Specifying and enforcing high-level semantic obligation policies

被引:2
|
作者
Liu, Zhen [1 ]
Ranganathan, Anand [1 ]
Riabov, Anton [1 ]
机构
[1] IBM Corp, TJ Watson Res Ctr, Hawthorne, NY 10532 USA
来源
JOURNAL OF WEB SEMANTICS | 2009年 / 7卷 / 01期
关键词
Ontology; Policy; Automatic workflow composition; High-level events; Semantic policy language;
D O I
10.1016/j.websem.2008.02.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Obligation policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems often produce event streams containing large volumes of low-level events. In many cases, these streams also contain multimedia data (consisting of text, audio or video). Hence, a key challenge is to allow policy writers to specify obligation policies based on high-level events, that may be derived after performing appropriate processing on raw, low-level events. In this paper, we propose a semantic obligation policy specification language called Eagle, which is based on patterns of high-level events, represented as RDF graph patterns. Our policy enforcement architecture uses a compiler that builds a workflow for producing a stream of events, which match the high-level event pattern specified in a policy. This workflow consists of a number of event sources and event processing components, which are described semantically. We present the policy language and enforcement architecture in this paper. (C) 2008 Elsevier B. V. All rights reserved.
引用
收藏
页码:28 / 39
页数:12
相关论文
共 50 条
  • [1] Specifying and enforcing high-level semantic obligation policies
    Liu, Zhen
    Ranganathan, Anand
    Riabov, Anton
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 119 - +
  • [2] Enforcing high-level security policies for Internet of Things
    ChangJin Koo
    JeongYeon Kim
    The Journal of Supercomputing, 2018, 74 : 4497 - 4505
  • [3] Enforcing high-level security policies for Internet of Things
    Koo, ChangJin
    Kim, JeongYeon
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4497 - 4505
  • [4] Specifying and enforcing application-level Web security policies
    Scott, D
    Sharp, R
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (04) : 771 - 783
  • [5] Beyond separation of duty: An algebra for specifying high-level security policies
    Li, Ninghui
    Wang, Qihua
    JOURNAL OF THE ACM, 2008, 55 (03)
  • [6] CDL: A LANGUAGE FOR SPECIFYING HIGH-LEVEL CROSS-DOMAIN SECURITY POLICIES
    Thomas, Roshan
    Tsang, Simon
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1154 - 1160
  • [7] Enforcing high-level security properties for applets
    Pavlova, M
    Barthe, G
    Burdy, L
    Huisman, M
    Lanet, JL
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI, 2004, 153 : 1 - 16
  • [8] Enforcing Architectural Contracts in High-Level Synthesis
    Patil, Nikhil
    Bansal, Ankit
    Chiou, Derek
    PROCEEDINGS OF THE 48TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2011, : 824 - 829
  • [9] Enforcing high-level protocols in low-level software
    DeLine, R
    Fähndrich, M
    ACM SIGPLAN NOTICES, 2001, 36 (05) : 59 - 69
  • [10] Specifying and enforcing constraints in dynamic access control policies
    Essaouini, Nada
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    El Kalam, Anas Abou
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 290 - 297