This document summarizes a talk on constructive access control logics. It discusses how access control policies can be expressed using logical constructs like "A says s" and "A speaks for B". Several existing access control logics are mentioned that use lax modalities to represent these constructs. The talk questions whether less powerful logics could also effectively model access control and discusses potential applications of using logic to analyze and enforce access control policies.
Save queries as annotations. A method for the digital preservation of queries on a Hebrew Text database with linguistic information in it. These queries form the data for interpretations by biblical scholars. Sharing those queries as Open Annotation enables researchers to communicate their (intermediate) results.
Document Freedom Day & Mongo Summer Festival 2014 / DFDと納涼もんご祭り2014の宣伝Naruhiko Ogasawara
Promotion about two things I related: Document Freedom Day & Mongo Summer Festival 2014. In party LT of OSC 2014 Lake Hamanako
私が関係してる二つのことについて宣伝してきました。Document Freedom Dayと納涼もんご祭りです。カラー違いすぎだから二個のプレゼンに分ければよかったかな。
Save queries as annotations. A method for the digital preservation of queries on a Hebrew Text database with linguistic information in it. These queries form the data for interpretations by biblical scholars. Sharing those queries as Open Annotation enables researchers to communicate their (intermediate) results.
Document Freedom Day & Mongo Summer Festival 2014 / DFDと納涼もんご祭り2014の宣伝Naruhiko Ogasawara
Promotion about two things I related: Document Freedom Day & Mongo Summer Festival 2014. In party LT of OSC 2014 Lake Hamanako
私が関係してる二つのことについて宣伝してきました。Document Freedom Dayと納涼もんご祭りです。カラー違いすぎだから二個のプレゼンに分ければよかったかな。
2007 iPres Beijing - MIXED: Preservation by migration to XMLDirk Roorda
File formats for tabular data are often proprietary. By creating conversions to and from XML we can preserve the tabular information over time, even when the proprietary formats become obsolete.
Reseña de uno de los textos considerados "clásicos" en el estudio del periodismo económico. Detalle de sus falencias. Palabras clave: periodismo, economia, periodismo económico.
____________________________________
Publicado en la Revista Question, Nº 14, Otoño 2007 - ISSN 1669-6581)
A ThreeContent é uma Agência de Publicidade de Porto Alegre, que trabalha com Gestão de Conteúdo para Redes Sociais, Design e WebDesign, oferecendo aos seus clientes serviços com um altíssimo grau de qualidade. Estudamos cuidadosamente cada caso, oferecendo as melhores soluções para cada projeto. Temos uma base criativa para diversas áreas e estamos sempre prontos para melhor atendê-los. Seu projeto com certeza será único e retornará resultados efetivos! ThreeContent, venha com a gente!
Student presentation on exhibition evening for parents and visitors. Students used this presentation to explain the process they went through for their inquiry projects.
Modern Techniques for Providing Security in Cloud Computing Environmentijsrd.com
Cloud security is nowadays is a burning research topic. In this paper, we present an survey overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today's approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyse their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behaviour of the algorithms is much more similar as to be expected.
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-AutomationAlex Senkevitch
Talk from ISSA Wisconsin Chapter Event - Jan 8, 2019:
Abstract:
"How do we emerge with a fully functional, stable, and operationally mature secure SDLC in a software development world where the only thing that is now constant, is change? We will look at how we might keep pace with the DevOps culture without losing our security posture in the process by reviewing what can make up a strong pipeline, what is a pipeline, and how we can interleave all the various security stages we've always relied upon (e.g., software composition analysis, static and dynamic testing, manual testing, etc.) in a tiered SLA-driven flow. Finally, we will talk about how we might achieve the levels of operational maturity we've had previously in our security programs, that must now start over in this new discontinuous world."
2007 iPres Beijing - MIXED: Preservation by migration to XMLDirk Roorda
File formats for tabular data are often proprietary. By creating conversions to and from XML we can preserve the tabular information over time, even when the proprietary formats become obsolete.
