tool
I-X Process Panels
Achievements to Date
Initial Coalition SAR Scenario defined
SONAT ENP data base extended with Binni data
Direct DAML file processing from I-X to SONAT via HP
JENA Toolkit
SOAP Access to SAR Resources from KAoS and I-X via
CMU MatchMaker and sample MM client code
KAoS policy-governed access to SAR Resources
Initial demonstration framework with CoSAR and US-SAR
I-X Panels and 2 Information Access Agents
Integration of BBN OpenMap with I-X Process Panels
Artificial Intelligence Applications Institute, University of Edinburgh
Institute for Human & Machine Cognition, University of West Florida
10
Further Information
http://www.aiai.ed.ac.uk/project/cosar-ts/
http://www.coginst.uwf.edu/kaos/
http://i-x.info
http://binni.org
Artificial Intelligence Applications Institute, University of Edinburgh
Institute for Human & Machine Cognition, University of West Florida
11
Additional Details
Extra Slides
Artificial Intelligence Applications Institute, University of Edinburgh
Institute for Human & Machine Cognition, University of West Florida
12
DAML Ontology References
Artificial Intelligence Applications Institute, University of Edinburgh
Institute for Human & Machine Cognition, University of West Florida
13
DAML-S
Artificial Intelligence Applications Institute, University of Edinburgh
Institute for Human & Machine Cognition, University of West Florida
14
KAoS DAML Policy Fragment
<rdfs:Class rdf:ID='policy-6ef00f45-00f4-0000-8000-0000deadbeefAction' daml:label='coginst_ActionClassName'>
<daml:subClassOf rdf:resource='http://ontology.coginst.uwf.edu/CoSAR-TS/RescueResources.daml#ReturnResultQueryRescueResourcesAction'/>
<daml:subClassOf>
<daml:Restriction rdf:ID='policy-6ef00f45-00f4-0000-8000-0000deadbeefActorRestriction0'>
<daml:onProperty rdf:resource='http://ontology.coginst.uwf.edu/Action.daml#performedBy'/>
<daml:toClass rdf:resource='#MembersOfDomainBinni'/>
</daml:Restriction>
</daml:subClassOf>
<daml:subClassOf>
<daml:Restriction rdf:ID='policy-6ef00f45-00f4-0000-8000-0000deadbeefTargetRestriction0'>
<daml:onProperty>
<daml:ObjectProperty rdf:about='http://ontology.coginst.uwf.edu/CoSAR-TS/RescueResources.daml#hasHomeCountry'/>
</daml:onProperty>
<daml:toClass rdf:resource='#policy-6ef00f45-00f4-0000-8000-0000deadbeefTargetInstances0'/>
</daml:Restriction>
</daml:subClassOf>
<daml:subClassOf>
<daml:Restriction rdf:ID='policy-6ef00f45-00f4-0000-8000-0000deadbeefTargetRestriction1'>
<daml:onProperty>
<daml:ObjectProperty rdf:about='http://ontology.coginst.uwf.edu/CoSAR-TS/RescueResources.daml#hasRescueDestination'/>
</daml:onProperty>
<daml:toClass>
<rdfs:Class rdf:about='#policy-6ef00f45-00f4-0000-8000-0000deadbeefTargetInstances1'/>
</daml:toClass>
</daml:Restriction>
</daml:subClassOf>
</rdfs:Class>
<RDFNsId1:NegAuthorizationPolicy rdf:ID='policy-6ef00f45-00f4-0000-8000-0000deadbeef'
RDFNsId1:hasName='CoSAR-TS1'
RDFNsId1:hasPriority='1'
RDFNsId1:hasUpdateTimeStamp='1049833307991'>
<RDFNsId1:controls rdf:resource='#policy-6ef00f45-00f4-0000-8000-0000deadbeefAction'/>
</RDFNsId1:NegAuthorizationPolicy>
</rdf:RDF>
KAoS DAML Policy Example
Example defines negative authorization for CMU
Matchmaker to return Gao Rescue Resources if
the destination hospital is in Arabello
Enforcement provided independently of the
Matchmaker
– For various reasons, either the MM service, the Coalition, or
Gao may be motivated to define and manage such a policy
– It may be in the defining party’s interest not to disclose the
policy to the other parties
– The policy will need to be enforced by some component that
belongs to the defining party, not necessarily to the subject or
target of the policy
– The independence of the policy reasoning mechanisms
provides a check against buggy, malicious, or poorlydesigned code in the agents and services
Artificial Intelligence Applications Institute, University of Edinburgh
Institute for Human & Machine Cognition, University of West Florida
16