polipo: policies & ontologies for interoperability, portability, and autonomy daniel trivellato
TRANSCRIPT
![Page 1: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/1.jpg)
POLIPO: Policies & OntoLogies for Interoperability, Portability,
and autOnomy
Daniel Trivellato
![Page 2: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/2.jpg)
Outline
• Problem Definition
• Approach
• POLIPO• Language requirements• Policy language syntax• Reputation system• Credential Chain Discovery Algorithm
![Page 3: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/3.jpg)
Example Scenario
NATO surveillance mission
Goals
USA
GBR
CANADA
read if Senior Officer
Senior Officer???
NATO Definitions
Senior Officer is an Officer with at least 10 years of service
Aaahhhhhh!!!!
![Page 4: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/4.jpg)
![Page 5: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/5.jpg)
Problem Definition (1/2)
• Goal: Situational awareness in a System of Systems
• independent, heterogeneous components
DISTRIBUTED AUTHORITY
MUTUAL UNDERSTANDING
• dynamic (re-)configurations (join and leave)
AVAILABILITY
ACCOUNTABILITY
![Page 6: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/6.jpg)
Problem Definition (2/2)
• Security goals:
• protection of sensitive data from unauthorized disclosure, using content- and context-aware security policies
• secure interaction between (possibly untrusted) parties of dynamic coalitions
• interoperability between heterogeneous systems and policy models, tuning local policies to ensure global security
![Page 7: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/7.jpg)
Proposed Solutions
• Access Control to specify the permissions of subjects on objects
• Trust Management to establish trust between unknown parties
• Ontologies to enable mutual-understanding
![Page 8: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/8.jpg)
Ontologies (1/2)
• Formally represent domain knowledge• Define concepts, instances and (binary)
relationships in a domain• Constraints allow to infer information not
explicitly stated• Each ontology can refer to concepts defined
in another ontology (reusability)
MO:Officer
PSD:Junior Officer
MO:worksFor NATO:Allied Country
Jack John
NL
PSD:Senior Officer
![Page 9: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/9.jpg)
Ontologies (2/2)
• Ontologies can be used to give semantics to predicates in rules
• Ontologies can also be used to align AC models
• However, in a distributed system …• two entities may refer to the same object
with different names
• two entities may use the same name to refer to different objects
![Page 10: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/10.jpg)
The POLIPO Framework
![Page 11: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/11.jpg)
Application Domains
• Semantic Web• Data protection on the web• Business Processes for Web Services
• Virtual organizations • Maritime Safety and Security (MSS)• Healthcare• Business to Business (B2B)
![Page 12: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/12.jpg)
Language Requirements
• Requirement 1: INTEROPERABILITY
• Requirement 2: AUTONOMY
• Requirement 3: PORTABILITY
![Page 13: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/13.jpg)
Parties shall be able to interact with each other unambiguously
Ontologies denote the semantics of concepts and relationships in the domain
R1 - Interoperability
![Page 14: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/14.jpg)
R2 - Autonomy
Every party shall be able to design and express its policy autonomously
A party must be able to specify its policy independently from the actions and definitions of other parties
![Page 15: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/15.jpg)
• Global ontology
Officer
Officer OfficerJunior Senior
OfficerTemporary
Party 1
DISJOINT
Example
Local extensions to the global ontology Mappings from local to global concepts
WHO DOES THE MAPPINGS? HOW DO WE GUARANTEE THEIR CORRECTNESS?
OfficerTemporary
Party 2
![Page 16: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/16.jpg)
R3 - Portability
Remote evaluation of policies shall preserve the interpretation of the policy owner
• Remote policy evaluations should not grant any permission that would not be granted by a local evaluation
• Use credentials to preserve interpretation of the policy owner
![Page 17: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/17.jpg)
Language Syntax
• Atoms
• Atoms are used to build rules
• Sets of rules make policies
![Page 18: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/18.jpg)
• Ontology atoms: queries to the knowledge base, represented by an ontology• e.g., psd:SeniorOfficer(‘John’)
psd:worksFor(‘John’,’BS’)
• Credential atoms• e.g., cred(‘BS’,’psd:SeniorOfficer’,’John’,
[(‘psd:validUntil’,’31/12/2009’])
• Authorization atoms• e.g., perm(‘psd:read’, ‘John’, ‘File’)
• Constraints: built-ins or user-defined predicates• e.g., X = Y + 3, aboutSuveillance(‘File’)
Syntax: Basic Constructs
![Page 19: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/19.jpg)
• Horn clauses of the form
h b1,…,bn
• h (head) is an atom• b1,…,bn (body) are literals (i.e. positive
or negative atoms)• Negation is treated as negation as
failure• Safety condition: each variable in h, in a
negative literal, or in a built-in also occurs in a positive body literal
Syntax: Rules
![Page 20: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/20.jpg)
• The head is a credential atom • The body can contain positive credential
and ontology atoms, and constraints
Example:cred(‘BS’,‘psd:SeniorOfficer’,X,[]) psd:SeniorOfficer(X)
Credential Release Rules
![Page 21: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/21.jpg)
Authorization Rules
• The head is an authorization atom • The body can contain positive credential,
authorization and ontology atoms, constraints, and negative ontology and constraints
