Type systems. Types in access control and privacy. Outline. 1. Dynamic Web Data. p-calculus Dp XDp

Similar documents
Subtyping. Preciseness of Subtyping on Intersection and Union Types. Subtyping. Silvia Ghilezan. Joint work with Mariangiola Dezani-Ciancaglini

a paradigm for the Introduction to Semantic Web Semantic Web Angelica Lo Duca IIT-CNR Linked Open Data:

Formal Methods for Assuring Security of Computer Networks

Semantic Web and Natural Language Processing

A Privacy Preference Ontology (PPO) for Linked Data

Revisiting Blank Nodes in RDF to Avoid the Semantic Mismatch with SPARQL

Towards the Semantic Desktop. Dr. Øyvind Hanssen University Library of Tromsø

Session Types and Multiparty Session Types. Nobuko Yoshida Imperial College London

DBpedia-An Advancement Towards Content Extraction From Wikipedia

An overview of RDB2RDF techniques and tools

Linked Data Evolving the Web into a Global Data Space

OASIS: Architecture, Model and Management of Policy

The Data Web and Linked Data.

Experiences with OWL-S, Directions for Service Composition:

UnifiedViews: An ETL Framework for Sustainable RDF Data Processing

What you have learned so far. Interoperability. Ontology heterogeneity. Being serious about the semantic web

A Community-Driven Approach to Development of an Ontology-Based Application Management Framework

Hyperdata: Update APIs for RDF Data Sources (Vision Paper)

Modeling, Testing and Executing Reo Connectors with the. Reo, Eclipse Coordination Tools

Web Services Choreography and Process Algebra

Semantic Web Fundamentals

Semantic Web Fundamentals

Prof. Dr. Christian Bizer

Proposal for Implementing Linked Open Data on Libraries Catalogue

An Archiving System for Managing Evolution in the Data Web

Open And Linked Data Oracle proposition Subtitle

ISENS: A System for Information Integration, Exploration, and Querying of Multi-Ontology Data Sources

An FCA Framework for Knowledge Discovery in SPARQL Query Answers

A Formal Definition of RESTful Semantic Web Services. Antonio Garrote Hernández María N. Moreno García

Distributed Information System as a System of Asynchronous Concurrent Processes

Who s Who A Linked Data Visualisation Tool for Mobile Environments

Session Types for Object-Oriented Languages

COMP9321 Web Application Engineering

From Online Community Data to RDF

ProLD: Propagate Linked Data

Reducibility method: an overview

Idioms for Interaction: Functional Types, Process Types and Distributed Systems

Semantic Technologies and CDISC Standards. Frederik Malfait, Information Architect, IMOS Consulting Scott Bahlavooni, Independent

SOFTWARE DEVELOPMENT & REVERSIBILITY: OPEN PROBLEMS

The role of vocabularies for estimating carbon footprint for food recipies using Linked Open Data

Integrating SysML and OWL

Linked Open Europeana: Semantic Leveraging of European Cultural Heritage

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh

Adaptable and Adaptive Web Information Systems. Lecture 1: Introduction

State of the Art of Semantic Web

Logical reconstruction of RDF and ontology languages

A Routing Calculus with Flooding Updates

The Semantic Web Revisited. Nigel Shadbolt Tim Berners-Lee Wendy Hall

COMP9321 Web Application Engineering

Semantic Web Services and Cloud Platforms

Interoperability for Digital Libraries

Comparative Study of RDB to RDF Mapping using D2RQ and R2RML Mapping Languages

4 th Linked Data on the Web Workshop (LDOW 2011)

Combining Timing, Localities and Migration in a Process Calculus

Formal Verification. Lecture 10

Self-Controlling Architecture Structured Agents

TIMO: Timed Mobility in Distributed Systems

Flight Systems are Cyber-Physical Systems

Linked Data: Standard s convergence

Cross-Fertilizing Data through Web of Things APIs with JSON-LD

Computer Science Curricula 2013

A service based on Linked Data to classify Web resources using a Knowledge Organisation System

On Distributed Querying of Linked Data

Rule Formats for Nominal Modal Transition Systems

Processes as Types: A Generic Framework of Behavioral Type Systems for Concurrent Processes

Accessing information about Linked Data vocabularies with vocab.cc

Provenance: The Missing Component of the Semantic Web for Privacy and Trust

A Remote Biometric Authentication Protocol for Online Banking

How can Open Data and Linked Data help your organization and its Big Data? Mark Harrison

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.

