Difference between revisions of "Security and Privacy Ontology"

From HL7Wiki
Jump to navigation Jump to search
Line 46: Line 46:
 
The Protégé-OWL Editor operates on OWL 2 ontologies. It also handles SWRL.  The Security and Privacy Ontology is currently edited with the ''Protégé 4.1 Release'' version.
 
The Protégé-OWL Editor operates on OWL 2 ontologies. It also handles SWRL.  The Security and Privacy Ontology is currently edited with the ''Protégé 4.1 Release'' version.
 
   
 
   
Description: [http://protege.stanford.edu/overview/protege-owl.html Protégé-OWL Editor]
+
*Description: [http://protege.stanford.edu/overview/protege-owl.html Protégé-OWL Editor]
 
+
*Download: [http://protege.stanford.edu/download/registered.html#p4.1 download protégé]
Download: [http://protege.stanford.edu/download/registered.html#p4.1 download protégé]
 
  
 
==Ontology Browser==
 
==Ontology Browser==
 
The Ontology Browser provides read-only access to OWL 2 ontologies.
 
The Ontology Browser provides read-only access to OWL 2 ontologies.
  
Description: [http://code.google.com/p/ontology-browser/ Ontology Browser]
+
*Description: [http://code.google.com/p/ontology-browser/ Ontology Browser]
 
+
*Brief guide:  [http://code.google.com/p/ontology-browser/wiki/GettingStarted Getting Started]
Brief guide:  [http://code.google.com/p/ontology-browser/wiki/GettingStarted Getting Started]
 
  
 
=Draft Ontology=
 
=Draft Ontology=
Line 61: Line 59:
  
 
==Download==
 
==Download==
The Security and Privacy Ontology is distributed as a zip file containing an ''Ontologies'' directory, a set of OWL files representing the sub-ontologies, and an [http://www.oasis-open.org/committees/entity/spec-2001-08-06.html XML Catalog].  Note that the catalog redirects ontology IRIs to the local file system.  For example, ''http://www.hl7.org/ontologies/SecurityAndPrivacy.owl'', which does not yet exist on the Web, is redirected to the ''SecurityAndPrivacy.owl'' file.
+
The Security and Privacy Ontology is distributed as a zip file containing an ''Ontologies'' directory, a set of OWL files representing the sub-ontologies, and an [http://www.oasis-open.org/committees/entity/spec-2001-08-06.html XML Catalog].  The catalog supports redirection of ontology IRIs to the local file system.  For example, ''http://www.hl7.org/ontologies/SecurityAndPrivacy.owl'', which does not yet exist on the Web, is redirected to the ''SecurityAndPrivacy.owl'' file.
  
 
Current published draft of the Security-Privacy Ontology for peer review: [TBD Posted - November 1, 2011]
 
Current published draft of the Security-Privacy Ontology for peer review: [TBD Posted - November 1, 2011]
Line 74: Line 72:
 
##Select '''HermiT''' from the pulldown list labelled ''Reasoner'' (under ''Model'' on the right).
 
##Select '''HermiT''' from the pulldown list labelled ''Reasoner'' (under ''Model'' on the right).
 
## Click '''Ontology Browser''' at the top left.
 
## Click '''Ontology Browser''' at the top left.
#Enter the URL for an OWL file in the box labeled ''Specify the physical location of your ontology''.  URLs for the Security and Privacy Ontology are shown in the following table; suggested entries are highlighted.
+
#Enter the URL for an OWL file in the box labeled ''Specify the physical location of your ontology''.  URLs for the Security and Privacy Ontology are shown in the following table.  Suggested entries are highlighted.
 
#Click '''load'''.  
 
#Click '''load'''.  
  
