Filters








202 Hits in 6.6 sec

Protecting Datasources Over the Web [chapter]

Silvana Castano, Eena Ferrari
Web-Powered Databases  
mechanisms supporting a selective access to data available over the Web.  ...  This chapter covers the issues related to the definition of security policies, models and mechanisms for access control and dissemination of Web data, and is organized in two parts.  ...  XML compatibility is thus an important requirement for security policies, models and mechanisms for Web datasources.  ... 
doi:10.4018/9781591400356.ch011 fatcat:kjx2urm23vbfze2ntpym2x3cri

Protecting Datasources Over the Web [chapter]

Silvana Castano, Eena Ferrari
Web-Powered Databases  
mechanisms supporting a selective access to data available over the Web.  ...  This chapter covers the issues related to the definition of security policies, models and mechanisms for access control and dissemination of Web data, and is organized in two parts.  ...  XML compatibility is thus an important requirement for security policies, models and mechanisms for Web datasources.  ... 
doi:10.4018/978-1-59140-035-6.ch011 fatcat:qmg7wfrj7vf7nfxru5sajk7qiu

Model Transformations in the Development of Data–Intensive Web Applications [chapter]

Davide Di Ruscio, Alfonso Pierantonio
2005 Lecture Notes in Computer Science  
Over the last few years, Web-based systems became commonplace.  ...  In particular, the paper presents model-driven transformations between platform-independent (conceptual descriptions of Web applications) and platform-specific (Model-View-Controller conformant) models  ...  Acknowledgments We thank Amleto Di Salle and Fabio Mancinelli for the lively and enlightening discussions. Also, we are grateful for the insightful comments we received from the anonymous reviewers.  ... 
doi:10.1007/11431855_33 fatcat:p33xf3rhrnh7zn7twdniqhdip4

Semantic-enabled architecture for auditable privacy-preserving data analysis

Fajar J. Ekaputra, Andreas Ekelhart, Rudolf Mayer, Tomasz Miksa, Tanja Šarčević, Sotirios Tsepelakis, Laura Waltersdorfer, Michel Dumontier, Sabrina Kirrane, Oshani Seneviratne
2022 Semantic Web Journal  
and user consent, automatic checking of usage policies or data anonymisation.  ...  as the GDPR in the EU, which stipulates high standards in data protection.  ...  Furthermore, this work was sponsored by the Austrian Science Fund (FWF) and netidee SCIENCE under grant P30437-N31 and the Vienna Business Agency (VasQua Project).  ... 
doi:10.3233/sw-212883 fatcat:w7ga3gktffesvk5vgrtlgrgepa

Analysis of ontologies and policy languages to represent information flows in GDPR

Beatriz Esteves, Víctor Rodríguez-Doncel, Michel Dumontier, Sabrina Kirrane, Oshani Seneviratne
2022 Semantic Web Journal  
. 13 privacy-related policy languages and 9 data protection vocabularies and ontologies are studied in relation to this list of informational items.  ...  items can be modelled.  ...  Acknowledgements This research has been supported by European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 813497 (PROTECT).  ... 
doi:10.3233/sw-223009 fatcat:k6ne3yxrobbp3msouvh5ufadda

Evidence-based Public Health Policy Models Development and Evaluation using Big Data Analytics and Web Technologies

Konstantinos Moutselos, Ilias Maglogiannis
2020 Medicinski arhiv  
The Policy Development Toolkit presents a unique interface and point of reference for policymakers, allowing them to create policy models and obtain analytical results for evidence-based decisions and  ...  The hierarchical structure of the Public Health Policy Model offers versatility in the creation and handling of the policies, resulting in Health Analytics Tools Results Objects which offer quantitative  ...  Hovering over a KPI displays related info, as to help the policymaker in the assembling of KPIs into a policy model.  ... 
doi:10.5455/medarh.2020.74.47-53 pmid:32317835 pmcid:PMC7164729 fatcat:dyxil5jcv5cu7ciyefeph6qjnu

Information retrieval on the web

Mei Kobayashi, Koichi Takeda
2000 ACM Computing Surveys  
In this paper we review studies of the growth of the Internet and technologies that are useful for information search and retrieval on the Web.  ...  We present data on the Internet from several different sources, e.g., current as well as projected number of users, hosts, and Web sites.  ...  Its rankings are based, in part, on the number of other pages with pointers to the page. This policy seems to slightly favor educational and government sites over commercial ones.  ... 
doi:10.1145/358923.358934 fatcat:t3lvaov2t5axbffelxde7syqau

Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

Asish Kumar Dalai, Sanjay Kumar Jena
2017 Security and Communication Networks  
Some popular SQL injection attack tools and web application security datasets have been used to validate the model.  ...  A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server.  ...  A false acceptance occurs when the protection mechanism at the application server is unable to stop the malicious web request and the query having SQL injection code is sent to the database server for  ... 
doi:10.1155/2017/3825373 fatcat:ywxv3k7pvvfpdhuijy26hrlxtm

API-centric Linked Data integration: The Open PHACTS Discovery Platform case study