Semantic Document Architecture for Desktop Data Integration and Management

ScienceDirect. Multi-interoperable CRIS repository. Ivanović Dragan a *, Ivanović Lidija b, Dimić Surla Bojana c CRIS

Porting Social Media Contributions with SIOC

Parallel and Distributed Computing (PD)

A REVIEW OF BASIC KNOWLEDGE OF DATABASE SYSTEM

Accountable SDNs for Cyber Resiliency UIUC/R2 Monthly Group Meeting. Presented by Ben Ujcich March 31, 2017

ABCD Report: Simon Gay, Philip Wadler, Nobuko Yoshida. 7th December 2017

Domain Specific Semantic Web Search Engine

L7 Security Semantics

Analyses of RDF Triples in Sample Datasets

LinDA: A Service Infrastructure for Linked Data Analysis and Provision of Data Statistics

ReGraph: Bridging Relational and Graph Databases

Building Blocks for User Modeling with data from the Social Web

Semantic Web. Tahani Aljehani

Solving problem of semantic terminology in digital library

Intercloud Security. William Strickland COP 6938 Fall 2012 University of Central Florida 10/08/2012

Knowledge Representation in Social Context. CS227 Spring 2011

Theme Identification in RDF Graphs

Manifest Safety and Security. Robert Harper Carnegie Mellon University

A Framework for Enforcing Constrained RBAC Policies

The JORD Project. The JORD Project (POSC Caesar & FIATECH, ISO15926) Joint Operational Reference Data

SRI International, Artificial Intelligence Center Menlo Park, USA, 24 July 2009

Distributed Systems Programming (F21DS1) Formal Verification

Formal Verification for UML/SysML models

Creating Large-scale Training and Test Corpora for Extracting Structured Data from the Web

Semantic Web Update W3C RDF, OWL Standards, Development and Applications. Dave Beckett

Linking Distributed Data across the Web

The Point of View Axis: Varying the Levels of Explanation Within a Generic RDF Data Browsing Environment

WebGUI & the Semantic Web. William McKee WebGUI Users Conference 2009

RDF Next Version. Ivan Herman and Sandro Hawke W3C

Transcription:

Type systems Types in access control and privacy Silvia Ghilezan University of Novi Sad NII Shonan Meeting 069 LOGIC AND VERIFICATION METHODS IN SECURITY AND PRIVACY October 26-29, 2015 Types have gained an important role in the analysis of formal systems. A type system splits elements of the language, called terms, into sets, called types, and proves absence of certain undesired behaviours on the basis of the types that are thus assigned. Undesired behaviours - run-time type errors. Deadlocks, race conditions, arity mismatch, communication errors, security flaws,... Outline 1. Dynamic Web Data Types: Process-like calculi p-calculus Dp XDp 1 Role Based Access Control Models of reconfigurable concurrent systems processes and their parallel composition 2 Linked Data 3 Communication-centered Calculi communication between processes channel transmission and creation of fresh channels nondeterminism replication of processes locations (M. Hennessy) Data (P. Gardner, S. Maffeis)