Line 80: Line 78:
 
|-
 
|-
 
! Sub-ontology
 
! Sub-ontology
! URL
+
! URL for hosted Ontology Browser
 
! Notes
 
! Notes
 
|- style="background:yellow;"
 
|- style="background:yellow;"
Line 89: Line 87:
 
| ASTMExampleRoles.owl
 
| ASTMExampleRoles.owl
 
| file://localhost/c:/Ontologies/ASTMExampleRoles.owl
 
| file://localhost/c:/Ontologies/ASTMExampleRoles.owl
| <p>Represents ASTM examples roles.  Presently includes all ASTM structural roles.  A representative subset will be retained and the remainder excluded as discussed at the Orlando WGM.</p> <p>Imports SecurityAndPrivacy.owl.</p>
+
| <p>Imports SecurityAndPrivacy.owl.</p> <p>Represents ASTM example roles.  Presently includes all ASTM structural roles.  A representative subset will be selected and retained as discussed at the Orlando WGM.</p>  
 
 
 
|-
 
|-
 
| ClinicalConditions.owl
 
| ClinicalConditions.owl
 
| file://localhost/c:/Ontologies/ClinicalConditions.owl
 
| file://localhost/c:/Ontologies/ClinicalConditions.owl
| <p>Represents clinical conditions, presently samples taken from the CSP-DAM.</p> <p>Imports SecurityAndPrivacy.owl.</p>
+
| <p>Imports SecurityAndPrivacy.owl.</p> <p>Represents clinical conditions, starting with samples taken from the CSP-DAM.</p>
 
|-
 
|-
 
| HL7ExamplePermissions.owl
 
| HL7ExamplePermissions.owl
 
| file://localhost/c:/Ontologies/HL7ExamplePermissions.owl
 
| file://localhost/c:/Ontologies/HL7ExamplePermissions.owl
| <p>Represents the HL7 RBAC Permission Catalog.</p> <p>Imports SecurityAndPrivacy.owl.</p>
+
| <p>Imports SecurityAndPrivacy.owl.</p> <p>Represents the HL7 RBAC Permission Catalog.</p>  
 
|-
 
|-
 
| Obligations.owl
 
| Obligations.owl
 
| file://localhost/c:/Ontologies/Obligations.owl
 
| file://localhost/c:/Ontologies/Obligations.owl
| <p>Represents obligations, presently samples taken from the CSP-DAM.</p> <p>Imports SecurityAndPrivacy.owl.</p>
+
| <p>Imports SecurityAndPrivacy.owl.</p> <p>Represents obligations, starting with samples taken from the CSP-DAM.</p>
 
|-
 
|-
 
| PurposesOfUse.owl
 
| PurposesOfUse.owl
 
| file://localhost/c:/Ontologies/PurposesOfUse.owl
 
| file://localhost/c:/Ontologies/PurposesOfUse.owl
| <p>Represents purposes of use, presently samples taken from the CSP-DAM</p> <p>Imports SecurityAndPrivacy.owl.</p>
+
| <p>Imports SecurityAndPrivacy.owl.</p> <p>Represents purposes of use, starting with samples taken from the CSP-DAM.</p>  
 
|- style="background:gold;"
 
|- style="background:gold;"
 
| SomewhereHospital.owl
 
| SomewhereHospital.owl
 
| file://localhost/c:/Ontologies/SomewhereHospital.owl
 
| file://localhost/c:/Ontologies/SomewhereHospital.owl
| <p></p> <p>Imports all of the preceding sub-ontologies.  Thus, provides a basis for browsing them together. Adds classes used in relation to example SWRL rules (though SWRL rules are not accessible via the Ontology Browser.</p>  
+
| <p>Imports all of the preceding sub-ontologies.  Thus, enables browsing them together.</p> <p>Adds classes to support SWRL rules (although SWRL rules are not accessible via the Ontology Browser).</p>  
 
|}
 
|}
  
 
Notes:
 
