SlideShare a Scribd company logo
POLICY CONTROL PROFILES
WITH GRA AND NIEM
James Cabral, David Webber, Farrukh Najmi,
July 2012
EXECUTIVE OVERVIEW
Managing information privacy and access policies has
become a critical need and technical challenge. The
desired solution should be ubiquitous, syntax neutral but a
simple and lightweight approach that meets the legal policy
requirements though the application of clear, consistent
and obvious assertions.
Today we have low-level tools that developers know how to
implement with, and we have legal documents created by
lawyers, but then there is a chasm between these two
worlds.
2
LEGAL AND RULES TECHNOLOGIES
The RuleML community has long understood this and
developed and is developing new and improved methods and
solutions. The challenge is in taking these approaches and
being able to apply these to NIEM XML based information
sources in a high level conceptual way that is accessible to
information analysts and general NIEM practitioners, rather
than the provence of specialized XML-programmers only.
Then we also need these techniques to be broadly
applicable, using existing open public software standards
and tools so we can enable the widest possible adoption
within the NIEM community.
3
APPROACH
The solution we are introducing will:
īƒ’ Provide a clear declarative assertions based method, founded
on policy approaches developed by the rules community,
īƒ’ Leveraging open software standards and tools and
īƒ’ Enabling business information analysts to apply and manage
the policy profiles
Show illustrative design time and run time examples by:
īƒ’ Visually assigning exchange components and rule assertions
īƒ’ Show applying this to retrieval of documents stored with
registry and repository services.
4
APPLICATION SCENARIO OVERVIEW
Electronic Policy Statements 5
Policy Rules
Portal
User
Dashboard
1
Apply Policy Rules to Requested
Case Content
4
Users see only
information
permitted by
their role and
policy profile
Request
Output
Templates
Output
Templates
Information
Requests
2
Case Management
Registry
Services
3
Output
Templates
Output
Templates
Case
Documents
XML
Response
Output
Templates
Output
Templates
Requested
Information
5
User
Profiles
PRESENTATION AGENDA
īƒ’ Part 1
īƒ‰Problem introduction and policy methods
overview
īƒ’ Part 2
īƒ‰Design time technical walkthrough of rule
assertions example
īƒ’ Part 3
īƒ‰Run time deployment with registry services
PART 1 – PROBLEM INTRODUCTION
Policy Methods Overview
USE CASE – SAR CASE MANAGEMENT
īƒ’ Three levels of information access
īƒ‰ Citizen level reporting - SAR statistics
īƒ‰ Local law enforcement officials - case review
īƒ‰ State and Federal - case management and
coordination
īƒ’ This means three profiles:
īƒ‰ Profile 1 - Registry query - statistics results
īƒ‰ Profile 2 - Local staff
īƒ‰ Profile 3 - Regional staff
8
SAR – Suspicious Activity Report
POLICY GRANULARITY
Electronic Policy Statements
Coarse-
Grained
Role-based authorization of
subjects.
Access granted to coarse-grained
data objects.
E.g., “Permit law enforcement to
access the NCIC Wanted Persons
Database.”
Fine-Grained
Attribute-based authorization of
subjects.
Access limited to specific data
objects based on attributes.
E.g., “Permit law enforcement to
access criminal history records if
the records were created by the
requester’s agency.”