Example:perm(‘psd:read’,X,Y) aboutSurveillance(Y),
cred(‘BS’,‘psd:SeniorOfficer’,X,[])
![Page 22: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/22.jpg)
Constraint Definition Rules
• The head is a user-defined predicate • The body can contain positive ontology
atoms and constraints
Example:aboutSurveillance(X) bs:aboutMission(X,‘Surveillance’),
bs:sensitivityLevel(X,Y), Y<3
![Page 23: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/23.jpg)
• Credential Release Policy:
set of credential release rules
• Authorization Policy:
set of authorization rules
Policies
![Page 24: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/24.jpg)
• Local models may not match the global ontology model• Global terms might be too coarse-grained
to describe a specific domain• Policies need precise definitions to
guarantee security within a domain
• A complete and precise vocabulary alignment is costly• Not feasible in short- and mid-term
cooperation
Problems…
![Page 25: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/25.jpg)
Problems…
GBR
ITA
Officer
OF-3OF-4 OF-2 OF-1
![Page 26: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/26.jpg)
…and Solution
• Local terms to provide fine-grained definitions
• Flexible mapping of• local to global terms• local to local terms
MORE AUTONOMY INTEROPERABILITY AVOID CONFLICTING DEFINITIONS
![Page 27: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/27.jpg)
Ontology Alignment (1/2)
GBR
ITA
Officer
Admiral LieutenantCaptainCommodore
Ufficiale
Generale MaggioreTenenteColonnello Capitano
Goals
read if OF-3
![Page 28: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/28.jpg)
• Mapping local to global concepts is necessary for mutual-understanding
• Mapping local to local concepts is also a possibility
• However, mappings can be imprecise• no 100% equivalent concepts• entities have different mapping capabilities
• Who performs the mapping? How? How do we know if we can trust it?
Ontology Alignment (2/2)
![Page 29: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/29.jpg)
• Extend ontology-based TM with a reputation system• every peer can define a mapping between
two concepts• the trustworthiness (reputation) of a peer
depends on the affinity of its opinions with those of the other peers
• the final mapping is obtained by combining subjective opinions of peers based on their reputation
TM + Reputation System
![Page 30: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/30.jpg)
• Expressed by similarity credentials• e.g., sim(GBR,’Captain’,’SeniorOfficer’,
[(degree,0.7),(timeStamp,2009/09/09)])
• Reflects inequality between concepts• Signed non-repudiation• Similarity Credentials Repository• Exchanged through gossip protocols• More entities can express the similarity
about the same concepts • contrasting opinions• which one should be considered?
Mapping two Concepts
![Page 31: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/31.jpg)
• Combine all the opinions• the average similarity degree is the
“correct” one
• Not all peers are equally trustworthy• Similarity statements discriminated
according to peer’s reputation
Naïve approach
![Page 32: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/32.jpg)
• Reflects the accuracy of the similarity statements of a peer
• Based on agreement with other peers • The agreement between two peers is
proportional to the affinity of their similarity statements
• Steps to compute reputation1. For each pair of comparable similarity statements,
compute their affinity
2. For each pair of peers, compute their agreement
3. Compute the reputation of all peers
Reputation
![Page 33: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/33.jpg)
• Measures the level of correspondence between non-contradicting statements
• st is a local similarity threshold that establishes when two statements are contradictory
Affinity
![Page 34: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/34.jpg)
• Low values of st increase the number of statements considered
• High values of st lead to a more accurate identification of trustworthy peers
Local Similarity Threshold
![Page 35: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/35.jpg)
• Agreement values represented as a matrix• Updated when new credentials are acquired
Agreement
![Page 36: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/36.jpg)
• The reputation of a peer is a value in [0,1]• It is based on its agreement with the other
peers, weighted by their reputation
• The formula converges after t iterations• α is used to bias the computation on the initial
reputation and guarantees convergence• More details in the paper…
Computing Reputation
![Page 37: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/37.jpg)
• for st = 0.6• Order of navies: WS, BS, GC, GS• Initial reputation: 1, 0, 0, 0
• Final reputation values: 0.81, 0.70, 0.89, 0.14
Example
![Page 38: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/38.jpg)
• Computes similarity of attributes based on similarity statements• Weighted by the reputation of the issuer• Excluding opinions of untrustworthy peers
• rt is a reputation threshold. Similarity credentials of peers with reputation lower than rt are discarded
Reputation-based Similarity
![Page 39: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/39.jpg)
• Similarity can be exploited in rules• Peers may accept credentials about any
attributes similar to a given attribute• perm(read,X,File1) cred(GBR,Ally,Y), cred(Y,Z,X),
similar(0.5,Z,Captain) ≥ 0.6
• A peer can express policies just with known vocabulary AUTONOMY
• Peers are able interpret unknown terms by similarity INTEROPERABILITY
TM + Reputation System
![Page 40: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/40.jpg)
• Credentials must be derived on request• To derive a credential c a peer needs to
collect all the credentials on which c depends
• Where do we find them? Who performs all the computations?
