Browsing by Subject "semantic Web"
Now showing 1 - 8 of 8
Results Per Page
Sort Options
Item Authorization and Privacy for Semantic Web Services(IEEE, 2004-07-01) Kagal, Lalana; Paoucci, Massimo; Srinivasan, Naveen; Denker, Grit; Finin, Tim; Sycara, KatiaWhen choosing, composing, invoking or monitoring a service it may be important or even critical to understand it's security attributes and policies. By security, we refer to a range of related aspects including authentication, authorization, confidentiality and privacy. We discuss how to incorporate security information into the OWL-S Semantic Web service model by integrating descriptions of semantically rich policies for authorization, privacy and confidentiality. These policies can include conditions on attributes of the service requester, provider, and the general context. We describe the ontologies used to annotate OWL-S input and output parameters with respect to their security characteristics, including various types of encryption and digital signatures. We present an algorithm for testing policy compliance that can be integrated into the service selection process of the OWL-S MatchMaker. This integration allows the requester to invoke only those services that match the formers policies and whose policies are met by the requester.Item Capturing policies for fine-grained access control on mobile devices(IEEE, 2016-11-01) Das, Prajit Kumar; Joshi, Anupam; Finin, TimAs of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives and often hold sensitive corporate and personal data. As a result, they are a lucrative target for attackers, and managing data privacy and security on mobile devices has become a vital issue. Existing access control mechanisms in most devices are restrictive and inadequate. They do not take into account the context of a device and its user when making decisions. In many cases, the access granted to a subject should change based on the context of a device. Such fine-grained, context-sensitive access control policies have to be personalized too. In this paper, we present a system i.e. Mithril that uses policies represented in Semantic Web technologies and captured using user feedback, to handle access control on mobile devices. We present an iterative feedback process to capture user specific policy. We also present a policy violation metric that allows us to decide when the capture process is complete.Item CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities(IEEE, 2016-11-24) Mittal, Sudip; Das, Prajit Kumar; Mulwad, Varish; Joshi, Anupam; Finin, TimIn order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intelligence updates about cybersecurity can be viewed as temporal events that a security analyst must keep up with so as to secure a computer system. We describe CyberTwitter, a system to discover and analyze cybersecurity intelligence on Twitter and serve as a OSINT (Open–source intelligence) source. We analyze real time information updates, in form of tweets, to extract intelligence about various possible threats. We use the Semantic Web RDF to represent the intelligence gathered and SWRL rules to reason over extracted intelligence to issue alerts for security analysts.Item Enforcing Secure and Robust Routing with Declarative Policies(IEEE, 2010-10-31) Kodeswaran, Palanivel Andiappan; Perich, Filip; Li, Wenjia; Joshi, Anupam; Finin, TimInternet routers must adhere to many polices governing the selection of paths that meet potentially complex constraints on length, security, symmetry and organizational preferences. Many routing problems are caused by their misconfiguration, usually due to a combination of human errors and the lack of a high-level formal language for specifying routing policies that can be used to generate router configurations. We describe an approach that obviates many problems by using a declarative language for specifying network-wide routing policies to auto-matically configure routers and also inform software agents that can diagnose and correct networking problems. Our policy language is grounded in ontologies encoded in the Semantic Web language OWL, supporting machine understanding and interop-erability. Polices expressed in it can be automatically compiled into low-level router configurations and intelligent agents can reason with them to diagnose and correct routing problems. We have prototyped the approach and evaluated the results both in a simulator and on a small physical network. Our results show that the framework performs well on a number of use cases, including checking for policy coherence, preventing asymmetric routing patterns, applying organizational preferences, and diagnosing and correcting failures.Item Entity Type Recognition for Heterogeneous Semantic Graphs(Wiley, 2015-03-01) Sleeman, Jennifer; Finin, Tim; Joshi, AnupamWe describe an approach for identifying fine-grained entity types in heterogeneous data graphs that is effective for unstructured data or when the underlying ontologies or semantic schemas are unknown. Identifying fine-grained