- From: Smith, Ned <ned.smith@intel.com>
- Date: Wed, 21 Nov 2001 12:22:38 -0800
- To: www-rdf-logic@w3.org
In [1][2] a logic framework LF language is used to encode security and safety logics. I'm not a logician. However, I do understand SpeaksFor and Says relationships ala SPKI. I don't believe I truely appreciate the logicians approach taken by [1]. There are implementations of SPKI [3] and SPKI authorization computation engine [4] implemented in procedural languages (Java, C). Proofs expressed in LF appear to be equally difficult to read/program as those expressed in a procedural language. Why would a domain expert/security expert choose to express proofs/rules in a logic language vs. procedural - aside from style preferences? I understand DAML+OIL accommodates inference, but I don't believe it specifically addresses SpeaksFor and Says. [1] suggests that these logical constructs are elements of an application logic rather than a core (more primitive) logic. WOW-G is chartered to develop a language for defining/building ontologies. To what extent should DAML be enabled to describe security logics - specifically referring to core logic in [1]? Note: I draw a distinction between security logics as described in [1] and security ontology as described in [5] even though both might be expressed in the same language (e.g. DAML). It may be incorrect for me to draw such a distinction, but as I said I'm not a logician. [1] A Proof-Carrying Authorization System. Lujo Bauer, Michael A. Schneider, and Edward W. Felten. Technical report CS-TR-638-01, Department of Computer Science, Princeton University, April 2001. http://ncstrl.cs.princeton.edu/expand.php?id=TR-638-01 [2] Proof Carrying Code, Peter Lee CMU http://www-2.cs.cmu.edu/~petel/papers/pcc/pcc.htm [3] HP Espeak http://www.espeak.com [4] Common Data Security Architecture (CDSA), AuthCompute Module. http://www.opengroup.org [5] A Delegation-based Distributed Trust Model for Multi-Agent Systems, Lalana Kagal et.al., University of Maryland. mailto:lkagal1@cs.umbc.edu Ned M. Smith Intel Architecture Labs Phone: 503.264.2692 2111 N.E. 25th Ave Fax: 503.264.6225 Hillsoboro OR. 97124 mailto:ned.smith@intel.com > -----Original Message----- > From: Dan Connolly [mailto:connolly@w3.org] > Sent: Thursday, November 15, 2001 3:06 PM > To: Smith, Ned > Cc: www-rdf-logic@w3.org > Subject: Re: semantic web, proof and trust > > > "Smith, Ned" wrote: > > > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA1 > > > > In a semantic web paper by James Hendler, a layer cake of > > technologies is presented with Unicode/URI at the bottom followed by > > XML, RDF, Ontology vocabulary, logic, proof and finally trust. The > > intermediate layers (RDF, ontology, logic and proof) are protected > > ala digital signature (I presume W3C DSIG). > > > > I'd like to undersand the proof and trust layers, namely what is > > being prooved and what is being trusted? > > Coincidently, I was just updating a description of our work > on that, and I discovered a new paper: > > A Proof-Carrying Authorization System. Lujo Bauer, > Michael A. Schneider, and Edward W. Felten. Technical > report CS-TR-638-01, Department of Computer Science, > Princeton University, April 2001. > http://ncstrl.cs.princeton.edu/expand.php?id=TR-638-01 > > linked from > > SIP: Proof-Carrying Authorization > http://www.cs.princeton.edu/sip/projects/pca/ > > linked from > > The Semantic Web as a language of logic > http://www.w3.org/DesignIssues/Logic#PCA > > linked from > > Access Control Rules, Logic, and Proof > in Semantic Web Activity: Advanced Development > http://www.w3.org/2000/01/sw/#access > > > While I was at it, I discovered a really nice diagram/slide > by Marja: > > SW Principles 3: Web of Trust > http://www.w3.org/Talks/2001/1102-semweb-fin/slide14-0.html > > > The use of digital signature suggests that key management > is some how > > involved. Can anyone clarify? Is there the expectation that a PKI > > will be used (for example)? > > The proofs pretty much subsume credentials and traditional > PKI stuff. > > > Regarding proofs. One possible dimension to proof is the idea that > > one party must prove possession of a secret (a basic element of > > authentication). Is this an aspect of the proof layer? > > Sort of. > > > What other > > dimensions are implied by the proof layer? > > > > Trust has been used in a variety of ways. In DOD Orange Book systems > > it describes the Trusted Computing Base which does not rely on > > external checking mechanisms for its assurances. In > financial systems > > trust is better understood as risk management and can include > > indemnity protection - not relying exclusively on > techniques for risk > > mitigation. The semantic web seems to apply the "web of trust" > > abstraction which could imply a system of distributed cross-checked > > nodes. I presume these nodes contain a TCB of sorts. Can anyone > > elaborate on the intended architecture for web of trust or the Trust > > layer? > > The trusted computing base is expected to be: > a proof checker, which includes the ability to verify > digital signatures, plus a knowledge base of policies. > > see also Necula's proof-carrying code stuff: > http://www.cs.berkeley.edu/~necula/pcc.html > > -- > Dan Connolly, W3C http://www.w3.org/People/Connolly/ >
Received on Wednesday, 21 November 2001 15:22:43 UTC