SlideShare une entreprise Scribd logo
1  sur  21
SOCIAL SEMANTIC
WEB ACCESS CONTROL
        Serena Villata, Nicolas Delaforge
          Fabien Gandon, Amelie Gyrard

                 INRIA Sophia Antipolis
INFORMATION SEMANTIC INTEGRATION
                   THROUGH COMMUNITIES OF INTELLIGENCE ONLINE




              Tools for assisting corporate intelligence tasks

Interactions: Web 2.0 advanced interfaces (blog, wiki, social bookmarking)
Interoperability and information processing: Semantic Web technologies




                                              #www2012
How to define an access control model
    for the Social Semantic Web?
WHAT TO EXPRESS?




       S4AC
S4AC




                           SOCIAL SEMANTIC SPARQL SECURITY
                             FOR ACCESS CONTROL VOCABULARY
http://ns.inria.fr/s4ac/
CREATE
         READ
         UPDATE
         DELETE




Access
Policy
http://MyResource.net#www2012                                          READ




                                            Access
                                            Policy
                                                            ASK {?res dcterms:creator ?prov .
                                                             ?prov sioc:member_of ?group .
                                                             ?user sioc:member_of ?group }




‘’friends’’, ‘’amici’’, ‘’ami’’                   ASK { ?res dcterms:creator ?prov .
                                                   ?prov dcterms:creator ?gr .
                                                   GRAPH ?gr {?user nicetag:hasSign ?tag}}


                          BINDINGS ?group
                          {<http://ns.inria.fr/isicil/id/group/edelweiss>}
MAXIMUM NUMBER OF ACCESSES




WHY I CANNOT ACCESS?




USER-FRIENDLY USER INTERFACE




Further details
ASK { ?res dcterms:creator ?prov .
 ?prov rel:hasFriend ?user }

 ASK {?res dcterms:creator ?prov .
 ?prov rel:hasFriend{1,2} ?user }




 ASK{ ?res dcterms:creator ?prov .
 ?prov rel:hasColleague ?user }




ASK { ?res dcterms:creator ?prov .
?prov rel:hasParent ?user}
ASK { FILTER(random()>0.5) }




ASK{FILTER(!
(?user= <http://MyExample.net#indiana>))}
* +! "#! : +!
 "
% !A+B : >!
 &
                                                                                 USER INTERFACE
% ! $ : ' 3P
  & & !
!: 3!35& 3!
        +&
                                                         ACCESS DENIED
 +* : $ " +3!
   ' *                                                    CATEGORIES
                                                                                                           ACCESS GRANTED
                                                                                                              RDF DATA
 & " #! $ &
  3!      %!
 & % 9!: 4&
  !$ &      !                              POLICIES
                                                                                 ACCESS CONTROL
                                                                                                  CONTEXTUAL
                                                                          S4AC       POLICIES
                                           CREATOR                                                INFORMATION
                                                                                    SELECTOR


   2): $ "+! R
        *    !
                    Define own
                 access conditions

                                                                                     ACCESS
                                                                                   CONTROLLER

                                                                                                     Access Control Manager




                         Webmarks                       Grant / Deny access



                                       Access request
     user                Resources                         user
      A                                                     B


                           Personal
                         information




            !
!8: 3& !" +!
       (




* +! "#! : +!
 "
% !A+B : >!
 &
                                                                                 USER INTERFACE
% ! $ : ' 3P
  & & !
!: 3!35& 3!
        +&
                                                         ACCESS DENIED
 +* : $ " +3!
   ' *                                                    CATEGORIES
                                                                                                           ACCESS GRANTED
                                                                                                              RDF DATA
 & " #! $ &
  3!      %!
 & % 9!: 4&
  !$ &      !                              POLICIES
                                                                                 ACCESS CONTROL
                                                                                                  CONTEXTUAL
                                                                          S4AC       POLICIES
                                           CREATOR                                                INFORMATION
                                                                                    SELECTOR


   2): $ "+! R
        *    !
                    Define own
                 access conditions

                                                                                     ACCESS
                                                                                   CONTROLLER

                                                                                                     Access Control Manager




                         Webmarks                       Grant / Deny access



                                       Access request
     user                Resources                         user
      A                                                     B