Role-Based Access Control of Dynamic Web Data Joint work: M. Dezani-Ciancaglini, J. Patnović, D. Varacca, S. Jakšić, 2006-2010. RBAC, standard of NIST, is an access control method that relies on the notions of users, roles and permissions. Role-based access control calculus for modelling dynamic web data in XDp. A network is a parallel composition of locations, where each location contains processes with roles and a data tree whose edges are associated with roles. N ::= l[d r P r ] N N Processes can communicate, migrate from a location to another, use the data, change the data and the roles in the local tree. Role-Based Access Control of Dynamic Web Data Types to control: the communication of values, the migration of processes the access of processes to data update of roles. M. Dezani-Ciancaglini, S. G., S. Jakšić, and Jovanka Pantović. Types for Role-Based Access Control of Dynamic Web Data. In Proceedings of WFLP 10, LNCS, Vol. 6559, pages 1 29, Springer, 2011. M.Dezani-Ciancaglini, S. G., J. Pantovic, D. Varacca: Security types for dynamic web data, Theoretical Computer Science 402: 156-171 (2008). M.Dezani-Ciancaglini, S. G., J. Pantovic, D. Varacca: Security types for dynamic web data, TGC 06 - Trustworthy Global Computing, LNCS 4661: 263-280 (2006). 2. Privacy for Linked Data Linked Data Cloud Joint work: J. Pantović, S. Jakšić. Web of Linked Data vs Web of Documents Technologies: URIs (Uniform Resource Identifiers), RDF (Resource Description Framework), SPARQL,... W3C project: Semantic Web http://www.w3.org/standards/semanticweb/ Published Data: media, publications, life sciences, geographic data, DBpedia, e-government, user-generated content (including profiles from social networks and blogs),...

RDF/XML and the calculus Access Control and Privacy subject predicate object RDF as an XML document (subject, predicate, object) D ::= /0 (a,a,a) U D k D N ::= a[d P] N N Access Control is a mechanism through which permissions are granted to entities to perform operations on Linked Data resources Privacy is the ability to control who has access to information and to whom that information is communicated - A. Westin (Privacy and Freedom, 1967). Privacy may not include just private status of some data but also significance or no significance of data for some group and the ability of readers to understand the data properly. Bizer, C. and Heath, T. and Berners-Lee, T. (2009) Linked Data - the Story So Far International Journal on Semantic Web and Information Systems, 5 (3):1-22. Privacy for Linked Data 3. Communication-centered Calculi Our goal: to create a formal (typed) model of Linked Data that can statically detect run-time errors due to privacy violation. S. Jakšić, J. Pantović and S. G. Linked Data Privacy. Mathematical Structures in Computer Science, online (2015). Distributed systems rely on communication that run over open networks. They can be targeted by malicious parties trying to threaten their functionality or to seize or compromise sensitive data. Need for rigorous (and scalable) techniques to ensure the reliability and security of these systems. In programming languages, type systems represent a well-established technique to ensure program properties.

Behavioural types and reliability analysis Behavioural types and security analysis a!2 a?x.x!5! 2!5 a!b a?(x,y) 9 a?x.b!x b?y.a!y 9 c!a c?x.c!x a!7 c!a c?x.c!x c?x.c!x a!7! c!a c?x.c!x a!7 Behavioural types for communication-centered systems ensure that the type system obeys the prescribed security policies (e.g., access control or secure information flow). Session types allow interactions to be structured into basic units, called sessions. The expressiveness of session types has enabled their application in diverse contexts, targeting different programming models ( functional and object-oriented programming ) operating system design middleware communication protocols. Behavioural types and security analysis Conclusion BETTY - Behavioural Types for Reliable Large-Scale Software Systems, COST IC1201 (2012-2016) WG2: Security - integrating behavioural types with techniques for security analysis M. Bartoletti, I. Castellani, P.-M. Denielou, M. Dezani-Ciancaglini, S. Ghilezan, J. Pantovic, J. A. Perez, P. Thiemann, B. Toninho, H. Torres Vieira: Combining behavioural types with security analysis, Journal of Logical and Algebraic Methods in Programming 84 (2015) 763-780. S. G., S. Jakšić, J. Pantović, J. A. Pérez and H. Torres Vieira: Dynamic Role Authorization in Multiparty Conversations. BEAT 2014. EPTCS 162: 1-9 (2014). Formal Aspects of Computing BETTY - Behavioural Types for Reliable Large-Scale Software Systems, COST IC1201 (2012-2016) WG2: Security - integrating behavioural types with techniques for security analysis Behavioural types - tools development (N. Yoshida) Types for Linked Data - different approaches (V. Sassone, M. Dezani, G. Ciobanu, R. Horne) Privacy Preference Ontology (O. Sacco and A. Passant).

TYPES 2016, May 23-27, 2016, Novi Sad TYPES 2016-22nd International Workshop on Types for Proofs and Programs Affiliated events Novi Sad, Serbia May 23-27, 2016