|
|
|
|
|
Value added |
|
Assume: Ontology to talk about
vulnerability detection and you express your security measures in terms of
that ontology |
|
Then: New attacks/vulnerabilities and
their countermeasures can be described in this ontology (worst case: need to
extend ontology) |
|
Thus: ontology-based systems adapt
faster to new situations |
|
Value added |
|
Assume: Translation of high-level
policies to low-level processes (e.g., using ontology mapping or refinement
mechanisms) |
|
Such relation could be used |
|
Interpreting what implication changes
in low-level services have for the high-level policy (e.g., monitoring system
behavior-detection of intrusion-translating into statement about policy
violation) |
|
Reasoning whether low-level process
satisfies high-level policy |
|
|
|
|
Registering a service with a directory |
|
Restrict who can see this service. |
|
For those who can see it: Who can use
it and under what condition? |
|
Security for meta-services (such as
registration) as well as application
services |
|
Compliance of service policies and user
requirements |
|
E.g.: A service requires user/password.
Another (sub)service provides user/password, but requires email. |
|
Backward chaining and inference could
be used by an agent to decide whether the service matches user requirements |
|
Compatibility of
preconditions/effects of service with
user restrictions |
|
E.g., reading news service will have
the effect to store your email |
|
|
|
|
Provide usage scenarios (with focus
security ) for DAML-S |
|
Separation of concern: policy vs
enforcement |
|
Provide challenge examples of policies
(e.g., access control to service, interaction with authenticated clients) |
|
And their enforcement (e.g., Kerberos
as authentication service) |
|
Same for trust/privacy |
|
Provide reasoning mechanism for
selected security policies |
|
Integration of role-based,
capability-based, ACL models in existing security ontologies |
|
Describe core security related services |
|
E.g., authentication/authorization
service, encryption service, policy
compatibility checking service |
|
|
|
|
|
|
Requirements of policy come along with
criteria how to satisfy them |
|
E.g.,
credentials, how many places was the info found on web |
|
Provide an ontology for criteria
associated to policy |
|
Trust depends on |
|
Insurance, guarantees |
|
Resolution techniques that are in place |
|
In context of services |
|
Work with DAML-S coalition in providing
ontologies for trust parameters |
|
Look into existing agent frameworks
what policies exist there |
|
Pedigre - Tagging pieces of information
where they come from |
|
Meta-data that can be used to reason
about to establish trust |