Lecture23 - The University of Texas at Dallas

Download Report

Transcript Lecture23 - The University of Texas at Dallas

Building Trustworthy Semantic
Webs
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
Semantic web technologies for secure interoperability
and digital libraries
March 2010
Outline
 Secure Digital libraries and semantic web
 Secure heterogeneous/federated data management and
semantic web
 Secure web portals
Secure Web data/information management
 Secure data models
- Secure XML, RDF, - - - - Relational, object-oriented, text, images, video, etc.
 Secure data management functions
- Secure query, transactions, storage, metadata
 Key components for secure digital libraries and
information retrieval/browsing
Secure Web Database Functions
Secure Query Processing
Secure Transaction Management
Secure Storage Management
Secure Web Data
Security and Integrity
Secure Metadata Management
Management
Secure Data Warehousing
Secure Interoperability
Secure Web Mining
Secure Query Management: Language Issues
 Query language to access the databases
- SQL extensions are being examined
- XML-based query languages combined with SQL are
emerging
Example: XML-QL
- Querying RDF Data
 XML extensions for Multimedia databases such as SMIL
(Synchronized Multimedia Interface Language)
-
 Mappings between multiple languages
 Web rules and query languages developed by W3C
 Security should be incorporated into all aspects
Security/Integrity Management
 Support for flexible security policies
 Negotiations between different database administrators
 Authorization and access control models such as role-
based access control
 Identification and authentication
 Privacy Control
 Copyright protection / Plagiarism
 Maintaining the quality of the data coming from foreign
sources
 Represent data and policies in XML, RDF, OWL and
reason to determine quality and ensure security
Secure Digital Libraries
 Digital libraries are e-libraries
- Several communities have developed digital libraries

