Policy Aware WEB - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Policy Aware WEB

Description:

{ WHO http:can-get PHOTO }. Example policies ... Address issues of eventual integration of the proxy with a Web browser (e.g. cookie storage) ... – PowerPoint PPT presentation

Number of Views:17
Avg rating:3.0/5.0
Slides: 12
Provided by: james1064
Category:
Tags: web | aware | policy

less

Transcript and Presenter's Notes

Title: Policy Aware WEB


1
Policy Aware WEB
(NSF ITR Hendler, Berners-Lee, Weitzner 2005)
2
PAW demo
3
Use case A Web browser requests the home page
for a girl scout troop and is given it by a Web
server.
Web Server
Content
Demo
4
However, requests for images result in HTTP Error
401, Unauthorized
Web Server
401
Content
401
5
The 401 Unauthorized response has been modified
to provide a URL to a policy
HTTP/1.1 401 Not authorized Date Sat, 03 Dec
2005 153218 GMT Server TwistedWeb/2.0.1
Policy http//groups.csail.mit.edu/dig/2005/09/re
in/examples/troop42-policy.n3 Content-type
text/html charsetUTF-8 Connection
close 103220 ERROR 401 Not authorized.
Demo
6
Policies use linked rules
  • Example policies
  • Photos taken at meetings of the troop can be
    shared with any current member of the troop.
  • Photos taken at a jamboree can be shared with
    anyone in the troop or with anyone who attended
    the jamboree.
  • Photos of any girl in the troop can be shared
    with the world if that girl's parent has given
    permission (under construction)

REQ a reinRequest. REQ reinresource PHOTO.
?F a TroopStuff logincludes PHOTO a
tPhoto tlocation LOC. LOC a
tMeeting . REQ reinrequester WHO. WHO
sessionsecret ?S. ?S cryptomd5 TXT. ?F a
TroopStuff logincludes tmember
is foafmaker of PG . LOC tattendee
is foafmaker of PG . PG logsemantics
logincludes PG foafmaker
sessionhexdigest TXT . gt WHO
httpcan-get PHOTO .
7
Use of the PAW proof-generation proxy results in
a proof which satisfies the policy
Web Server
Proof
Third-party services may be consulted to help
construct the proof.
Demo
8
  • The proxy
  • Uses Rein, a policy engine, to specify rules
    which match a given policy.
  • The Rein rules are run in Cwm, a forward-chaining
    reasoner for the Semantic Web. This generates a
    proof.

Demo
9
The Web server checks the proof and serves the
content if it is valid.
Web Server
Content
Demo
10
  • The server
  • Uses Cwm to validate the proof.
  • Takes action based on validation (serves content
    or denies).

Demo
11
  • Current work
  • Embed Pychinko, a Rete implementation, in Cwm to
    enhance performance of rules application.
  • Check the proof for satisfaction of a policy rule
    at the proxy before submission to the server.
  • Make use of multiple distributed authentication
    systems (instead of holding secrets in the
    proxy).
  • Associate content with RDF metadata and base
    policy decisions on the RDF (cf. policy 3)
  • Address issues of eventual integration of the
    proxy with a Web browser (e.g. cookie storage).

Demo
Write a Comment
User Comments (0)
About PowerShow.com