Reseña de uno de los textos considerados "clásicos" en el estudio del periodismo económico. Detalle de sus falencias. Palabras clave: periodismo, economia, periodismo económico.
____________________________________
Publicado en la Revista Question, Nº 14, Otoño 2007 - ISSN 1669-6581)
A ThreeContent é uma Agência de Publicidade de Porto Alegre, que trabalha com Gestão de Conteúdo para Redes Sociais, Design e WebDesign, oferecendo aos seus clientes serviços com um altíssimo grau de qualidade. Estudamos cuidadosamente cada caso, oferecendo as melhores soluções para cada projeto. Temos uma base criativa para diversas áreas e estamos sempre prontos para melhor atendê-los. Seu projeto com certeza será único e retornará resultados efetivos! ThreeContent, venha com a gente!
Student presentation on exhibition evening for parents and visitors. Students used this presentation to explain the process they went through for their inquiry projects.
Modern Techniques for Providing Security in Cloud Computing Environmentijsrd.com
Cloud security is nowadays is a burning research topic. In this paper, we present an survey overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today's approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyse their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behaviour of the algorithms is much more similar as to be expected.
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-AutomationAlex Senkevitch
Talk from ISSA Wisconsin Chapter Event - Jan 8, 2019:
Abstract:
"How do we emerge with a fully functional, stable, and operationally mature secure SDLC in a software development world where the only thing that is now constant, is change? We will look at how we might keep pace with the DevOps culture without losing our security posture in the process by reviewing what can make up a strong pipeline, what is a pipeline, and how we can interleave all the various security stages we've always relied upon (e.g., software composition analysis, static and dynamic testing, manual testing, etc.) in a tiered SLA-driven flow. Finally, we will talk about how we might achieve the levels of operational maturity we've had previously in our security programs, that must now start over in this new discontinuous world."
Design Patterns Explained: From Analysis through ImplementationTechWell
Alan Shalloway takes you beyond thinking of design patterns as “solutions to a problem in a context.” Patterns are really about handling variations in your problem domain while keeping code from becoming complex and difficult to maintain as the system evolves. Alan begins by describing the classic use of patterns. He shows how design patterns implement good coding practices and then explains key design patterns including Strategy, Bridge, Adapter, Façade, and Abstract Factory. In small group exercises, learn how to use patterns to create robust architectures that can readily adapt as new requirements arise. Lessons from these patterns are used to illustrate how to do domain analysis based on abstracting out commonalities in a problem domain and identifying particular variations that must be implemented. Leave with a working understanding of what design patterns are and a better way to build models of your application domains.
Linked Data and Semantic Technologies can support a next generation of science. This talk shows examples of discovery, access, integration, analysis, and shows directions towards prediction and vision.
Anonymization techniques are used to ensure the privacy preservation of the data owners, especially for personal and sensitive data. While in most cases, data reside inside the database management system; most of the proposed anonymization techniques operate on and anonymize isolated datasets stored outside the DBMS. Hence, most of the desired functionalities of the DBMS are lost, e.g., consistency, recoverability, and efficient querying. In this paper, we address the challenges involved in enforcing the data privacy inside the DBMS. We implement the k-anonymity algorithm as a relational operator that interacts with other query operators to apply the privacy requirements while querying the data. We study anonymizing a single table, multiple tables, and complex queries that involve multiple predicates. We propose several algorithms to implement the anonymization operator that allow efficient non-blocking and pipelined execution of the query plan. We introduce the concept of k-anonymity view as an abstraction to treat k-anonymity (possibly, with multiple k preferences) as a relational view over the base table(s). For non-static datasets, we introduce the materialized k-anonymity views to ensure preserving the privacy under incremental updates. A prototype system is realized based on PostgreSQL with extended SQL and new relational operators to support anonymity views. The prototype system demonstrates how anonymity views integrate with other privacy- preserving components, e.g., limited retention, limited disclosure, and privacy policy management. Our experiments, on both synthetic and real datasets, illustrate the performance gain from the anonymity views as well as the proposed query optimization techniques under various scenarios.