Medical, Social, Library of Congress
 Components technologies
- Web data management, Multimedia, information retrieval,
indexing, browsing, -- -  Security has to be incorporated into all aspects
- Secure models for digital libraries, secure functions
Secure Information Retrieval
Secure Query
Processor
Secure
Metadata
Manager
Secure Update
Processor
Secure Browser/
Editor
Secure
Storage
Manager
Security/
Integrity
Manager
Secure Browsing
 Browser augments a multimedia system to develop a hypermedia
system
 Search space consist of nodes and links with different access
control rules and/or classification levels
 May be represented as RDF Graphs
 Can a user traverse a link or access the contents of a node?
- What authorization does he/she have?
Interoperability of Heterogeneous Database
Systems
Database System A
Database System B
(Relational)
(ObjectOriented)
Network
Transparent access
to heterogeneous
databases both users
and application
programs;
Query, Transaction
processing
Database System C
(Legacy)
Technical Issues on the Interoperability of
Heterogeneous Database Systems
 Heterogeneity with respect to data models, schema, query
processing, query languages, transaction management,
semantics, integrity, and security policies
 Federated database management
- Collection of cooperating, autonomous, and possibly
heterogeneous component database systems, each
belonging to one or more federations
 Interoperability based on client-server architectures
Federated Database Management
Database System A
Database System B
Federation
F1
Cooperating database
systems yet maintaining
some degree of
autonomy
Federation
F2
Database System C
Schema Integration and Transformation in a
Federated Environment
External
Schema 1.1
External
Schema 2.1
External
Schema 1.2
Federated Schema
for FDS - 2
Federated Schema
for FDS - 1
Export Schema
for Component A
Generic Schema
for Component A
Component Schema
for Component A
External
Schema 2.2
Export Schema I
for Component B
Export Schema II
for Component B
Export Schema
for Component C
Generic Schema
for Component B
Generic Schema
for Component C
Component Schema
for Component B
Component Schema
for Component C
Adapted from Sheth and Larson, ACM Computing Surveys, September 1990
Transforming Secure Data Models
EMP: Level = Secret
SS# Ename
Salary
D#
1
John
20K
10
2
Paul
30K
20
3
Mary
40K
20
Class EMP is Secret
It has 3 instances:
John, Paul and Mary
Class DEPT is Unclassified
DEPT
Mgr
Level
It has 2 instances Math and Physics
D#
Dname
10
Math
Smith
U
Math is Unclassified
20
Physics
Jones
C
Physics is Confidential
Secure Schema Integration
Security must be maintained during transformations
Layer 5
Layer 4
Layer 3
Layer 2
Layer 1
External schemas: Schemas
for the various classes of users
Federated schemas: integrate export schemas
of the components of the federation
Export schemas for the components:
e.g., export schemas for components A, B, and C
(note: component may export different schemas
to different federations)
Generic schemas for the components:
e.g., generic schemas for components A, B, and C
Secure Schemas at the Component
level: e.g., Component schemas
for components A, B, and C
Security Policy Integration
Layer 5
Layer 4
Layer 3
Layer 2
Layer 1
External policies: Policies
for the various classes of users
Federated policies: integrate export policies
of the components of the federation
Export policies for the components:
e.g., export policies for components A, B, and C
(note: component may export different policies
to different federations)
Generic policies for the components:
e.g., generic policies for components A, B, and C
Policies at the Component
level: e.g., Component policies
for components A, B, and C
Federated Data and Policy Management
Data/Policy for Federation
Export
Data/Policy
Export
Data/Policy
Export
Data/Policy
Component
Data/Policy for
Agency A
Component
Data/Policy for
Agency C
Component
Data/Policy for
Agency B
Inference Control
Federated Inference Controller
Federated Data Management
Export
Engine
Export
Engine
Export
Engine
Inference
Controller
Component
Data System
for Agency A
Inference
Controller
Inference
Controller
Component
Data System
For Agency C
Component
Data System
for Agency B
Applications of Semantic Web Technologies
 Specify generic policies and schema in RDF, OWL
 Integrate the generic policies and schemas for federated
policies and schemas
 Apply reasoning strategies for RDF and OWL for inference
control in distributed environments
What are web portals?
 A portal, or enterprise information portal (EIP), is a Web site
that integrates an organization's knowledge base and all
related applications into a single user-customizable
environment.
 This environment acts as a one-stop shop, or "gateway," for
users' information and system needs.
 An organization's entire content database; search facilities;
collaboration tools; individual department, workgroup, and
project-specific intranets; online applications; and security
mechanisms fused into one cohesive environment that's
accessible from a single starting point.
 Enterprise information portals gives large amounts of
disparate content and applications unity and continuity.
 EIP differs from say a well-developed content managed
intranet with respect to “personalization”.
Personalization
 EIP differs from say a well-developed content managed
intranet with respect to “personalization”. EIPs allow users to
customize their portal environment to deliver only the content
they're interested in.
 This means every user who logs onto the portal will have a
different view of the system and its content. For example, a
Human Resources Manager will not need to see revisions of
some engineering drawing but would like to receive news on
the latest salary compensation trends.
 My Yahoo! and MSN are good examples of Internet portals.
 EIPs are developed specifically to work within business
environments, often integrating standard corporate
collaboration tools e-mail, shared calendars, discussion
forums, and online meetings into the suite .
Virtual Workspaces
 Portals are important for knowledge sharing and virtual
workspaces
 Firms are increasingly leveraging their globally distributed
knowledge resources through deployment of distributed teams.
 Since face-to-face meetings are increasingly less common among
distributed teams, team members are more frequently sharing their
knowledge through the use of “virtual workspaces”
 Virtual workspaces are an integrated set of tools that offer a variety
of communication support capabilities including a common team
repository organized for easy search and retrieval, application
sharing, electronic whiteboards and group discussion forums
 Security and privacy policies determine what information is shared
and with whom
Semantic Web Applications for Web Portals
 Web portals and Mashups – Web 2.0 and beyond
 Utilizes semantic web technologies for information
representation and reasoning
 RDF and OWL technologies ate being used
 Security investigation for web portals and Mashups is
relatively new
 Need to develop appropriate policies, represent them using
semantic web technologies