9
īƒ’ Actions.
RULE AND CONTEXT METADATA
Electronic Policy Statements 10
Properties of the access rules and environment.
â€ĸ Conditions.
– Subject.
– Resource.
– Policy.
â€ĸ Obligations.
īƒ’ Express policies in a structured
language (e.g., XML)
īƒ’ Identify requesters
īƒ’ Compare data collection and
release purposes
īƒ’ Enforce retention rules
īƒ’ Notify data owners and
subscribers
īƒ’ Verify compliance
PRIVACY AND SECURITY ARCHITECTURES
Privacy and Security Architectures 11
MAPPING TO DATA STANDARDS
Privacy and Security Architectures 12
â€ĸGFIPMUser
Metadata
â€ĸNIEM
â€ĸGFIPM
Content
Metadata
â€ĸXACMLActions
Electronic
Policy
Statements
īƒ’ A mechanism to
specify policy rules
in unambiguous
terms
īƒ’ XML Access
Control Markup
Language (XACML)
īƒ‰ Machine-readable
īƒ‰ Supports
federated and
dynamic policies
POLICY AUTHORING LANGUAGE
Privacy and Security Architectures 13
XACML ARCHITECTURE
Privacy and Security Architectures 14
Term Description
PAP Policy Administration Point - Point which manages policies
PDP Policy Decision Point - Point which evaluates and issues authorization decisions
PEP Policy Enforcement Point - Point which intercepts user's access request to a resource and enforces PDP's decision.
PIP Policy Information Point - Point which can provide external information to a PDP, such as LDAP attribute information.
http://en.wikipedia.org/wiki/XACML
XACML STATEMENTS
Privacy and Security Architectures 15
PolicySets
Policies
Rules â€ĸObligations
â€ĸFunctions
Targets â€ĸAttributes
Policy Matrix Rule XACML Statement
Party Subject to Rule
Subject Condition(s) Conditions.
Subject(s) Subject(s).
Subject Information Context Subject(s) attributes.
Rule Action Action(s). Action(s) attributes.
Data Resource Subject to Rule
Target Resource(s) Resource(s).
Other Resource Context Resource(s) attributes.
Other Resource Conditions Conditions.
Circumstances in Which the Rule Applies
General or Action Policy Conditions Purpose(s).
Obligations and Environments If [zero or more [Subject(s) Action(s) and/or Resource(s), and/or
Environment(s) attributes) [Condition(s)] are met] with [zero or more
Obligation(s) to be performed].
Rule Activity
Deny/Permit by Statute/Policy Effect = PERMIT or DENY.
Administrative Information
Precedence PolicyCombiningAlgorithm(s), RuleCombiningAlgorithm(s).
References PolicyID, RuleID.
Linkages PolicyID, RuleID.
Policy Matrix Editors Does not translate to XACML.
ENCODING RULES INTO XACML
Privacy and Security Architectures 16
PART 2 – DESIGN TIME WALKTHROUGH
Design Time Rule Assertions Concepts
USING POLICY TEMPLATES
īƒ’ Traditional NIEM approach focuses on the
information exchange data handling
īƒ’ Uses XSD schema to define content structure
and metadata
īƒ’ Need is for a bridge between the NIEM
schema, the XML information instances and
the XACML rule assertion language
īƒ’ Approach is based on visual content structure
templates with declarative rule assertions
18
D E P L O Y E D
APPROACH IN A NUTSHELL
XACML
Engine
Rule
Assertions
P O L I C I E S
Output
Templates
Output
Templates
Exchange
Structures
Policy
Assertion
Template
2
S C H E M A
NIEM
IEPD
1
XACML
Generation
Tool
3
XACML
XML
Script
4
Rules Asserted to
Nodes in the Exchange
Structure via simple
XPath associations
19
SAR VISUAL TEMPLATE + RULE ASSERTIONS
Rules Assertions
associate and control
access privacy to