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...PROIDEA
SUSTAINABILITY SUPPORTING DATA VARIABILITY: KEEPING CORE COMPONENTS CLEAN WHILE DEALING WITH DATA VARIABILITY
A big challenge in building complex, data-intensive systems is how to sustainably support data variation, schema, and feature evolution. This talk examines strategies, practices, and patterns drawn from real experiences that support new and evolving data-processing requirements while keeping the core architecture clean. As complex systems evolve to meet varying data formats, they can devolve into poorly architected Big Balls of Mud filled with special-case logic and one-off processing. Alternatively, you can isolate core components of your system and protect them from entanglements and unnecessary complexity by designing them to operate on common data formats while providing extension mechanisms that enable processing variations.
JDD2015: Sustainability Supporting Data Variability: Keeping Core Components ...PROIDEA
SUSTAINABILITY SUPPORTING DATA VARIABILITY: KEEPING CORE COMPONENTS CLEAN WHILE DEALING WITH DATA VARIABILITY
A big challenge in building complex, data-intensive systems is how to sustainably support data variation, schema, and feature evolution. This talk examines strategies, practices, and patterns drawn from real experiences that support new and evolving data-processing requirements while keeping the core architecture clean. As complex systems evolve to meet varying data formats, they can devolve into poorly architected Big Balls of Mud filled with special-case logic and one-off processing. Alternatively, you can isolate core components of your system and protect them from entanglements and unnecessary complexity by designing them to operate on common data formats while providing extension mechanisms that enable processing variations.
Semantic Web in Action: Ontology-driven information search, integration and a...Amit Sheth
Amit Sheth's Keynote talk given at: “Semantic Web in Action: Ontology-driven information search, integration and analysis,” Net Object Days 2003 and MATES03, Erfurt, Germany, September 23, 2003. http://knoesis.org
Note: slides 51-55 have audio.
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...Stijn (Stan) Christiaens
Learn how to launch your data governance program, by answering three questions:
- What does my data mean: collect and manage business definitions and relations, taxonomies and classifications, business rules and ontologies;
- How can I involve all stakeholders: engage them across business units and geographies, with stewards, data owners, … in a guiding workflow;
- How do I operationalize data governance: link MDM, DQ and BI to the business, use business-driven semantic modelling, achieve end-to end traceabilitiy. During this session we will use examples from different verticals: Finance, Government, Utilities,… .
We discuss their main drivers for starting a Data Governance initiative, as well as their pragmatic approach in moving from gradual roll out to support and sustain their Data Governance program.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. Outline
Motivation: access control must be logic…
Background
Basic framework
A new system?
Discussion & applications
Caveat: no expert, a talk to logicians interested in the
problem…
11/09/09
3. Why the buzz about access control?
Ubiquity of computing and growth of the Internet turned
Information Security into a central area of research in
computer science.
Many areas within Information Security. For logicians
there’s considerable work on logical methods for access
control.
For example:
– Abadi et al, 1993, Abadi, 2003, Abadi 2006
– Garg et al, 2006
– Garg, Pfenning 2006
– Garg, Abadi, 2008
» Thanks Martin and Deepak!
11/09/09
4. Access control in current practice
(according to Abadi)
Access control is pervasive
– applications
– virtual machines
– operating systems
– firewalls
– doors
– …
Access control seems difficult to get right.
Distributed systems make it harder.
11/09/09
5. What is Access Control?
In computer security, access control consists in
deciding whether an agent that requests some action
should have his request granted or not.
Decisions are based on access control policies, the
combination of several policies at different layers and
from different entities.
A single policy may be easy to understand e.g. user
Valeria may want to delete file1 and if she owns
the file the admin should allow it.
But the consequences of even a single policy can
get complicated, when there are many principals,
many roles, many resources, delegation, revocation,
etc.
11/09/09
6. The access control model
Elements:
– Resources
– Requests
– Sources for requests, called principals
– A reference monitor to decide on requests
– Control policies
Dr
of ee
R
e
e
e j
nc
Po m b
iaa o O
rl p
n e
c r
i
p t
i
oi
nt
n
or
c
t
S e Gs
o q ue
u u a o
r R
c e rR
e s du
t r
c
e
11/09/09
7. General theories and systems
Over the years, there have been many
theories and systems for access control.