                           Personal
                         information
!8: 3& !" +!
       (




* +! "#! : +!
 "
% !A+B : >!
 &
                                                                                 USER INTERFACE
% ! $ : ' 3P
  & & !
!: 3!35& 3!
        +&
                                                         ACCESS DENIED
 +* : $ " +3!
   ' *                                                    CATEGORIES
                                                                                                           ACCESS GRANTED
                                                                                                              RDF DATA
 & " #! $ &
  3!      %!
 & % 9!: 4&
  !$ &      !                              POLICIES
                                                                                 ACCESS CONTROL
                                                                                                  CONTEXTUAL
                                                                          S4AC       POLICIES
                                           CREATOR                                                INFORMATION
                                                                                    SELECTOR


   2): $ "+! R
        *    !
                    Define own
                 access conditions

                                                                                     ACCESS
                                                                                   CONTROLLER

                                                                                                     Access Control Manager




                         Webmarks                       Grant / Deny access



                                       Access request
     user                Resources                         user
      A                                                     B


                           Personal
                         information
NAMED GRAPHS
 ABEL, DE COI, HENZE, KOESLING, KRAUSE, OLMEDILLA. ENABLING ADVANCED
  AND CONTEXT-DEPENDENT ACCESS CONTROL IN RDF STORES. IN ISWC-2007.
 CARMINATI, FERRARI, HEATHERLY, KANTARCIOGLU, THURAISINGHAM. SEMANTIC
  WEB-BASED SOCIAL NETWORK ACCESS CONTROL. COMPUTERS & SECURITY,
  2011.
 FININ, JOSHI, KAGAL, NIU, SANDHU, WINSBOROUGH, THURAISINGHAM.
  ROWLBAC: REPRESENTING ROLE BASED ACCESS CONTROL IN OWL. IN
  SACMAT-2008.
 GIUNCHIGLIA, ZHANG, CRISPO. ONTOLOGY DRIVEN COMMUNITY ACCESS
  CONTROL. IN SPOT-2009.
 HOLLENBACH, PRESBREY, BERNERS-LEE. USING RDF METADATA TO ENABLE
  ACCESS CONTROL ON THE SOCIAL SEMANTIC WEB. IN CK-2009.
 SACCO, PASSANT. A PRIVACY PREFERENCE ONTOLOGY (PPO) FOR LINKED DATA.
  IN LDOW-2011.
 STROKA, SCHAFFERT, BURGER. ACCESS CONTROL IN THE SOCIAL SEMANTIC WEB
  - EXTENDING THE IDEA OF FOAF+SSL IN KIWI. IN SPOT2010.
@serena_villata
serena.villata@inria.fr

Contenu connexe

Dernier

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Dernier (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 

En vedette

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Social Semantic Web Access Control