specific content areas
in the SAR details
structure
Visual metaphor
allows policy
analysts to verify
directly
20
Rule
Assertions
NIEM data flows
NIEM / GRA OPERATIONAL SCENARIO
XACML
Engine
Information Exchange
5
INTERFACES
P O L I C I E S
CAM Editor
Visual Designer
Output
Templates
Output
Templates
Exchange
Templates
1
Information Exchange
3
INTERFACES
4
S C H E M A
NIEM
IEPD
NIEM
XML
NIEM
XML
Generated
XACML
Rules
2
21
CAM TOOLKIT + CAMV ENGINE
īƒ’ Open source solutions – designed to
support XML and industry vocabularies
and components for information
exchanges
īƒ’ Implementing the OASIS Content
Assembly Mechanism (CAM) public
standard
īƒ’ CAMV validation framework and test
suite tools
īƒ’ Development sponsored by Oracle
CAM Editor resources site:
http://www.cameditor.org
22
NEXT STEPS
īƒ’ Enhance CAM Editor UI to provide wizards
for policy rule assertion entry
īƒ’ Provide XSLT to generate XACML from
CAM template
īƒ’ Enhance reporting tools to show policy
details in plain English details
īƒ’ Test with sample JPS NIEM exchange
schema
23
PART 3 – DEPLOYMENT WITH REGISTRY
Illustrative deployment with XACML services and application
APPLICATION SCENARIO DETAILS
Electronic Policy Statements 25
Policy Rules
Portal
User
Dashboard
1
Apply Policy Rules to
Requested Case Content
(PDP Engine)
4Users see only
information
permitted by
their role and
policy profile
Request
Output
Templates
Output
Templates
Information
Requests
2
Case Management + PAP
Registry
Services
3
Output
Templates
Output
Templates
Case
Documents
XML
Response (PEP)
Output
Templates
Output
Templates
Requested
Information
5
User
Profiles
XMLXMLXML XACML
REGISTRY POLICY ENFORCEMENT
Privacy and Security Architectures 26
PAP
â€ĸDefines policies.
â€ĸMonitors compliance.
PDP
â€ĸReceives requests from the PEP.
â€ĸIdentifies policies that match each request.
â€ĸEvaluates request and environment attributes.
â€ĸDirects the PEP.
PEP
â€ĸDiscloses or redacts the information or denies the request.
â€ĸLogs the request and action.
â€ĸNotifies of the request and action.
PRIVACY POLICY TECHNICAL FRAMEWORK
Privacy and Security Architectures 27
PUBLISHING CONTENT (BULK IMPORT TOOL)
Bulk loader will
trawl server and
folder location
for content –
e.g. original
SAR XML
documents
Bulk Publish of SAR documents
28
SAR DISCOVERY AND RETRIEVAL
SAR Discovery
Query (easily
extended / tailored
without code
changes)
allows rapid
prototyping and
verification of
content and
operations
Results returned
digest and content
retrieval options
29
SUMMARY
Review
KEY MESSAGES
īƒ’ Dramatically simpler policies adoption
īƒ’ Can be rapidly developed with existing tools
īƒ’ Can be visually inspected and verified by
policy analysts
īƒ’ Enables use of dynamic contextual policies
īƒ’ Supports international standards work
31
CONTRIBUTORS
īƒ’ James E. Cabral Jr. – IJIS/OASIS and MTGM LLC
īƒ’ David Webber – Oracle Public Sector NIEM team
īƒ’ Farrukh Najmi – OASIS ebXML RegRep, SunXACML
project and Wellfleet Software
32
RESOURCES
īƒ’ OASIS CAM and tools project site
https://www.oasis-open.org/committees/cam
http://cameditor.org (sourceforge.net)
īƒ’ OASIS XACML and tools project site
https://www.oasis-open.org/committees/xacml
http://sunxacml.sourceforge.net/
īƒ’ OASIS ebXML RegRep and Implementing Registry
https://wiki.oasis-open.org/regrep/
http://goo.gl/cEpnC
33