– Logics
– Languages
– Infrastructures (e.g., PKIs)
– Architectures
They aim to explain, organize, and unify
access control.
We’re interested in logics and languages…
11/09/09
8. Access Control needs logic?
“Although access control may sometimes seem
conceptually straightforward, it is both complex and
error-prone in practice. […] One may hope that logic
would provide a simple, solid, and general foundation
for access control, as well as methods for designing,
implementing, and validating particular access control
mechanisms. In fact, although logic is not a panacea,
its applications in access control have been
substantial and beneficial.” M. Abadi, Invited
Address, LICS 2003
11/09/09
9. Access control needs logic
We need to combine access control policies,
have groups of principals, revocation,
delegation, roles, etc.
Things can get very complicated. There can
be gaps, inconsistencies, ambiguity,
loopholes, obscurity.
Systems can be easy to break and security is
endangered.
11/09/09
10. On the other hand…
(Constructive) Logic can:
Express policies
– Admin says
owns (Valeria, file) -> may_delete(Valeria, file)
Express authorization questions
– Does Valeria have a proof of the proposition
Admin says may_delete(Valeria, file)?
Logical proofs allow us:
– Construct evidence (assemble proof)
– Verify evidence (verify proof)
– Reason from assumptions (given credentials)
11/09/09
11. Logics for Access Control
Encode and reason within policies
Analyze policies (reason about them)
– Express (and reason about) private knowledge?
Prove properties of policies, check for unintended
consequences. Enforce policies?
Proofs hard to construct, easy to verify
– Lead to Proof Carrying Authorization
Appel&Felten, Bauer
PCA insight :
the user/ principal wanting access must construct a
proof, the server will simply check the proof to
grant access
uses higher-order logic, can we make it simpler?
11/09/09
12. Logics of Access Control
Several systems proposed and studied.
Traditionally classical modal logics with extra
constructs (Abadi et al 1993)
Garg&Pfenning(2006) have proposed a constructive
lax logic of access control, non-interference
Abadi (2006) has proposed a lax logic based system
DCC, non-interference
Garg et al(2006) have proposed a “linear” logic for
access control, credentials are resources
Garg&Abadi(2008 to appear) have four systems
based on lax logic
11/09/09
13. Background1: Principals
A principal is any user, machine, program,
organization that
– Either makes requests, or
– Makes statements (policies)
Examples:
– Humans: Alice, Bob, Charlie, ...
– Users: 500, 501, admin, ...
– Programs: MSWord, Acrobat Reader, ...
– Organizations: CMU, SRI, ACM, Wells-Fargo...
– Public keys: 0xaf5436, 0x123458
11/09/09
14. Background2: “A says s”
Taking Garg&Abadi (GA08) as basic reference
Basic construct operator “says”: applied to principal A
and formula s, “A says s”.
- Abstracts away from implementation concerns
“A says s” means intuitively that A asserts or supports
s, e.g. “A says delete-file1”.
Different access control logics have subtly different
meanings for “says”.
Note similarity to “K attests A” in cyberlogic, where K
is (has to be?) a public key, A is a formula
11/09/09
15. Background3: “speaks for”
Operator “speaks for”, applied to principals A and B,
A => B
This is read “A speaks for B” and intuitively means
that if A says s then B says s, for all s.
In particular if KAlice is the public key for Alice we
have KAlice => Alice.
also if S a server then S => Alice, if S is acting for Alice
Different access control logics have subtly different
meanings for “speaks for”
Not fine-grained enough?
(Similar to cyberlogic’s delegation?)
11/09/09
16. Which logic of access control?
Intuitionistic basis, as we want
– a Curry-Howard isomorphism,
– evidence instead of truth
– use proofs as witnesses for PCA
Have a collection of principals A, B,..
How do we represent logically the constructs
for access control?