Notes:
*An ''Ontologies'' directory is hosted on the same virtual server as the Ontology Browser. The preceding example URLs will direct the hosted Ontology Browser to OWL files on its local host (not your local host).
+
*An ''Ontologies'' directory is hosted on the same virtual server as the Ontology Browser. The URLs in the preceding table will direct the hosted Ontology Browser to OWL files on its local host (not your local host).
*Eventually, HL7 ontologies may be hosted at a well known location such as http://www.hl7.org/ontologies/ (which doesn't currently exist).  In anticipation, the IRIs for sub-ontologies and other elements of the Security and Privacy Ontology embody that location.  Unlike Protégé, the current Ontology Browser software provides no way to redirect such IRIs.  Therefore, we direct the Ontology Browser to the hosted files (having manually edited OWL imports within the hosted files accordingly).
+
*Eventually, HL7 ontologies may be hosted at a well known location such as http://www.hl7.org/ontologies/ (which doesn't currently exist).  In anticipation, the IRIs for sub-ontologies and other elements of the Security and Privacy Ontology embody that location.  Unlike Protégé, the current Ontology Browser software provides no way to redirect such IRIs.  Therefore, we direct the Ontology Browser to the hosted files (having manually edited OWL imports accordingly within the hosted files).
  
 
=Ontology Review Criteria=
 
=Ontology Review Criteria=
Line 123: Line 120:
  
 
=Related HL7 Projects=
 
=Related HL7 Projects=
[http://hssp-infrastructure.wikispaces.com/SOA+Service+Ontology+Meetings HL7 SOA Ontology WG]
+
*[http://hssp-infrastructure.wikispaces.com/SOA+Service+Ontology+Meetings HL7 SOA Ontology WG]
  
 
=Resources=
 
=Resources=
[http://www.w3.org/TR/2009/REC-owl2-overview-20091027/ W3C OWL 2 Specification]<br />
+
*[http://www.w3.org/TR/2009/REC-owl2-overview-20091027/ W3C OWL 2 Specification]<br />
[http://www.w3.org/Submission/SWRL/ SWRL: A Semantic Web Rule Language Combining OWL and RuleML. ]<br />
+
*[http://www.w3.org/Submission/SWRL/ SWRL: A Semantic Web Rule Language Combining OWL and RuleML. ]<br />
[http://gforge.hl7.org/gf/download/docmanfileversion/5571/7143/ReferenceOntologyforSemanticServiceOrientedArchitectures_Public_Review_1.doc OASIS Reference Ontology for Semantic Service Oriented Architectures]
+
*[http://gforge.hl7.org/gf/download/docmanfileversion/5571/7143/ReferenceOntologyforSemanticServiceOrientedArchitectures_Public_Review_1.doc OASIS Reference Ontology for Semantic Service Oriented Architectures]

Revision as of 15:03, 2 November 2011

Back to: Security Main Page

Back to: CBCC Main Page


Introduction

This page is intended to provide a focal point for the Security and Privacy Ontology Project; a hub for connecting to its artifacts, discussions, status and links to related projects and work groups. Most of the technical content for this project will be contained within its artifacts which will be linked to on this page and stored on GForge or other wikis. This page will provide sufficient content for project and document organization.

Scope

The scope of the project was defined by the answers to a set of scoping questions.

Project Documentation

Approved Project Scope Statement

Presentations

An introduction to Description Language, OWL and Protege: OWL, Protege and Security-Privacy Ontology

May 2011 Status Report: Security and Privacy Ontology: HL7 Working Group Meeting; May 2011

Ontology Development Methodology

This methodology has been derived from a guideused by the Protégé team and demonstrates a basic model development process that shares some steps with HL7 HDF. The draft was written from the standpoint of developing an ontology from scratch.

Use Cases

Access Control Based on Category of Action

Access Control Based on Category of Object

Access Control Based on Category of Structural Role

Access Control Based on Category of Functional Role

Access Control Based on Multiple Role Values

Enable Design of Access Control System

Facilitate an Automated Decision Function

Other Ontologies

Situation-Based Access Control

Tooling

This project uses the Protégé-OWL Editor for ontology editing and the Ontology Browser for Web-based ontology review.

