Difference between revisions of "Security and Privacy Ontology"

From HL7Wiki
Jump to navigation Jump to search
Line 8: Line 8:
 
This page is intended to provide a focal point for the Security and Privacy Ontology Project; a hub for connecting to its artifacts, discussions, status and links to related projects and work groups. Most of the technical content for this project will be contained within its artifacts which will be linked to on this page and stored on [http://gforge.hl7.org GForge] or other wikis.  This page will provide sufficient content for project and document organization.
 
This page is intended to provide a focal point for the Security and Privacy Ontology Project; a hub for connecting to its artifacts, discussions, status and links to related projects and work groups. Most of the technical content for this project will be contained within its artifacts which will be linked to on this page and stored on [http://gforge.hl7.org GForge] or other wikis.  This page will provide sufficient content for project and document organization.
  
==Scope==
+
=Scope=
 
The scope of the project was defined by the answers to a set of ''[[Security and Privacy Ontology Project Scope|scoping questions]].''
 
The scope of the project was defined by the answers to a set of ''[[Security and Privacy Ontology Project Scope|scoping questions]].''
  
==Project Documentation==
+
=Project Documentation=
 
[http://gforge.hl7.org/gf/download/docmanfileversion/5530/7043/HL7ProjectScopeStatementv2010MarSecurityandPrivacyOntology20100320JMD.doc Approved Project Scope Statement]
 
[http://gforge.hl7.org/gf/download/docmanfileversion/5530/7043/HL7ProjectScopeStatementv2010MarSecurityandPrivacyOntology20100320JMD.doc Approved Project Scope Statement]
  
==Ontology Development Methodology==
+
=Ontology Development Methodology=
 
This ''[[Ontology Development Methodology|methodology]]'' has been derived from a '''[http://protege.stanford.edu/publications/ontology_development/ontology101-noy-mcguinness.html guide]'''used by the Protégé team and demonstrates a basic model development process that shares some steps with '''[http://gforge.hl7.org/gf/download/frsrelease/608/6671/HDF_1.5.pdf HL7 HDF]'''.  The draft was written from the standpoint of developing an ontology from scratch.
 
This ''[[Ontology Development Methodology|methodology]]'' has been derived from a '''[http://protege.stanford.edu/publications/ontology_development/ontology101-noy-mcguinness.html guide]'''used by the Protégé team and demonstrates a basic model development process that shares some steps with '''[http://gforge.hl7.org/gf/download/frsrelease/608/6671/HDF_1.5.pdf HL7 HDF]'''.  The draft was written from the standpoint of developing an ontology from scratch.
  
==Use Cases==
+
=Use Cases=
 
[[Security_and_Privacy_Ontology_Use_Cases#Access Control Based on Category of Action|Access Control Based on Category of Action]]
 
[[Security_and_Privacy_Ontology_Use_Cases#Access Control Based on Category of Action|Access Control Based on Category of Action]]
  
Line 32: Line 32:
 
[[Security_and_Privacy_Ontology_Use_Cases#Facilitate an Automated Decision Function|Facilitate an Automated Decision Function]]
 
[[Security_and_Privacy_Ontology_Use_Cases#Facilitate an Automated Decision Function|Facilitate an Automated Decision Function]]
  
==Other Ontologies==
+
=Other Ontologies=
 
[http://bioportal.bioontology.org/ontologies/39798 Situation-Based Access Control]
 
[http://bioportal.bioontology.org/ontologies/39798 Situation-Based Access Control]
  
==Tooling==
+
=Tooling=
 
This project uses the ''Protégé-OWL Editor'' for ontology editing and the ''Ontology Browser'' for Web-based ontology review.
 
This project uses the ''Protégé-OWL Editor'' for ontology editing and the ''Ontology Browser'' for Web-based ontology review.
  
===Protégé-OWL Editor===
+
==Protégé-OWL Editor==
 
Description: [http://protege.stanford.edu/overview/protege-owl.html Protégé-OWL Editor]
 
Description: [http://protege.stanford.edu/overview/protege-owl.html Protégé-OWL Editor]
  
 
We are using version 4.1, which can be downloaded from: [http://protege.stanford.edu/download/registered.html#p4.1 Protégé 4.1]
 
We are using version 4.1, which can be downloaded from: [http://protege.stanford.edu/download/registered.html#p4.1 Protégé 4.1]
  
===Ontology Browser===
+
==Ontology Browser==
 
Description: [http://code.google.com/p/ontology-browser/ Ontology Browser]
 
Description: [http://code.google.com/p/ontology-browser/ Ontology Browser]
  
