modelling and reasoning languages for social networks policies

25
Modelling and Reasoning Languages for Social Networks Policies Guido Governatori and Renato Iannella EDOC 2009 c NICTA 2009 1 / 20

Upload: guido-governatori

Post on 14-Jun-2015

84 views

Category:

Social Media


0 download

DESCRIPTION

Presentation given at EDOC 2009 on policy languages for social networks. Full paper available at http://www.governatori.net/papers/2010/eis10networks.pdf

TRANSCRIPT

Page 1: Modelling and Reasoning Languages for Social Networks Policies

Modelling and Reasoning Languagesfor Social Networks Policies

Guido Governatori and Renato Iannella

EDOC 2009

c© NICTA 2009 1 / 20

Page 2: Modelling and Reasoning Languages for Social Networks Policies

The SPIN project: networks, people, information, sharing

Advanced Research on Web 2.0 Platforms for Profiles and Policiestowards improved Interoperability for Online Communities

Partial Profiles

User in ControlExposureMultiple ProfilesDistributed

Semantic Profiles

Increased NetworkThemesOpinionsExperience

Shared Policies

c© NICTA 2008 2 / 20

Page 3: Modelling and Reasoning Languages for Social Networks Policies

SPIN Shared Policies

Create an infrastructure to represent policies (e.g., privacy, rights, etc)for social networks. The framework includes languages to define policies,and tools to manipulate and reasoning with the policies

Expressive Language to capturesocial networks concepts

Conceptual languages to allowsfor end user transparency,accountability and policyawareness

Scalable reasoning techniques

Combination of policies: SocialNetwork policies and (multiple)user policies

PrivacyPolicy

Terms&

Conditions

SecurityPolicy

Unified policy

AccessPolicy

MyPublicPolicy

MyPrivatePolicy

MyPublicPolicy

MyPublicPolicy

MyPublicPolicy

MyPrivatePolicy

MyPrivatePolicy

MyPrivatePolicy

c© NICTA 2008 3 / 20

Page 4: Modelling and Reasoning Languages for Social Networks Policies

Policy Challenges

Policy Expression – how to unambiguously define the termsand conditions of a policy.

Policy Transparency – how to ensure all parties are aware ofthe policy and its implications.

Policy Conflict – how to detect potential incompatibilitiesbetween dependent policies.

Policy Accountability – how to track policy exceptions andobligations.

c© NICTA 2008 4 / 20

Page 5: Modelling and Reasoning Languages for Social Networks Policies

Policies on Social Networks

c© NICTA 2008 5 / 20

Page 6: Modelling and Reasoning Languages for Social Networks Policies

Key Policy Language Elements

A clear identification of the Asset (for any type of SocialNetwork content).

Actions that are allowed to be performed (Permissions) or notallowed to be performed (Prohibitions) can be articulated.

All the Parties involved can be specified (who assigns rights towhom).

Any Duties on Parties can be stipulated (their obligations thatmust be meet).

Constraints can be enumerated for any of the key entities.

c© NICTA 2008 6 / 20

Page 7: Modelling and Reasoning Languages for Social Networks Policies

ODRL: From Digital Right To Social Network

c© NICTA 2008 7 / 20

Page 8: Modelling and Reasoning Languages for Social Networks Policies

Social Network Use Case

Alice wants to give access to her wedding pictures only to peoplethat are fellows on both Flickr and Twitter and that have a blogshe commented at least twice during the last 10 days.

c© NICTA 2008 8 / 20

Page 9: Modelling and Reasoning Languages for Social Networks Policies

Dissecting Alice

Identifying the Wedding Photos

Alice is assigning rights

The permission is viewing

The recipient of the permission is the group of people thatmeet all of these criteria

Members of Flickr and Twitter, andHave Blog sites, andAlice has commented at least twice on these blogs,In the last 10 days.

c© NICTA 2008 9 / 20

Page 10: Modelling and Reasoning Languages for Social Networks Policies

Alice in ORDL

c© NICTA 2008 10 / 20

Page 11: Modelling and Reasoning Languages for Social Networks Policies

FCL: Policy Reasoning

policy conditions have a normative nature;

policy conditions can have exceptions;

conditions in policy can conflict with each other;

policies in a social networks can come from different sources;

policy conditions sometimes involve violations of other policyconditions.

c© NICTA 2008 11 / 20

Page 12: Modelling and Reasoning Languages for Social Networks Policies

Alice in Wonderland

Suppose that the network offers members the facility to createblacklists where a member can list members of the networks thatcannot access the member resources, and the user can specifyrestrictions on the resources available to members in a blacklist.

Alice decided that blacklisted members cannot access her resourcesat all. Moreover, suppose that Alice put Bob in the photoblacklist, but she has posted a few recent comments on Bob’sblog, and Bob is a member of the categories listed in Aliceconditions to access her wedding pictures.

c© NICTA 2008 12 / 20

Page 13: Modelling and Reasoning Languages for Social Networks Policies

Alice in Wonderland

Suppose that the network offers members the facility to createblacklists where a member can list members of the networks thatcannot access the member resources, and the user can specifyrestrictions on the resources available to members in a blacklist.

Alice decided that blacklisted members cannot access her resourcesat all. Moreover, suppose that Alice put Bob in the photoblacklist, but she has posted a few recent comments on Bob’sblog, and Bob is a member of the categories listed in Aliceconditions to access her wedding pictures.

c© NICTA 2008 12 / 20

Page 14: Modelling and Reasoning Languages for Social Networks Policies

Alice in Wonderland. Chapter 2

The network has another feature. Each user has a profile page, andthe user has to upload a picture to the profile page, and thispicture is available to everybody in the network. Members who donot comply with the above conditions cannot access othermembers’ private resources.