entity types, rather than a few high-level types, supports coreference resolution in heterogeneous graphs by reducing the number of possible coreference relations that must be considered. Big Data problems that involve integrating data from multiple sources can benefit from our approach when the data's ontologies are unknown, inaccessible or semantically trivial. For such cases, we use supervised machine learning to map entity attributes and relations to a known set of attributes and relations from appropriate background knowledge bases to predict instance entity types. We evaluated this approach in experiments on data from DBpedia, Freebase and Arnetminer using DBpedia as the background knowledge base.Item Preserving Privacy in Context-Aware Systems(IEEE, 2011-10-09) Jagtap, Pramod; Joshi, Anupam; Finin, Tim; Zavala, LauraRecent years have seen a confluence of two major trends – the increase of mobile devices such as smart phones as the primary access point to networked information and the rise of social media platforms that connect people. Their convergence supports the emergence of a new class of context-aware geosocial networking applications. While existing systems focus mostly on location, our work centers on models for representing and reasoning about a more inclusive and higher-level notion of context, including the user’s location and surroundings, the presence of other people and devices, and the inferred activities in which they are engaged. A key element of our work is the use of collaborative information sharing where devices share and integrate knowledge about their context. This introduces the need for privacy and security mechanisms. We present a framework to provide users with appropriate levels of privacy to protect the personal information their mobile devices are collecting, including the inferences that can be drawn from the information. We use Semantic Web technologies to specify high-level, declarative policies that describe user information sharing preferences. We have built a prototype system that aggregates information from a variety of sensors on the phone, online sources, and sources internal to the campus intranet, and infers the dynamic user context. We show how our policy framework can be effectively used to devise better privacy control mechanisms to control inItem A Question and Answering System for Management of Cloud Service Level Agreements(IEEE, 2017-09-11) Mittal, Sudip; Gupta, Aditi; Joshi, Karuna P.; Pearce, Claudia; Joshi, AnupamOne of the key challenges faced by consumers is to efficiently manage and monitor the quality of cloud services. To manage service performance, consumers have to validate rules embedded in cloud legal contracts, such as Service Level Agreements (SLA) and Privacy Policies, that are available as text documents. Currently this analysis requires significant time and manual labor and is thus inefficient. We propose a cognitive assistant that can be used to manage cloud legal documents by automatically extracting knowledge (terms, rules, constraints) from them and reasoning over it to validate service performance. In this paper, we present this Question and Answering (Q&A) system that can be used to analyze and obtain information from the SLA documents. We have created a knowledge base of Cloud SLAs from various providers which forms the underlying repository of our Q&A system. We utilized techniques from natural language processing and semantic web (RDF, SPARQL and Fuseki server) to build our framework. We also present sample queries on how a consumer can compute metrics such as service credit.Item Towards a Declarative Framework For Managing Application and Network Adaptations(IEEE, 2009-12-01) Kodeswaran, Palanivel Andiappan; Joshi, AnupamCross layer optimizations are increasingly being used in a variety of applications to improve application performance. However most of these implementations are ad hoc and performed on a per application basis. In this paper we propose a declarative framework for managing application and network adaptations. The declarative paradigm provides a much needed clean line of separation between the high level goals and the low level implementations. Our framework exposes the tunable features of both the application and the network across layers of the network stack which can then be jointly optimized. We allow operators to control the adaptation process through operator specified policies. This enables operators to retain control over their networks while the application and the network adapt in response to changing conditions. To support evolution, we pursue an ontological approach and use semantic web languages such as OWL and RDF in our framework for the policy and declarative specifications, thereby also leveraging the inherent reasoning and conflict resolution features of these languages. We then describe our framework developed on top of NS2 to demonstrate the utility of our approach in the easy implementation of cross layer optimizations through sample application scenarios.