 
Brief guide:  [http://code.google.com/p/ontology-browser/wiki/GettingStarted Getting Started]
 
Brief guide:  [http://code.google.com/p/ontology-browser/wiki/GettingStarted Getting Started]
  
==Presentations==
+
=Presentations=
 
An introduction to Description Language, OWL and Protege: [http://gforge.hl7.org/gf/download/docmanfileversion/5561/7128/OWLProt%C3%A9g%C3%A9andSecurity-PrivacyOntology.pdf OWL, Protege and Security-Privacy Ontology]
 
An introduction to Description Language, OWL and Protege: [http://gforge.hl7.org/gf/download/docmanfileversion/5561/7128/OWLProt%C3%A9g%C3%A9andSecurity-PrivacyOntology.pdf OWL, Protege and Security-Privacy Ontology]
  
==Draft Ontology==
+
=Draft Ontology=
 
Updates to the Security and Privacy ontology will be available here.
 
Updates to the Security and Privacy ontology will be available here.
  
===Download===
+
==Download==
 
The Security and Privacy Ontology is distributed as a zip file containing an ''Ontologies'' directory, a set of OWL files representing the sub-ontologies, and an [http://www.oasis-open.org/committees/entity/spec-2001-08-06.html XML Catalog].  Note that the catalog redirects ontology IRIs to the local file system.  For example, ''http://www.hl7.org/ontologies/SecurityAndPrivacy.owl'', which does not yet exist on the Web, is redirected to the ''SecurityAndPrivacy.owl'' file.
 
The Security and Privacy Ontology is distributed as a zip file containing an ''Ontologies'' directory, a set of OWL files representing the sub-ontologies, and an [http://www.oasis-open.org/committees/entity/spec-2001-08-06.html XML Catalog].  Note that the catalog redirects ontology IRIs to the local file system.  For example, ''http://www.hl7.org/ontologies/SecurityAndPrivacy.owl'', which does not yet exist on the Web, is redirected to the ''SecurityAndPrivacy.owl'' file.
  
 
Current published draft of the Security-Privacy Ontology for peer review: [TBD Posted - November 1, 2011]
 
Current published draft of the Security-Privacy Ontology for peer review: [TBD Posted - November 1, 2011]
  
===Hosted Browsing===
+
==Hosted Browsing==
 
Apelon is voluntarily hosting the Ontology Browser to facilitate peer review of the Security and Privacy Ontology.  Please respect that purpose.
 
Apelon is voluntarily hosting the Ontology Browser to facilitate peer review of the Security and Privacy Ontology.  Please respect that purpose.
  
Line 72: Line 72:
 
*Eventually, HL7 ontologies may be hosted at a well known location such as http://www.hl7.org/ontologies/ (which doesn't currently exist).  In anticipation, the IRIs for sub-ontologies and other elements of the Security and Privacy Ontology embody that location.  Unlike Protégé, the current Ontology Browser software provides no way to redirect such IRIs.  Therefore, we direct the Ontology Browser to the hosted files (having manually edited OWL imports within the hosted files accordingly).
 
*Eventually, HL7 ontologies may be hosted at a well known location such as http://www.hl7.org/ontologies/ (which doesn't currently exist).  In anticipation, the IRIs for sub-ontologies and other elements of the Security and Privacy Ontology embody that location.  Unlike Protégé, the current Ontology Browser software provides no way to redirect such IRIs.  Therefore, we direct the Ontology Browser to the hosted files (having manually edited OWL imports within the hosted files accordingly).
  
==Ontology Review Criteria==
+
=Ontology Review Criteria=
'''Suggested criteria for interim review of the Security-Privacy Ontology.
+
Suggested criteria for interim review of the Security-Privacy Ontology:
'''
 
 
*Security-Privacy Ontology Review Criteria: [http://gforge.hl7.org/gf/download/docmanfileversion/5925/7668/Security-PrivacyOntologyReviewCriteria.docx Updated - 10/20/2010]  
 
*Security-Privacy Ontology Review Criteria: [http://gforge.hl7.org/gf/download/docmanfileversion/5925/7668/Security-PrivacyOntologyReviewCriteria.docx Updated - 10/20/2010]  
 
*Security-Privacy Ontology Review Criteria with Forms (to fill in responses):[http://gforge.hl7.org/gf/download/docmanfileversion/5924/7667/Security-PrivacyOntologyReviewCriteriawithForms.docx Updated - 10/20/2010]
 
*Security-Privacy Ontology Review Criteria with Forms (to fill in responses):[http://gforge.hl7.org/gf/download/docmanfileversion/5924/7667/Security-PrivacyOntologyReviewCriteriawithForms.docx Updated - 10/20/2010]
  