More Related Content

Similar to GRA, NIEM and XACML Security Profiles July 2012

RDA FAIR Data Maturity Model
RDA FAIR Data Maturity ModelRDA FAIR Data Maturity Model
RDA FAIR Data Maturity Model
OpenAIRE
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meetingfcleary
 
Updates on the FAIR Data Maturity Model RDA Working Group & the DG RTD FAIR i...
Updates on the FAIR Data Maturity Model RDA Working Group & the DG RTD FAIR i...Updates on the FAIR Data Maturity Model RDA Working Group & the DG RTD FAIR i...
Updates on the FAIR Data Maturity Model RDA Working Group & the DG RTD FAIR i...
EOSC-hub project
 
Forecast 2014: SaaS Data Exchange
Forecast 2014: SaaS Data ExchangeForecast 2014: SaaS Data Exchange
Forecast 2014: SaaS Data Exchange
Open Data Center Alliance
 
Wp4 overall approach_v1
Wp4 overall approach_v1Wp4 overall approach_v1
Wp4 overall approach_v1
Privacy Data Protection for Engineering
 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Canada
 
MUSES WP5 Final Conclusions
MUSES WP5 Final ConclusionsMUSES WP5 Final Conclusions
MUSES WP5 Final Conclusions
Paloma De Las Cuevas
 
Lecture 1 database system notes full.pptx
Lecture 1 database system notes full.pptxLecture 1 database system notes full.pptx
Lecture 1 database system notes full.pptx
salutiontechnology
 
LeilaKarimi_BigD685.pdf
LeilaKarimi_BigD685.pdfLeilaKarimi_BigD685.pdf
LeilaKarimi_BigD685.pdf
C181236FoziaSultana
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
ArslanButt52
 
Next generation Data Governance
Next generation Data GovernanceNext generation Data Governance
Next generation Data Governance
Vladimiro Borsi
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
anthonywong
 
Share cics policy (2844)
Share cics policy (2844)Share cics policy (2844)
Share cics policy (2844)
nick_garrod
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Kenneth Peeples
 
IRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET Journal
 
Svcc services presentation (Silicon Valley code camp 2011)
Svcc services presentation (Silicon Valley code camp 2011)Svcc services presentation (Silicon Valley code camp 2011)
Svcc services presentation (Silicon Valley code camp 2011)Jen Wong
 
RDM shared services at IDCC
RDM shared services at IDCCRDM shared services at IDCC
RDM shared services at IDCC
Jisc RDM
 
Database systems - Chapter 1
Database systems - Chapter 1Database systems - Chapter 1
Database systems - Chapter 1
shahab3
 
Jisc research data shared service overview IDCC 2016
Jisc research data shared service overview IDCC 2016Jisc research data shared service overview IDCC 2016
Jisc research data shared service overview IDCC 2016
Jisc RDM
 

Similar to GRA, NIEM and XACML Security Profiles July 2012 (20)

RDA FAIR Data Maturity Model
RDA FAIR Data Maturity ModelRDA FAIR Data Maturity Model
RDA FAIR Data Maturity Model
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
 
Updates on the FAIR Data Maturity Model RDA Working Group & the DG RTD FAIR i...
Updates on the FAIR Data Maturity Model RDA Working Group & the DG RTD FAIR i...Updates on the FAIR Data Maturity Model RDA Working Group & the DG RTD FAIR i...
Updates on the FAIR Data Maturity Model RDA Working Group & the DG RTD FAIR i...
 
Forecast 2014: SaaS Data Exchange
Forecast 2014: SaaS Data ExchangeForecast 2014: SaaS Data Exchange
Forecast 2014: SaaS Data Exchange
 
Wp4 overall approach_v1
Wp4 overall approach_v1Wp4 overall approach_v1
Wp4 overall approach_v1
 
Review_2013
Review_2013Review_2013
Review_2013
 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
 
MUSES WP5 Final Conclusions
MUSES WP5 Final ConclusionsMUSES WP5 Final Conclusions
MUSES WP5 Final Conclusions
 
Lecture 1 database system notes full.pptx
Lecture 1 database system notes full.pptxLecture 1 database system notes full.pptx
Lecture 1 database system notes full.pptx
 
LeilaKarimi_BigD685.pdf
LeilaKarimi_BigD685.pdfLeilaKarimi_BigD685.pdf
LeilaKarimi_BigD685.pdf
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
Next generation Data Governance
Next generation Data GovernanceNext generation Data Governance
Next generation Data Governance
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
 
Share cics policy (2844)
Share cics policy (2844)Share cics policy (2844)
Share cics policy (2844)
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
 
IRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using Blockchain
 
Svcc services presentation (Silicon Valley code camp 2011)
Svcc services presentation (Silicon Valley code camp 2011)Svcc services presentation (Silicon Valley code camp 2011)
Svcc services presentation (Silicon Valley code camp 2011)
 