• We need an algorithm to define a storage schema and a retrieval method
Credential Chain Discovery
![Page 41: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/41.jpg)
• 3 algorithms:• Backward search: top-down• Forward search: bottom-up• Bi-directional search
• Designed to answer different query types• Work if some requirements about
credential storage location are satisfied
The RT algorithms
![Page 42: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/42.jpg)
• 3 possible query types1. Type 1: cred(TU/e,student,Alice)?
2. Type 2: cred(TU/e,student,X)?
3. Type 3: cred(X,Y,Alice)?
• Where do we start searching?
Query Types
![Page 43: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/43.jpg)
• Query: Is Bart employee of an accredited university?
• All credentials stored by the issuer• Ask for all accredited universities• Ask to each university if Bart is a student
• All credentials stored by the subject• Ask Bart all credentials• Ask to all issuers for entailed credentials…• Bart has 1000 credentials, 900 confidential…
• Combine the two…
Credential Storage
![Page 44: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/44.jpg)
• Consider1. cred(TU/e,student,X) cred(PD,student,X)
2. cred(PD,stud,Bart)
• Query: Is Bart a TU/e student?• Now, what happens if both credentials
are stored by the PD?• We cannot answer the query as we do
not know where to start from
But…
![Page 45: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/45.jpg)
• We need to regulate where credentials can be stored
• Credential and credential rules must be well-typed
• Only if credentials are well-typed all the solutions can be retrieved
• More details in the paper…
Well-typed Credentials
![Page 46: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/46.jpg)
• Top-down• Credentials stored by the issuer!• Build a graph in which nodes are labeled
by roles• Each node gets a “list of participants”• Advantages
• Goal-directed• Decentralized
Backward Search Algorithm
![Page 47: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/47.jpg)
cred(DSA,student,X) cred(DG,accredited,Y), cred(Y,student,X)
cred(DG,accredited,TU/e)
cred(DG,accredited,UT)
cred(DG,accredited,UvA)
cred(DG,educationalInstitution,TU/e)
cred(WUA,qualityInstitution,TU/e)
cred(TU/e,student,X) cred(PD,student,X)
cred(PD,student,Alice)
cred(PD,student,Bart)
cred(PD,student,Charlie)
cred(ABN,client,Bart)
cred(VISA,ccard,Bart)
Example
![Page 48: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/48.jpg)
Example
DSA student
Query: cred(DSA,student,Bart)?
DG Accredited
TU/eUTUvA
TU/e student
UT student
UvA student………
………
………
………
PD studentAliceBartCharlie
AliceBartCharlie
AliceBartCharlie
![Page 49: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/49.jpg)
• Bottom-up• Credentials stored by the subject!• Build a graph in which nodes are labeled
by roles or principals• Each node gets a “list of roles it
participates to or it is a subset of”• Disadvantages:
• privacy issues!
Forward Search Algorithm
![Page 50: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/50.jpg)
Example
cred(DSA,student,X) cred(DG,accredited,Y), cred(Y,student,X)
cred(DG,accredited,TU/e)
cred(DG,accredited,UT)
cred(DG,accredited,UvA)
cred(DG,educationalInstitution,TU/e)
cred(WUA,qualityInstitution,TU/e)
cred(TU/e,student,X) cred(PD,student,X)
cred(PD,student,Alice)
cred(PD,student,Bart)
cred(PD,student,Charlie)
cred(ABN,client,Bart)
cred(VISA,ccard,Bart)
![Page 51: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/51.jpg)
Example
Query: cred(DSA,student,Bart)?
Bart
PD studentABN clientVISA ccard
VISA ccard
ABN client
PD student
PD
TU/e studentTUE student
ABN
VISA
TU/e
DG accreditedDG educationalInst
WUA qualityInst
DG accreditedDG educationalInstWUA qualityInst
DSA studentDSA student
DSA student
![Page 52: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/52.jpg)
• Backward search needs credentials stored by issuers
• Forward search needs credentials stored by subjects
• We want to be able to store credentials– sometimes by issuers – sometimes by subjects– sometimes by both
• Combine of forward + backward search• Faster, if all credentials can be found…
Bi-Directional Search
![Page 53: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/53.jpg)
• POLIPO: a security framework for interoperability, portability, and autonomy in the MSS domain
– Combines AC, TM, and ontologies– Local ontologies alignment through a
reputation system– Works with several existing credential
discovery algorithms (e.g., RT)
• In the next presentation: architecture
Summary
![Page 54: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy Daniel Trivellato](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649ea85503460f94babe60/html5/thumbnails/54.jpg)