Paul Groth, Antonis Loizou, Alasdair J.G. Gray, Carole Goble, Lee Harland, Steve Pettifer
2014 Journal of Web Semantics  
Between its launch in April 2013 and March 2014, the platform has been accessed over 13.5 million times and has multiple applications that integrate with it.  ...  To address this challenge, the Open PHACTS consortium has developed the Open PHACTS Discovery Platform that leverages Linked Data to provide integrated access to pharmacology databases.  ...  Additionally, it protects the database infrastructure from incorrect or complex queries (i.e. no one exposes SQL endpoints completely to the Web).  ... 
doi:10.1016/j.websem.2014.03.003 fatcat:orin7osdn5ddhk3ss5q6sipx5y

Identity Assurance in the UK: technical implementation and legal implications under eIDAS

Niko Tsakalakisz, Sophie Stalla-Bourdillon, Kieron O'Hara
2017 Journal of Web Science  
It then assesses Gov.UK Verify's compliance against the aforementioned set of requirements and the impact of the system's design on privacy and data protection.  ...  The article contributes to relevant literature of privacy-preserving eID management by offering policy and technical recommendations for compliance with the new Regulation and an evaluation of interoperability  ...  The model uses three groups, or layers, of data protection provisions according to the objective of protection they offer.  ... 
doi:10.1561/106.00000010 dblp:journals/jws/TsakalakisSO17 fatcat:v6ytzr4cobgdrgpyubmcksz3cy

Introduction to Linked Data and Its Lifecycle on the Web [chapter]

Axel-Cyrille Ngonga Ngomo, Sören Auer, Jens Lehmann, Amrapali Zaveri
2014 Lecture Notes in Computer Science  
The term Linked Data refers to a set of best practices for publishing and interlinking structured data on the Web.  ...  With Linked Data, a very pragmatic approach towards achieving the vision of the Semantic Web has gained some traction in the last years.  ...  In particular, we would like to thank Christian Bizer and Tom Heath, whose Chaper 2 of the book 'Linked Data -Evolving the Web into a Global Data Space' [53] served as a blueprint for Section 2; Sebastian  ... 
doi:10.1007/978-3-319-10587-1_1 fatcat:2vba6rydjvehro3cwcakafnn5e

Slides: Covid-19: An exploration of consecutive systemic barriers to pathogen-related data sharing during a pandemic

Yo Yehudi
2021 Zenodo  
to data, unnecessarily strict access controls and data re-use policies, unclear data provenance, inability to link separate datasources that could collectively create a more complete picture, poor metadata  ...  In 2020, the COVID-19 pandemic resulted in a rapid response from governments and researchers worldwide.  ...  over the age of seventy dies?  ... 
doi:10.5281/zenodo.5234426 fatcat:vc5uqcqqd5fcremawcgf474afy

Ontology Based Data Access in Statoil

Evgeny Kharlamov, Dag Hovland, Martin G. Skjæveland, Dimitris Bilidas, Ernesto Jiménez-Ruiz, Guohui Xiao, Ahmet Soylu, Davide Lanti, Martin Rezk, Dmitriy Zheleznyakov, Martin Giese, Hallstein Lie (+4 others)
2017 Journal of Web Semantics  
The ontology is 'connected' to the data via mappings that allow to automatically translate queries posed over the ontology into data-level queries that can be executed by the underlying database management  ...  of translating ontological queries into data queries and their execution over either a single DB of federated DBs; and a query formulation module to support query construction for engineers with a limited  ...  This work was partially funded by the EU project Optique (FP7-ICT-318338), the EPSRC projects MaSI 3 , DBOnto, ED 3 , the BIGMED project (IKT 259055), and the SIRIUS Centre for Scalable Data Access (Research  ... 
doi:10.1016/j.websem.2017.05.005 fatcat:ghpdmsaoizc6bgly4cuyxljvq4

Privacy Risks from Public Data Sources [chapter]

Zacharias Tzermias, Vassilis Prevelakis, Sotiris Ioannidis
2014 IFIP Advances in Information and Communication Technology  
We believe that the lack of a big picture which was caused by the piecemeal development of these datasources hides the true extent of the threat.  ...  The vulnerabilities we have discovered enable the collection of personal data and, thus, open the way for a variety of impersonation attacks, identity theft, confidence trickster attacks and so on.  ...  HOME/2010/ISEC/AG/INT-002 and by FP7 project SysSec, funded by the European Commission under Grant Agreement No. 257007.  ... 
doi:10.1007/978-3-642-55415-5_13 fatcat:ax3hajkbibcp7fzwdps7kgpgni

Policy Cloud D4.4 REUSABLE MODEL & ANALYTICAL TOOLS: SOFTWARE PROTOTYPE 2

Ofer Biran, Oshrit Feder, Yosef Moatti, María Ángeles Sanguino, Argyro Mavrogiorgou, Thanos Kiourtis, George Manias, Nikitas Sgouros, Konstantinos Koutsoukos, Ilias Maglogiannis, Pavlos Kranas
2022 Zenodo  
The components include the DAA API Gateway (responsible for the overall orchestration and the layer API), the built-in analytical tools - for Data cleaning and interoperability, Situational Knowledge,  ...  This deliverable provides a second and much upgraded description of the software demonstration for the components of the Integrated Data Acquisition and Analytics (DAA) Layer, which provides the analytical  ...  OF POLICY MODELS Each policy model is represented as a tree structure in JSON format.  ... 
doi:10.5281/zenodo.5971103 fatcat:pya4my33ajgtfcftgmaknsojqi
« Previous Showing results 1 — 15 out of 202 results