RDM shared services at IDCC
RDM shared services at IDCCRDM shared services at IDCC
RDM shared services at IDCC
 
Database systems - Chapter 1
Database systems - Chapter 1Database systems - Chapter 1
Database systems - Chapter 1
 
Jisc research data shared service overview IDCC 2016
Jisc research data shared service overview IDCC 2016Jisc research data shared service overview IDCC 2016
Jisc research data shared service overview IDCC 2016
 

More from Bizagi Inc

Oracle BPM Adaptive Case Management 2014
Oracle BPM Adaptive Case Management 2014Oracle BPM Adaptive Case Management 2014
Oracle BPM Adaptive Case Management 2014
Bizagi Inc
 
Oracle BPM workflow and Open-XDX web services (Part 2)
Oracle BPM workflow and Open-XDX web services (Part 2)Oracle BPM workflow and Open-XDX web services (Part 2)
Oracle BPM workflow and Open-XDX web services (Part 2)
Bizagi Inc
 
NIEM and XML for Architects and Developers
NIEM and XML for Architects and DevelopersNIEM and XML for Architects and Developers
NIEM and XML for Architects and Developers
Bizagi Inc
 
Ottawa NIEM SOA Open Data Event
Ottawa NIEM SOA Open Data EventOttawa NIEM SOA Open Data Event
Ottawa NIEM SOA Open Data Event
Bizagi Inc
 
NIEM, CAM and Open-XDX tools
NIEM, CAM and Open-XDX toolsNIEM, CAM and Open-XDX tools
NIEM, CAM and Open-XDX tools
Bizagi Inc
 
Introducing Open XDX Technology for Open Data API development
Introducing Open XDX Technology for Open Data API developmentIntroducing Open XDX Technology for Open Data API development
Introducing Open XDX Technology for Open Data API development
Bizagi Inc
 
NIEM and Future SAR
NIEM and Future SARNIEM and Future SAR
NIEM and Future SAR
Bizagi Inc
 
CAM editor NIEM Evaluation Report
CAM editor NIEM Evaluation ReportCAM editor NIEM Evaluation Report
CAM editor NIEM Evaluation Report
Bizagi Inc
 
NIEM Overview Rule Ml November 2011
NIEM Overview Rule Ml November 2011NIEM Overview Rule Ml November 2011
NIEM Overview Rule Ml November 2011
Bizagi Inc
 
EML V7 Election Standard Overview
EML V7 Election Standard OverviewEML V7 Election Standard Overview
EML V7 Election Standard Overview
Bizagi Inc
 
NIEM and Oracle Overview October 2011
NIEM and Oracle Overview October 2011NIEM and Oracle Overview October 2011
NIEM and Oracle Overview October 2011
Bizagi Inc
 
Xml Validation Test Suite With Camv
Xml Validation Test Suite With CamvXml Validation Test Suite With Camv
Xml Validation Test Suite With Camv
Bizagi Inc
 

More from Bizagi Inc (12)

Oracle BPM Adaptive Case Management 2014
Oracle BPM Adaptive Case Management 2014Oracle BPM Adaptive Case Management 2014
Oracle BPM Adaptive Case Management 2014
 
Oracle BPM workflow and Open-XDX web services (Part 2)
Oracle BPM workflow and Open-XDX web services (Part 2)Oracle BPM workflow and Open-XDX web services (Part 2)
Oracle BPM workflow and Open-XDX web services (Part 2)
 
NIEM and XML for Architects and Developers
NIEM and XML for Architects and DevelopersNIEM and XML for Architects and Developers
NIEM and XML for Architects and Developers
 
Ottawa NIEM SOA Open Data Event
Ottawa NIEM SOA Open Data EventOttawa NIEM SOA Open Data Event
Ottawa NIEM SOA Open Data Event
 