==Related Projects==
+
=Related Projects=
 
[http://hssp-infrastructure.wikispaces.com/SOA+Service+Ontology+Meetings HL7 SOA Ontology WG]
 
[http://hssp-infrastructure.wikispaces.com/SOA+Service+Ontology+Meetings HL7 SOA Ontology WG]
  
==Resources==
+
=Resources=
 
[http://www.w3.org/TR/2009/REC-owl2-overview-20091027/ W3C OWL 2 Specification]<br />
 
[http://www.w3.org/TR/2009/REC-owl2-overview-20091027/ W3C OWL 2 Specification]<br />
 
[http://gforge.hl7.org/gf/download/docmanfileversion/5571/7143/ReferenceOntologyforSemanticServiceOrientedArchitectures_Public_Review_1.doc OASIS Reference Ontology for Semantic Service Oriented Architectures]
 
[http://gforge.hl7.org/gf/download/docmanfileversion/5571/7143/ReferenceOntologyforSemanticServiceOrientedArchitectures_Public_Review_1.doc OASIS Reference Ontology for Semantic Service Oriented Architectures]

Revision as of 12:52, 1 November 2011

Back to: Security Main Page

Back to: CBCC Main Page


Introduction

This page is intended to provide a focal point for the Security and Privacy Ontology Project; a hub for connecting to its artifacts, discussions, status and links to related projects and work groups. Most of the technical content for this project will be contained within its artifacts which will be linked to on this page and stored on GForge or other wikis. This page will provide sufficient content for project and document organization.

Scope

The scope of the project was defined by the answers to a set of scoping questions.

Project Documentation

Approved Project Scope Statement

Ontology Development Methodology

This methodology has been derived from a guideused by the Protégé team and demonstrates a basic model development process that shares some steps with HL7 HDF. The draft was written from the standpoint of developing an ontology from scratch.

Use Cases

Access Control Based on Category of Action

Access Control Based on Category of Object

Access Control Based on Category of Structural Role

Access Control Based on Category of Functional Role

Access Control Based on Multiple Role Values

Enable Design of Access Control System

Facilitate an Automated Decision Function

Other Ontologies

Situation-Based Access Control

Tooling

This project uses the Protégé-OWL Editor for ontology editing and the Ontology Browser for Web-based ontology review.

Protégé-OWL Editor

Description: Protégé-OWL Editor

We are using version 4.1, which can be downloaded from: Protégé 4.1

Ontology Browser

Description: Ontology Browser

Brief guide: Getting Started

Presentations

An introduction to Description Language, OWL and Protege: OWL, Protege and Security-Privacy Ontology

Draft Ontology

Updates to the Security and Privacy ontology will be available here.

Download

The Security and Privacy Ontology is distributed as a zip file containing an Ontologies directory, a set of OWL files representing the sub-ontologies, and an XML Catalog. Note that the catalog redirects ontology IRIs to the local file system. For example, http://www.hl7.org/ontologies/SecurityAndPrivacy.owl, which does not yet exist on the Web, is redirected to the SecurityAndPrivacy.owl file.

Current published draft of the Security-Privacy Ontology for peer review: [TBD Posted - November 1, 2011]

Hosted Browsing

Apelon is voluntarily hosting the Ontology Browser to facilitate peer review of the Security and Privacy Ontology. Please respect that purpose.

To browse the current published draft ontology using a Web browser:

  1. Visit the hosted Ontology Browser: Ontology Browser
  2. Enter a suitable URL in the box labeled Specify the physical location of your ontology. For example, copy and paste one of the following URLs:
    • file://localhost/C:/Ontologies/SecurityAndPrivacy.owl
    • file://localhost/C:/Ontologies/SomewhereHospital.owl
  3. Click load.

Notes:

  • An Ontologies directory is hosted on the same virtual server as the Ontology Browser. The preceding example URLs will direct the hosted Ontology Browser to OWL files on its local host (not your local host).
  • Eventually, HL7 ontologies may be hosted at a well known location such as http://www.hl7.org/ontologies/ (which doesn't currently exist). In anticipation, the IRIs for sub-ontologies and other elements of the Security and Privacy Ontology embody that location. Unlike Protégé, the current Ontology Browser software provides no way to redirect such IRIs. Therefore, we direct the Ontology Browser to the hosted files (having manually edited OWL imports within the hosted files accordingly).

Ontology Review Criteria

Suggested criteria for interim review of the Security-Privacy Ontology:

Related Projects

HL7 SOA Ontology WG

Resources

W3C OWL 2 Specification
OASIS Reference Ontology for Semantic Service Oriented Architectures