Enabling Privacy-Preserving Semantic Presence in Instant Messaging Systems

  • Anca Dumitrache
  • Alessandra Mileo
  • Antoine Zimmermann
  • Axel Polleres
  • Philipp Obermeier
  • Owen Friel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6967)

Abstract

In pervasive environments, presence-based application development via Presence Management Systems (PMSs) is a key factor to optimise the management of communication channels, driving productivity increase. Solutions for presence management should satisfy the interoperability requirements, in turn providing context-centric presence analysis and privacy management. In order to push PMSs towards flexible, open and context-aware presence management, we propose some adaptation of two extensions to standard XML-based XMPP for message exchange in online communication systems. The contribution allows for more complex specification and management of nested group and privacy lists, where semantic technologies are used to map all messages into RDF vocabularies and pave the way for a broader semantic integration of heterogeneous and distributed presence information sources in the standard PMSs framework.

Keywords

Presence Management Systems XMPP XML Nested Groups Privacy List Context-awareness Rule-based Policies 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Acharya, A., Banerjee, N., Chakraborty, D., Dasgupta, K., Misra, A., Sharma, S., Wang, X., Wright, C.: Programmable presence virtualization for next-generation context-based applications. In: PerCom, pp. 1–10 (2009)Google Scholar
  2. 2.
    Jabber Software Foundation: A model for presence and instant messaging (2000)Google Scholar
  3. 3.
    Jabber Software Foundation: Extensible messaging and presence protocol (xmpp): Instant messaging and presence (2004)Google Scholar
  4. 4.
    Jabber Software Foundation: A presence event package for the session initiation protocol (sip) (2004)Google Scholar
  5. 5.
    Frikken, K., Atallah, M., Li, J.: Attribute-based access control with hidden policies and hidden credentials. IEEE Transactions on Computers 55, 1259–1270 (2006)CrossRefGoogle Scholar
  6. 6.
    Hauswirth, M., Euzenat, J., Friel, O., Griffin, K., Hession, P., Jennings, B., Groza, T., Handschuh, S., Zarko, I.P., Polleres, A., Zimmermann, A.: Towards Consolidated Presence. Collaborate Com. (2010)Google Scholar
  7. 7.
    Kagal, L., Finin, T.W., Joshi, A.: A policy based approach to security for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402–418. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Ko, H., Won, D., Shin, D., Choo, H., Kim, U.: A semantic context-aware access control in pervasive environments. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3981, pp. 165–174. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  9. 9.
    McGuinness, D.L., van Harmelen, F.: OWL web ontology language overview. W3C recommendation, W3C (February 2004)Google Scholar
  10. 10.
    Miller, E., Manola, F.: RDF primer. W3C recommendation, W3C (February 2004), http://www.w3.org/TR/2004/REC-rdf-primer-20040210/
  11. 11.
    Moses, T.: eXtensible Access Control Markup Language (XACML) Version 1.0. (February 2003)Google Scholar
  12. 12.
    Priebe, T., Dobmeier, W., Kamprath, N.: Supporting attribute-based access control with ontologies. In: Int’l Conf. on Availability, Reliability and Security, pp. 465–472 (2006)Google Scholar
  13. 13.
    Prud’hommeaux, E., Seaborne, A.: SPARQL query language for RDF. W3C recommendation, W3C (January 2008), http://www.w3.org/TR/2008/REC-rdf-sparql-query-20080115/
  14. 14.
    Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer 29(2), 38–47 (1996)CrossRefGoogle Scholar
  15. 15.
    Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: Cruz, I., Decker, S., Allemang, D., Preist, C., Schwabe, D., Mika, P., Uschold, M., Aroyo, L.M. (eds.) ISWC 2006. LNCS, vol. 4273, pp. 473–486. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  16. 16.
    Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: Proteus: A semantic context-aware adaptive policy model. In: POLICY, pp. 129–140 (2007)Google Scholar
  17. 17.
    Uszok, A., Bradshaw, J.M., Johnson, M., Jeffers, R., Tate, A., Dalton, J., Aitken, S.: Kaos policy management for semantic web services. IEEE Intelligent Systems 19, 32–41 (2004)CrossRefGoogle Scholar
  18. 18.
    Uszok, A., Bradshaw, J.M., Lott, J., Breedy, M.R., Bunch, L., Feltovich, P.J., Johnson, M., Jung, H.: New developments in ontology-based policy management: Increasing the practicality and comprehensiveness of kaos. In: POLICY, pp. 145–152 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Anca Dumitrache
    • 1
    • 4
  • Alessandra Mileo
    • 2
  • Antoine Zimmermann
    • 3
  • Axel Polleres
    • 2
  • Philipp Obermeier
    • 2
  • Owen Friel
    • 4
  1. 1.DERINUIGGalwayIreland
  2. 2.INSA-Lyon, LIRISFrance
  3. 3.Cisco SystemsGalwayIreland
  4. 4.Jacobs UniversityBremenGermany

Personalised recommendations