NIEM, CAM and Open-XDX tools
NIEM, CAM and Open-XDX toolsNIEM, CAM and Open-XDX tools
NIEM, CAM and Open-XDX tools
 
Introducing Open XDX Technology for Open Data API development
Introducing Open XDX Technology for Open Data API developmentIntroducing Open XDX Technology for Open Data API development
Introducing Open XDX Technology for Open Data API development
 
NIEM and Future SAR
NIEM and Future SARNIEM and Future SAR
NIEM and Future SAR
 
CAM editor NIEM Evaluation Report
CAM editor NIEM Evaluation ReportCAM editor NIEM Evaluation Report
CAM editor NIEM Evaluation Report
 
NIEM Overview Rule Ml November 2011
NIEM Overview Rule Ml November 2011NIEM Overview Rule Ml November 2011
NIEM Overview Rule Ml November 2011
 
EML V7 Election Standard Overview
EML V7 Election Standard OverviewEML V7 Election Standard Overview
EML V7 Election Standard Overview
 
NIEM and Oracle Overview October 2011
NIEM and Oracle Overview October 2011NIEM and Oracle Overview October 2011
NIEM and Oracle Overview October 2011
 
Xml Validation Test Suite With Camv
Xml Validation Test Suite With CamvXml Validation Test Suite With Camv
Xml Validation Test Suite With Camv
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