Protégé-OWL Editor

The Protégé-OWL Editor operates on OWL 2 ontologies. It also handles SWRL. The Security and Privacy Ontology is currently edited with the Protégé 4.1 Release version.

Ontology Browser

The Ontology Browser provides read-only access to OWL 2 ontologies.

Draft Ontology

The current published draft of the Security and Privacy ontology will be available for download and hosted browsing as follows.

Download

The Security and Privacy Ontology is distributed as a zip file containing an Ontologies directory, a set of OWL files representing the sub-ontologies, and an XML Catalog. The catalog supports redirection of ontology IRIs to the local file system. For example, http://www.hl7.org/ontologies/SecurityAndPrivacy.owl, which does not yet exist on the Web, is redirected to the SecurityAndPrivacy.owl file.

Current published draft of the Security-Privacy Ontology for peer review: [TBD Posted - November 1, 2011]

Hosted Browsing

Apelon is voluntarily hosting the Ontology Browser to facilitate peer review of the Security and Privacy Ontology. Please respect that purpose.

To browse the current published draft ontology using a Web browser:

  1. Visit the hosted Ontology Browser: Ontology Browser
  2. Optionally (but recommended), to view the Ontology as enriched by an OWL reasoner:
    1. Click Options (on the right, towards the top of the page).
    2. Select HermiT from the pulldown list labelled Reasoner (under Model on the right).
    3. Click Ontology Browser at the top left.
  3. Enter the URL for an OWL file in the box labeled Specify the physical location of your ontology. URLs for the Security and Privacy Ontology are shown in the following table. Suggested entries are highlighted.
  4. Click load.
Sub-ontology URL for hosted Ontology Browser Notes
SecurityAndPrivacy.owl file://localhost/c:/Ontologies/SecurityAndPrivacy.owl

The base HL7 Security and Privacy Ontology.

Intended to be normative once approved.

ASTMExampleRoles.owl file://localhost/c:/Ontologies/ASTMExampleRoles.owl

Imports SecurityAndPrivacy.owl.

Represents ASTM example roles. Presently includes all ASTM structural roles. A representative subset will be selected and retained as discussed at the Orlando WGM.

ClinicalConditions.owl file://localhost/c:/Ontologies/ClinicalConditions.owl

Imports SecurityAndPrivacy.owl.

Represents clinical conditions, starting with samples taken from the CSP-DAM.

HL7ExamplePermissions.owl file://localhost/c:/Ontologies/HL7ExamplePermissions.owl

Imports SecurityAndPrivacy.owl.

Represents the HL7 RBAC Permission Catalog.

Obligations.owl file://localhost/c:/Ontologies/Obligations.owl

Imports SecurityAndPrivacy.owl.

Represents obligations, starting with samples taken from the CSP-DAM.

PurposesOfUse.owl file://localhost/c:/Ontologies/PurposesOfUse.owl

Imports SecurityAndPrivacy.owl.

Represents purposes of use, starting with samples taken from the CSP-DAM.

SomewhereHospital.owl file://localhost/c:/Ontologies/SomewhereHospital.owl

Imports all of the preceding sub-ontologies. Thus, enables browsing them together.

Adds classes to support SWRL rules (although SWRL rules are not accessible via the Ontology Browser).

Notes:

  • An Ontologies directory is hosted on the same virtual server as the Ontology Browser. The URLs in the preceding table will direct the hosted Ontology Browser to OWL files on its local host (not your local host).
  • Eventually, HL7 ontologies may be hosted at a well known location such as http://www.hl7.org/ontologies/ (which doesn't currently exist). In anticipation, the IRIs for sub-ontologies and other elements of the Security and Privacy Ontology embody that location. Unlike Protégé, the current Ontology Browser software provides no way to redirect such IRIs. Therefore, we direct the Ontology Browser to the hosted files (having manually edited OWL imports accordingly within the hosted files).

Ontology Review Criteria

Suggested criteria for interim review of the Security-Privacy Ontology:

Related HL7 Projects

Resources