Speech Acts and Tokens for Access Control and Provenance Tracking
Fabian Neuhaus (NCOR) & Bill Andersen (Highfleet) STIDS 2011
Speech Acts and Tokens for Access Control and Provenance Tracking - - PowerPoint PPT Presentation
Speech Acts and Tokens for Access Control and Provenance Tracking Fabian Neuhaus (NCOR) & Bill Andersen (Highfleet) STIDS 2011 Sorry Fabian cant be with us today 1 Neuhaus & Andersen, STIDS 2011 17 Nov 2011 Problem Statement
Fabian Neuhaus (NCOR) & Bill Andersen (Highfleet) STIDS 2011
Neuhaus & Andersen, STIDS 2011 1
17 Nov 2011
} There is trust among producers and consumers of data } There is little or no noise in the data
} Intelligence, LE, engineering, health care, E-science
} Multiple data sources } Need to protect sources and methods } Need to protect privacy } Need to control release of sensitive information } Need to support consumer confidence in integrated data
2 Neuhaus & Andersen, STIDS 2011 17 Nov 2011
(T) Asset says AQ has nuke at location L (S) AQ has nuke at location L (U) NYT reports Azhar claims AQ has nuke (T) If AQ has nuke then it’s Pakistani (T) Pakistan controls all their nukes
shared
3 Neuhaus & Andersen, STIDS 2011 Provide all independent records (from A, B, & C) that support that Al Qaeda has WMD 17 Nov 2011
Neuhaus & Andersen, STIDS 2011 4
} The right answer depends on access controls
} The right answer depends on provenance
} Hearsay (source of data external to provenance control) } Logical inconsistency } More about hearsay later
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 5
} Formal languages } Propositions } Sentence types } Sentence tokens } Speech acts
} Proof calculus } Axiomatization of supportedBy relation
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 6
} Need not be overtly logical } DBs, for example, will do
} …not restricted to overtly logical languages
} …or constituted of material objects (ask me offline)
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 7
} Records history of operations on tokens inherent to operation
} Examples
} Copying } Algorithmic transformations } Automated theorem proving
} Records history of tokens as originating from agents’
} Intention is essential to this view
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 8
} Except perhaps recording transaction time, etc
} Assertive (updates) } Interrogative (queries)
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 9
} Discretionary and mandatory access control } IT and “hearsay” provenance tracking } Privacy (not discussed in this work)
} Direct implementation of this formal system not required to
} Best to think of it as a specification of correct behavior that
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 10
} (that (likes fabian cookies)) } Φ iff ((that Φ)) … for all formulas Φ
} ⃟Φ – Φ is logically possibly true } ☐Φ – Φ is logically necessarily true
} Contradictions don’t introduce chaos
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 11
} a unary relation that ranges over tokens
} a one-place function from tokens to systems
} a one-place function from tokens to propositions
} a binary relation on propositions and token sequences
} A binary relation between tokens
} a unary relation that ranges over assertive speech acts
17 Nov 2011
(T) Asset says AQ has nuke at location L (S) AQ has nuke at location L (U) NYT reports Azhar claims AQ has nuke (T) If AQ has nuke then it’s Pakistani (T) Pakistan controls all their nukes
shared
12 Neuhaus & Andersen, STIDS 2011 Provide all independent records (from A, B, & C) that support that Al Qaeda has WMD 17 Nov 2011
Neuhaus & Andersen, STIDS 2011 13
Assertive speech act records the claim of 007 that Al Qaeda has a nuclear weapon 17 Nov 2011
Neuhaus & Andersen, STIDS 2011 14
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 15
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 16
} (Record(x) & ⃟PC(x)) → PC(x)[x]
} A → A[]
} (A[s1] & B[s2] & ⃟(A&B)) → (A&B)[s1s2]
} (A[s] & ☐(A→B)) → B[s]
} (⃟A & (∃x(AA(x) & PC(x)=(that A)))[s]) → A[s]
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 17
1) ∀x(NuclWeap(x) → WMD(x))[ ] 2) ∃x(AssertionAct(x) & Speaker(x source007) & Date(x) = 20.10.2011) & PropositionalContent(x) = (that(∃y(Owns(alQaeda y)&NuclWeap(y)))[token001] 3) ☐((∃x(A & B & C & D)) → ∃x(A & D)) 4) ∃x(AssertionAct(x) & PropositionalContent(x) = (that(∃y(Owns(alQaeda y)&NuclWeap(y)))[token001] 5) ⃟(∃y(Owns(alQaeda y)&NuclWeap(y))) 6) ∃y(Owns(alQaeda y) & NuclWeap(y))[token001] 7) ⃟(∀x(NuclWeap(x) → WMD(x))& ∃y(Owns(alQaeda y) & NuclWeap(y))) 8) (∀x(NuclWeap(x) → WMD(x)) & ∃y(Owns(alQaeda y) & NuclWeap(y)))[token001] 9) ☐((∀x(NuclWeap(x) → WMD(x)) & ∃y(Owns(alQaeda y) & WMD(y))) → ∃x(Owns(alQaeda x) & NuclWeap(x))) 10) ∃x(Owns(alQaeda x) & NuclWeap(x))[token001]
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 18
} Tokens provide ontological and logical foundation for access
} Also enabling the tracking of “hearsay” provenance
} We are exploring application of these results to our work
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 19
} Currently limited to atomic sentences } Integration with XKS (CL-based) and triple store (RDF-based)
} Does not (but could) incorporate hearsay tracking
17 Nov 2011
Neuhaus & Andersen, STIDS 2011 20
17 Nov 2011