All recent work mentioned uses an indexed
collection of lax modalities
11/09/09
17. What’s a lax modality?
A modality is an unary operator acting on
propositions
Curry(1952) a possibility modality that half-behaves
like a necessity one.
Like possibility, twice the modality implies it once.
But like necessity as it satisfies distribution over
implication.
Also known as computational logic, CL,
(Benton, Bierman, de Paiva, JFP 1998)
Properties:
s A says s
A says A says s A says s
A says (st) (A says s) (A says t)
11/09/09
18. Why lax modalities?
Need to model “A says s”
“says” has some characteristics of possibility:
if “A says (A says s)” then “A says s”,
if “A says (s->t)” then “A says s-> A says t”
Lax modalities buy you non-interference (Abadi06,
GargPfenning06)
Lax modalities buy you “hand-off axiom”: if A says
that B speaks for A then B does speak for A
(Abadi06)
Lax modality well-understood logic type theory
11/09/09
19. How to do lax modalities?
Different proof systems: Moggi89,de Paiva et
al 98, Mendler&Fairtlough97
Garg&Pfenning: ‘judgemental’ logic (2001)
Based on Martin-Loeuf’s ideas: intro and elim
rules plus cut elim are the meaning of
connectives
Works for S4-style connectives, dual-sized
sequents (e.g. linear logic exponentials)
Can we do less powerful/less symmetric
modalities?
11/09/09
20. Why not lax modalities?
Axiom (s -> A says s) means every principal
says s, if s is true
– Difficult to believe that principals are that ideal
Similarly, “speaks for” too strong
Alice would like to make sure that Bob
speaks for her in certain circumstances, not
for all s.
Maybe can use a simple K constructive
modality for “says”…
11/09/09
21. A new system?
Caveat: work not really done…
But Curry-Howard Iso for Basic Modal Logic,
(Bellin, de Paiva, Ritter, 2001)
Bug in published version, being corrected and
extended now
– Thanks to Kakutani (2006) for correcting it!
Type theory, semantics in place:
– Normalization, subject reduction,
soundness&completeness, internal language too
Non-interference works too, “hand off”?
11/09/09
22. Extensions
Garg: linear logic to deal with credentials that
are consumable resources
– Apparently proof-theory done, implementation is
the problem
– Garg et al 06, Bauer et al 06
Garg et al: temporal aspects of security in the
works
– I also want my versions with and without linear
basis
– Constructive temporal logics in the market not
good
11/09/09
23. Applications?
A bit of unifying glee: 1995 proposal on logics
of authentication
PCA for less expressive logics
– Grey project at CMU interesting, but it would be
nice if it could be simpler, Manifest Security?
Access control for multiple enterprise
repositories:
– What if our principals were the parties that need to
cooperate when someone is buying a house?
– Can our access control theories help out?
– Some Stanford/PORTIA work on this direction
11/09/09
24. Conclusion
Logic clearly useful for access control
Multiple applications and opportunities
More work required on trade-offs between
logical systems, automation, etc
Innovative applications may send the
formalism into totally different directions
11/09/09
26. References
Manifest Security for Distributed
Information Karl Crary, Robert Harper, Frank
Pfenning 2006
Garg&Abadi08, Garg&Pfenning06, Garg et al
06
PCA Appel&Felten 99, Bauer’s thesis 03
11/09/09
27. A calculus for access control
[Abadi, Burrows, Lampson, and Plotkin, 1993]
A simple notation for assertions
– A says s
– A speaks for B (sometimes written A ⇒ B)
With logical rules
– ⊢ A says (s → t) → (A says s) → (A says t)
– If ⊢ s then ⊢ A says s.
– ⊢ A speaks for B → (A says s) → (B says s)
– ⊢ A speaks for A
– ⊢ A speaks for B ∧ B speaks for C → A speaks for
11/09/09 C
28. Enforcing policies?
An access control policy can be presented as
a logical theory in an access control logic
A principal is granted access to a resource if
there is a formal proof that the principal is
authorized the use of the resource according
to the accepted policy
Constructivity buys you PCA?
11/09/09