Advertisement

Towards E-Society Policy Interoperability

  • Renato Iannella
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 305)

Abstract

The move towards the Policy-Oriented Web is destined to provide support for policy expression and management in the core web layers. One of the most promising areas that can drive this new technology adoption is e-Society communities. With so much user-generated content being shared by these social networks, there is the real danger that the implicit sharing rules that communities have developed over time will be lost in translation in the new digital communities. This will lead to a corresponding loss in confidence in e-Society sites. The Policy-Oriented Web attempts to turn the implicit into the explicit with a common framework for policy language interoperability and awareness. This paper reports on the policy driving factors from the Social Networks experiences using real-world use cases and scenarios. In particular, the key functions of policy-awareness - for privacy, rights, and identity - will be the driving force that enables the e-Society to appreciate new interoperable policy regimes.

Keywords

E-Society Policy-Oriented Web Policy Languages Social Networks Interoperability Privacy Rights 

References

  1. 1.
    Qui, X.: Citizen Engagement: Driving Force of E-Society Development. In: Wang, W. (ed.) IFIP International Federation for Information Processing. Integration and Innovation Orient to E-Society, Integration and Innovation Orient to E-Society, vol. 252, 2, pp. 540–548. Springer, BostonGoogle Scholar
  2. 2.
    Iannella, R.: Industry Challenges for Social and Professional Networks. In: W3C Workshop on the Future of Social Networking, Barcelona (January 15-16, 2009), http://www.w3.org/2008/09/msnws/papers/nicta-position-paper.pdf
  3. 3.
    Weitzner, D.G.: Profiling, and Privacy. IEEE Internet Computing, 95–97 (November/December 2007)Google Scholar
  4. 4.
  5. 5.
    ABC Media Watch, Filleting Facebook. Australian Broadcasting Corporation (ABC) (October 29, 2007), http://www.abc.net.au/mediawatch/transcripts/s2074079.htm
  6. 6.
    Iannella, R., Henricksen, K., Robinson, R.: A Policy Oriented Architecture for the Web: New Infrastructure and New Opportunities. In: W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, Ispra, Italy, October 17-18 (2006)Google Scholar
  7. 7.
    Iannella, R. (ed.): Open Digital Rights Language, Version 1.1 Specification. ODRL Initiative (September 19, 2002), http://odrl.net/1.1/ODRL-11.pdf, http://www.w3.org/TR/odrl/
  8. 8.
    Wenning, R., Schunter, M. (eds.): The Platform for Privacy Preferences 1.1 (P3P1.1) Specification. W3C Working Group Note (November 13, 2006), http://www.w3.org/TR/P3P11/
  9. 9.
    Euzenat, J., Shvaiko, P.: Ontology Matching. Springer, Berlin (2007)zbMATHGoogle Scholar
  10. 10.
    Arnab, A., Hutchison, A.: DRM Use License Negotiation using ODRL v2.0. In: Proceedings 5th International Workshop for Technology, Economy, and Legal Aspects of Virtual Goods and the 3rd International ODRL Workshop, Koblenz, Germany, October 11-13 (2007)Google Scholar
  11. 11.
    Hu, Y.J.: Semantic-Driven Enforcement of Rights Delegation Policies via the Combination of Rules and Ontologies. In: Workshop on Privacy Enforcement and Accountability with Semantics, International Semantic Web Conference 2007, Busan Korea (2007)Google Scholar
  12. 12.
    García, R., Gil, R.: An OWL Copyright Ontology for Semantic Digital Rights Management. In: IFIP WG 2.12 & WG 12.4 International Workshop on Web Semantics, Montpellier, France (November 2006)Google Scholar
  13. 13.
    Kolari, P., Ding, L., Shashidhara, G., Joshi, A., Finin, T., Kagal, L.: Enhancing Web privacy protection through declarative policies. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, June 6-8, pp. 57–66 (2005)Google Scholar
  14. 14.
    OASIS eXtensible Access Control Markup Language (XACML), Version 2.0. OASIS Standard (February 1, 2005), http://docs.oasis-open.org/xacml/2.0/XACML-2.0-OS-NORMATIVE.zip
  15. 15.
    Bonatti, P.A., Duma, C., Fuchs, N., Nejdl, W., Olmedilla, D., Peer, J., Shahmehri, N.: Semantic Web Policies - A Discussion of Requirements and Research Issues. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol. 4011, pp. 712–724. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  16. 16.