Alice puts a picture of her wedding as her public photo. Carl isanother Flickr and Twitter fellow of Alice (not in her blacklist, andshe repeatedly posted in his blog during the past week) who doesnot have his public picture in his profile.

c© NICTA 2008 13 / 20

Page 15: Modelling and Reasoning Languages for Social Networks Policies

Alice in Wonderland. Chapter 2

The network has another feature. Each user has a profile page, andthe user has to upload a picture to the profile page, and thispicture is available to everybody in the network. Members who donot comply with the above conditions cannot access othermembers’ private resources.

Alice puts a picture of her wedding as her public photo. Carl isanother Flickr and Twitter fellow of Alice (not in her blacklist, andshe repeatedly posted in his blog during the past week) who doesnot have his public picture in his profile.

c© NICTA 2008 13 / 20

Page 16: Modelling and Reasoning Languages for Social Networks Policies

FCL Blueprint

Combination of an efficient non-monotonic logic (defeasible logic) and adeontic logic of violation.

Used to model contracts, and business process compliance.

Facts are indisputable statements.

Defeasible rules are rules that can be defeated by contrary evidence.

A1, . . . ,An⇒ C

The superiority relation is a binary relation defined over the set ofrules. The superiority relation determines the relative strength oftwo (conflicting) rules.

Extended with deontic operators O,P,F ,⊗, obligation, permission,prohibition, violation (binary)

A1, . . . ,An⇒ OB1⊗·· ·⊗OBm

c© NICTA 2008 14 / 20

Page 17: Modelling and Reasoning Languages for Social Networks Policies

Reasoning with Policies

Positive defeasible conclusions: meaning that the conclusionscan be defeasible proved;

Negative defeasible conclusions: meaning that one can showthat the conclusion is not even defeasibly provable.

1 A is a fact; or2 there is an applicable defeasible rule for A, and either

1 all the rules for ¬A are discarded (i.e., not applicable) or2 every applicable rule for ¬A is weaker than an applicable strict

or defeasible rule for A.

c© NICTA 2008 15 / 20

Page 18: Modelling and Reasoning Languages for Social Networks Policies

Reasoning with Policies

Positive defeasible conclusions: meaning that the conclusionscan be defeasible proved;

Negative defeasible conclusions: meaning that one can showthat the conclusion is not even defeasibly provable.

1 A is a fact; or2 there is an applicable defeasible rule for A, and either

1 all the rules for ¬A are discarded (i.e., not applicable) or2 every applicable rule for ¬A is weaker than an applicable strict

or defeasible rule for A.

c© NICTA 2008 15 / 20

Page 19: Modelling and Reasoning Languages for Social Networks Policies

FCL at Work: Exceptions

Member resources on the network can be access by everybody,unless a resource is declared private

r1 :resource(x)⇒ P access(x)

r2 :private(x),¬owner(x ,y)⇒ Oy¬access(x)

r1 ≺ r2

c© NICTA 2008 16 / 20

Page 20: Modelling and Reasoning Languages for Social Networks Policies

FCL at Work: Conflicts

Alice’s wedding pictures policy

p1 : wedding photo(x),flickr(y), twitter(y),

blog(z ,y),posted(a,z , t1),posted(a,z , t2),

t1 > Now −10, t2 > Now −10⇒ Pyaccess(x)

r2 ≺ p1

If a member is a in blacklist then the member cannot accessprivate resources

p2 : private(x),blacklist(y)⇒ Oy¬access(x)

p1 ≺ p2

c© NICTA 2008 17 / 20

Page 21: Modelling and Reasoning Languages for Social Networks Policies

FCL at Work: Conflicts

Alice’s wedding pictures policy

p1 : wedding photo(x),flickr(y), twitter(y),

blog(z ,y),posted(a,z , t1),posted(a,z , t2),

t1 > Now −10, t2 > Now −10⇒ Pyaccess(x)

r2 ≺ p1

If a member is a in blacklist then the member cannot accessprivate resources

p2 : private(x),blacklist(y)⇒ Oy¬access(x)

p1 ≺ p2

c© NICTA 2008 17 / 20

Page 22: Modelling and Reasoning Languages for Social Networks Policies

FCL at Work: Violations

1 each member has to upload a picture to the profile page, andthis picture is available to everybody in the network

2 members who do not comply with the above conditionscannot access other members’ private resources

r3 : ⇒ Oxpublish public⊗Ox¬access(y)

c© NICTA 2008 18 / 20

Page 23: Modelling and Reasoning Languages for Social Networks Policies

Where are we?

fully implemented FCL rule engine (SPINdle, open source)

implementing a policy based social network server (prototype)

basic conflict detection and conflict resolution

What’s missing?

user friendly policy editor

better models of policy integration

scalability study

c© NICTA 2008 19 / 20

Page 24: Modelling and Reasoning Languages for Social Networks Policies

Where are we?

fully implemented FCL rule engine (SPINdle, open source)

implementing a policy based social network server (prototype)

basic conflict detection and conflict resolution

What’s missing?

user friendly policy editor

better models of policy integration

scalability study

c© NICTA 2008 19 / 20

Page 25: Modelling and Reasoning Languages for Social Networks Policies

If you are interested

http://spin.nicta.org.au

http://spin.nicta.org.au/spindleOnline

c© NICTA 2008 20 / 20