  • 1. SOCIAL SEMANTIC WEB ACCESS CONTROL Serena Villata, Nicolas Delaforge Fabien Gandon, Amelie Gyrard INRIA Sophia Antipolis
  • 2. INFORMATION SEMANTIC INTEGRATION THROUGH COMMUNITIES OF INTELLIGENCE ONLINE Tools for assisting corporate intelligence tasks Interactions: Web 2.0 advanced interfaces (blog, wiki, social bookmarking) Interoperability and information processing: Semantic Web technologies #www2012
  • 3.
  • 4. How to define an access control model for the Social Semantic Web?
  • 6.
  • 7. S4AC SOCIAL SEMANTIC SPARQL SECURITY FOR ACCESS CONTROL VOCABULARY http://ns.inria.fr/s4ac/
  • 8. CREATE READ UPDATE DELETE Access Policy
  • 9. http://MyResource.net#www2012 READ Access Policy ASK {?res dcterms:creator ?prov . ?prov sioc:member_of ?group . ?user sioc:member_of ?group } ‘’friends’’, ‘’amici’’, ‘’ami’’ ASK { ?res dcterms:creator ?prov . ?prov dcterms:creator ?gr . GRAPH ?gr {?user nicetag:hasSign ?tag}} BINDINGS ?group {<http://ns.inria.fr/isicil/id/group/edelweiss>}
  • 10. MAXIMUM NUMBER OF ACCESSES WHY I CANNOT ACCESS? USER-FRIENDLY USER INTERFACE Further details
  • 11.
  • 12.
  • 13. ASK { ?res dcterms:creator ?prov . ?prov rel:hasFriend ?user } ASK {?res dcterms:creator ?prov . ?prov rel:hasFriend{1,2} ?user } ASK{ ?res dcterms:creator ?prov . ?prov rel:hasColleague ?user } ASK { ?res dcterms:creator ?prov . ?prov rel:hasParent ?user}
  • 14.
  • 15. ASK { FILTER(random()>0.5) } ASK{FILTER(! (?user= <http://MyExample.net#indiana>))}
  • 16. * +! "#! : +! " % !A+B : >! & USER INTERFACE % ! $ : ' 3P & & ! !: 3!35& 3! +& ACCESS DENIED +* : $ " +3! ' * CATEGORIES ACCESS GRANTED RDF DATA & " #! $ & 3! %! & % 9!: 4& !$ & ! POLICIES ACCESS CONTROL CONTEXTUAL S4AC POLICIES CREATOR INFORMATION SELECTOR 2): $ "+! R * ! Define own access conditions ACCESS CONTROLLER Access Control Manager Webmarks Grant / Deny access Access request user Resources user A B Personal information !
  • 17. !8: 3& !" +! ( * +! "#! : +! " % !A+B : >! & USER INTERFACE % ! $ : ' 3P & & ! !: 3!35& 3! +& ACCESS DENIED +* : $ " +3! ' * CATEGORIES ACCESS GRANTED RDF DATA & " #! $ & 3! %! & % 9!: 4& !$ & ! POLICIES ACCESS CONTROL CONTEXTUAL S4AC POLICIES CREATOR INFORMATION SELECTOR 2): $ "+! R * ! Define own access conditions ACCESS CONTROLLER Access Control Manager Webmarks Grant / Deny access Access request user Resources user A B Personal information
  • 18. !8: 3& !" +! ( * +! "#! : +! " % !A+B : >! & USER INTERFACE % ! $ : ' 3P & & ! !: 3!35& 3! +& ACCESS DENIED +* : $ " +3! ' * CATEGORIES ACCESS GRANTED RDF DATA & " #! $ & 3! %! & % 9!: 4& !$ & ! POLICIES ACCESS CONTROL CONTEXTUAL S4AC POLICIES CREATOR INFORMATION SELECTOR 2): $ "+! R * ! Define own access conditions ACCESS CONTROLLER Access Control Manager Webmarks Grant / Deny access Access request user Resources user A B Personal information
  • 20.  ABEL, DE COI, HENZE, KOESLING, KRAUSE, OLMEDILLA. ENABLING ADVANCED AND CONTEXT-DEPENDENT ACCESS CONTROL IN RDF STORES. IN ISWC-2007.  CARMINATI, FERRARI, HEATHERLY, KANTARCIOGLU, THURAISINGHAM. SEMANTIC WEB-BASED SOCIAL NETWORK ACCESS CONTROL. COMPUTERS & SECURITY, 2011.  FININ, JOSHI, KAGAL, NIU, SANDHU, WINSBOROUGH, THURAISINGHAM. ROWLBAC: REPRESENTING ROLE BASED ACCESS CONTROL IN OWL. IN SACMAT-2008.  GIUNCHIGLIA, ZHANG, CRISPO. ONTOLOGY DRIVEN COMMUNITY ACCESS CONTROL. IN SPOT-2009.  HOLLENBACH, PRESBREY, BERNERS-LEE. USING RDF METADATA TO ENABLE ACCESS CONTROL ON THE SOCIAL SEMANTIC WEB. IN CK-2009.  SACCO, PASSANT. A PRIVACY PREFERENCE ONTOLOGY (PPO) FOR LINKED DATA. IN LDOW-2011.  STROKA, SCHAFFERT, BURGER. ACCESS CONTROL IN THE SOCIAL SEMANTIC WEB - EXTENDING THE IDEA OF FOAF+SSL IN KIWI. IN SPOT2010.