GRA, NIEM and XACML Security Profiles July 2012

  • 1. POLICY CONTROL PROFILES WITH GRA AND NIEM James Cabral, David Webber, Farrukh Najmi, July 2012
  • 2. EXECUTIVE OVERVIEW Managing information privacy and access policies has become a critical need and technical challenge. The desired solution should be ubiquitous, syntax neutral but a simple and lightweight approach that meets the legal policy requirements though the application of clear, consistent and obvious assertions. Today we have low-level tools that developers know how to implement with, and we have legal documents created by lawyers, but then there is a chasm between these two worlds. 2
  • 3. LEGAL AND RULES TECHNOLOGIES The RuleML community has long understood this and developed and is developing new and improved methods and solutions. The challenge is in taking these approaches and being able to apply these to NIEM XML based information sources in a high level conceptual way that is accessible to information analysts and general NIEM practitioners, rather than the provence of specialized XML-programmers only. Then we also need these techniques to be broadly applicable, using existing open public software standards and tools so we can enable the widest possible adoption within the NIEM community. 3
  • 4. APPROACH The solution we are introducing will: īƒ’ Provide a clear declarative assertions based method, founded on policy approaches developed by the rules community, īƒ’ Leveraging open software standards and tools and īƒ’ Enabling business information analysts to apply and manage the policy profiles Show illustrative design time and run time examples by: īƒ’ Visually assigning exchange components and rule assertions īƒ’ Show applying this to retrieval of documents stored with registry and repository services. 4
  • 5. APPLICATION SCENARIO OVERVIEW Electronic Policy Statements 5 Policy Rules Portal User Dashboard 1 Apply Policy Rules to Requested Case Content 4 Users see only information permitted by their role and policy profile Request Output Templates Output Templates Information Requests 2 Case Management Registry Services 3 Output Templates Output Templates Case Documents XML Response Output Templates Output Templates Requested Information 5 User Profiles
  • 6. PRESENTATION AGENDA īƒ’ Part 1 īƒ‰Problem introduction and policy methods overview īƒ’ Part 2 īƒ‰Design time technical walkthrough of rule assertions example īƒ’ Part 3 īƒ‰Run time deployment with registry services
  • 7. PART 1 – PROBLEM INTRODUCTION Policy Methods Overview
  • 8. USE CASE – SAR CASE MANAGEMENT īƒ’ Three levels of information access īƒ‰ Citizen level reporting - SAR statistics īƒ‰ Local law enforcement officials - case review īƒ‰ State and Federal - case management and coordination īƒ’ This means three profiles: īƒ‰ Profile 1 - Registry query - statistics results īƒ‰ Profile 2 - Local staff īƒ‰ Profile 3 - Regional staff 8 SAR – Suspicious Activity Report
  • 9. POLICY GRANULARITY Electronic Policy Statements Coarse- Grained Role-based authorization of subjects. Access granted to coarse-grained data objects. E.g., “Permit law enforcement to access the NCIC Wanted Persons Database.” Fine-Grained Attribute-based authorization of subjects. Access limited to specific data objects based on attributes. E.g., “Permit law enforcement to access criminal history records if the records were created by the requester’s agency.” 9
  • 10. īƒ’ Actions. RULE AND CONTEXT METADATA Electronic Policy Statements 10 Properties of the access rules and environment. â€ĸ Conditions. – Subject. – Resource. – Policy. â€ĸ Obligations.
  • 11. īƒ’ Express policies in a structured language (e.g., XML) īƒ’ Identify requesters īƒ’ Compare data collection and release purposes īƒ’ Enforce retention rules īƒ’ Notify data owners and subscribers īƒ’ Verify compliance PRIVACY AND SECURITY ARCHITECTURES Privacy and Security Architectures 11
  • 12. MAPPING TO DATA STANDARDS Privacy and Security Architectures 12 â€ĸGFIPMUser Metadata â€ĸNIEM â€ĸGFIPM Content Metadata â€ĸXACMLActions Electronic Policy Statements
  • 13. īƒ’ A mechanism to specify policy rules in unambiguous terms īƒ’ XML Access Control Markup Language (XACML) īƒ‰ Machine-readable īƒ‰ Supports federated and dynamic policies POLICY AUTHORING LANGUAGE Privacy and Security Architectures 13
  • 14. XACML ARCHITECTURE Privacy and Security Architectures 14 Term Description PAP Policy Administration Point - Point which manages policies PDP Policy Decision Point - Point which evaluates and issues authorization decisions PEP Policy Enforcement Point - Point which intercepts user's access request to a resource and enforces PDP's decision. PIP Policy Information Point - Point which can provide external information to a PDP, such as LDAP attribute information. http://en.wikipedia.org/wiki/XACML
  • 15. XACML STATEMENTS Privacy and Security Architectures 15 PolicySets Policies Rules â€ĸObligations â€ĸFunctions Targets â€ĸAttributes