    Kolari, P., Finin, T., Yesha, Y., Lyons, K., Hawkins, J., Perelgut, S.: Policy Management of Enterprise Systems: A Requirements Study. In: Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2006 (2006)Google Scholar
  17. 17.
    Semantic Web and Policy Workshop, Galway, Ireland (November 7, 2005) Google Scholar
  18. 18.
    2nd International Semantic Web Policy Workshop (SWPW 2006), Athens, GA, USA, November 5-9 (2006)Google Scholar
  19. 19.
    Weitzner, D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sus, G.J.: Information Accountability. MIT Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2007-034 (June 13, 2007)Google Scholar
  20. 20.
    Casassa-Mont, M., Crosta, S., Kriegelstein, T., Sommer, D.: PRIME Architecture V2 (March 29, 2007), https://www.prime-project.eu/prime_products/reports/arch/pub_del_D14.2.c_ec_WP14.2_v1_Final.pdf
  21. 21.
    Clemente, F.J.G., Perez, G.M., Skarmeta, A.F.G.: An XML-Seamless Policy Based Management Framework. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2005. LNCS, vol. 3685, pp. 418–423. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  22. 22.
    Bhatti, R., Ghafoor, A., Bertino, E., Joshi, J.B.D.: X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security (TISSEC) 8(2), 187–227 (2005)CrossRefGoogle Scholar
  23. 23.
    Koch, M., Parisi-Presicce, F.: UML specification of access control policies and their formal verification. Software and Systems Modeling 5(4), 429–447 (2006)CrossRefGoogle Scholar
  24. 24.
    Lamparter, S., Ankolekar, A., Studer, R., Oberle, D., Weinhardt, C.: A policy framework for trading configurable goods and services in open electronic markets. In: Proceedings of the 8th International Conference on Electronic Commerce, Fredericton, New Brunswick, Canada, August 14-16 (2006)Google Scholar
  25. 25.
    Pretschner, A., Hilty, M., Basin, D.: Distributed usage control. Commun. ACM 49, 9 (2006)CrossRefGoogle Scholar
  26. 26.
    Tonti, G., Bradshaw, J., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic Web Languages for Policy Representation and Reasoning: A Comparison of Kaos, Rei, and Ponder. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419–437. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  27. 27.
    Anderson, A.: A comparison of two Privacy Policy Languages: EPAL and XACML. Sun Mircosystems Labs technical report (2005), http://research.sun.com/techrep/2005/smli_tr-2005-147/
  28. 28.
    Ardagna, C., Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Offline Expansion of XACML Policies Based on P3P Metadata. In: Lowe, D.G., Gaedke, M. (eds.) ICWE 2005. LNCS, vol. 3579, pp. 363–374. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  29. 29.
    Jensen, C., Tullio, J., Potts, C., Mynatt, E.D.: STRAP: A Structured Analysis Framework for Privacy. Georgia Institute of Technology Technical Report GIT-GVU-05-02, http://hdl.handle.net/1853/4450
  30. 30.
    Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Extending Policy Languages to the Semantic Web. In: Koch, N., Fraternali, P., Wirsing, M. (eds.) ICWE 2004. LNCS, vol. 3140, pp. 330–343. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  31. 31.
    Kagal, L., Finin, T., Joshi, A.: A Policy Based Approach to Security for the Semantic Web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402–418. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  32. 32.
    Felt, A., Evans, D.: Privacy Protection for Social Networking Platforms. In: Web 2.0 Security and Privacy at the 2008 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 18-21 (2008)Google Scholar
  33. 33.
    Chew, M., Balfanz, D., Laurie, B.: (Under) Mining Privacy in Social Networks. In: Web 2.0 Security and Privacy at the 2008 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 18-21 (2008)Google Scholar
  34. 34.
    Grandison, T., Maximilien, E.M.: Towards Privacy Propagation in the Social Web. In: Web 2.0 Security and Privacy at the 2008 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 18-21 (2008)Google Scholar
  35. 35.
    Kaiser, M.: Toward the Realization of Policy-Oriented Enterprise Management. IEEE Computer, 57–63 (November 2007)Google Scholar
  36. 36.
    Guth, S., Iannella, R. (eds.): ODRL Version 2.0 Core Model. Draft Specification (March 6, 2009), http://odrl.net/2.0/DS-ODRL-Model.html

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Renato Iannella
    • 1
  1. 1.NICTASt LuciaAustralia

Personalised recommendations