  • 16. Policy Matrix Rule XACML Statement Party Subject to Rule Subject Condition(s) Conditions. Subject(s) Subject(s). Subject Information Context Subject(s) attributes. Rule Action Action(s). Action(s) attributes. Data Resource Subject to Rule Target Resource(s) Resource(s). Other Resource Context Resource(s) attributes. Other Resource Conditions Conditions. Circumstances in Which the Rule Applies General or Action Policy Conditions Purpose(s). Obligations and Environments If [zero or more [Subject(s) Action(s) and/or Resource(s), and/or Environment(s) attributes) [Condition(s)] are met] with [zero or more Obligation(s) to be performed]. Rule Activity Deny/Permit by Statute/Policy Effect = PERMIT or DENY. Administrative Information Precedence PolicyCombiningAlgorithm(s), RuleCombiningAlgorithm(s). References PolicyID, RuleID. Linkages PolicyID, RuleID. Policy Matrix Editors Does not translate to XACML. ENCODING RULES INTO XACML Privacy and Security Architectures 16
  • 17. PART 2 – DESIGN TIME WALKTHROUGH Design Time Rule Assertions Concepts
  • 18. USING POLICY TEMPLATES īƒ’ Traditional NIEM approach focuses on the information exchange data handling īƒ’ Uses XSD schema to define content structure and metadata īƒ’ Need is for a bridge between the NIEM schema, the XML information instances and the XACML rule assertion language īƒ’ Approach is based on visual content structure templates with declarative rule assertions 18
  • 19. D E P L O Y E D APPROACH IN A NUTSHELL XACML Engine Rule Assertions P O L I C I E S Output Templates Output Templates Exchange Structures Policy Assertion Template 2 S C H E M A NIEM IEPD 1 XACML Generation Tool 3 XACML XML Script 4 Rules Asserted to Nodes in the Exchange Structure via simple XPath associations 19
  • 20. SAR VISUAL TEMPLATE + RULE ASSERTIONS Rules Assertions associate and control access privacy to specific content areas in the SAR details structure Visual metaphor allows policy analysts to verify directly 20
  • 21. Rule Assertions NIEM data flows NIEM / GRA OPERATIONAL SCENARIO XACML Engine Information Exchange 5 INTERFACES P O L I C I E S CAM Editor Visual Designer Output Templates Output Templates Exchange Templates 1 Information Exchange 3 INTERFACES 4 S C H E M A NIEM IEPD NIEM XML NIEM XML Generated XACML Rules 2 21
  • 22. CAM TOOLKIT + CAMV ENGINE īƒ’ Open source solutions – designed to support XML and industry vocabularies and components for information exchanges īƒ’ Implementing the OASIS Content Assembly Mechanism (CAM) public standard īƒ’ CAMV validation framework and test suite tools īƒ’ Development sponsored by Oracle CAM Editor resources site: http://www.cameditor.org 22
  • 23. NEXT STEPS īƒ’ Enhance CAM Editor UI to provide wizards for policy rule assertion entry īƒ’ Provide XSLT to generate XACML from CAM template īƒ’ Enhance reporting tools to show policy details in plain English details īƒ’ Test with sample JPS NIEM exchange schema 23
  • 24. PART 3 – DEPLOYMENT WITH REGISTRY Illustrative deployment with XACML services and application
  • 25. APPLICATION SCENARIO DETAILS Electronic Policy Statements 25 Policy Rules Portal User Dashboard 1 Apply Policy Rules to Requested Case Content (PDP Engine) 4Users see only information permitted by their role and policy profile Request Output Templates Output Templates Information Requests 2 Case Management + PAP Registry Services 3 Output Templates Output Templates Case Documents XML Response (PEP) Output Templates Output Templates Requested Information 5 User Profiles XMLXMLXML XACML
  • 26. REGISTRY POLICY ENFORCEMENT Privacy and Security Architectures 26 PAP â€ĸDefines policies. â€ĸMonitors compliance. PDP â€ĸReceives requests from the PEP. â€ĸIdentifies policies that match each request. â€ĸEvaluates request and environment attributes. â€ĸDirects the PEP. PEP â€ĸDiscloses or redacts the information or denies the request. â€ĸLogs the request and action. â€ĸNotifies of the request and action.
  • 27. PRIVACY POLICY TECHNICAL FRAMEWORK Privacy and Security Architectures 27
  • 28. PUBLISHING CONTENT (BULK IMPORT TOOL) Bulk loader will trawl server and folder location for content – e.g. original SAR XML documents Bulk Publish of SAR documents 28
  • 29. SAR DISCOVERY AND RETRIEVAL SAR Discovery Query (easily extended / tailored without code changes) allows rapid prototyping and verification of content and operations Results returned digest and content retrieval options 29
  • 31. KEY MESSAGES īƒ’ Dramatically simpler policies adoption īƒ’ Can be rapidly developed with existing tools īƒ’ Can be visually inspected and verified by policy analysts īƒ’ Enables use of dynamic contextual policies īƒ’ Supports international standards work 31
  • 32. CONTRIBUTORS īƒ’ James E. Cabral Jr. – IJIS/OASIS and MTGM LLC īƒ’ David Webber – Oracle Public Sector NIEM team īƒ’ Farrukh Najmi – OASIS ebXML RegRep, SunXACML project and Wellfleet Software 32
  • 33. RESOURCES īƒ’ OASIS CAM and tools project site https://www.oasis-open.org/committees/cam http://cameditor.org (sourceforge.net) īƒ’ OASIS XACML and tools project site https://www.oasis-open.org/committees/xacml http://sunxacml.sourceforge.net/ īƒ’ OASIS ebXML RegRep and Implementing Registry https://wiki.oasis-open.org/regrep/ http://goo.gl/cEpnC 33