7,034 Hits in 7.9 sec

Representation and Inference of Privacy Risks Using Semantic Web Technologies

Renata Vieira, Douglas da Silva, Tomas Sander, Alexandre Agustini, Caio Northfleet, Fernando M. B. M. de Castilho, Mírian Bruckschen, Patricia Pizzinato, Paulo Bridi, Prasad Rao, Roger Granada
2010 International Conference Knowledge Engineering and Knowledge Management  
This poster discusses domain ontologies on the privacy field for automatic risk identification and project qualification.  ...  It presents an ontology model for describing risks as an interpretation of privacy policies contextualized in project specifications.  ...  An integration of policies relating several aspects of security is proposed in [7] , including authorization and privacy into semantic web services.  ... 
dblp:conf/ekaw/VieiraSSANCBPBR10 fatcat:rcoszlojcrgx3n5pn4gfvd5faa

Semantic Web Technologies for Social Translucence and Privacy Mirrors on the Web

Mathieu d'Aquin, Keerthi Thomas
2013 International Semantic Web Conference  
semantic technologies, for individual monitoring and sense-making of personal information on the Web.  ...  We show through several examples of such implementations how the issues of data integration, data processing and the need for inference that are raised by such approaches provide an interesting use of  ...  Reasoning to infer hidden privacy connections In the previous sections, we showed how semantic technologies can be useful in creating the features of translucent systems for the Web, through data integration  ... 
dblp:conf/semweb/dAquinT13a fatcat:tpu7ckgnxjhdpdyifnbn7sa2qe


2011 International Journal of Semantic Computing (IJSC)  
Past and current research on the application of semantic web technologies for policy management and inference control, the application of data mining technologies for intrusion and malware detection, and  ...  This paper explores the integration of semantic computing technologies with security technologies.  ...  The significant advantage of Semantic Web technologies is their representational and reasoning power.  ... 
doi:10.1142/s1793351x11001201 fatcat:5yddnb5kgngfnpy3urke6ulwai

Web2Touch 2017: Semantic Technologies in Smart Information Sharing and Web Collaboration

Olga Nabuco, Rodrigo Bonacin, Riccardo Martoglia
2017 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)  
services and collaboration and push forward new ways of interpreting the role of the web.  ...  The overall focus is on how research on semantics coupled with crucial topics such as big data analysis, privacy, knowledge representation, and enterprise contents management, among the others, can improve  ...  This framework is based on complex system modeling techniques, semantic technology, collaborative systems design, and ubiquitous technology. III. WEB2TOUCH TEAM A.  ... 
doi:10.1109/wetice.2017.49 dblp:conf/wetice/NabucoBM17 fatcat:smq2yajonjco5c7hqxhz3k5474

Towards Cataloguing Potential Derivations of Personal Data

Harshvardhan J. Pandit, Javier D. Fernández, Axel Polleres
2019 Zenodo  
Our approach is useful for identifying risks of potential data derivations from given data and provides a starting point towards an open catalogue to document known derivations for the privacy community  ...  In this paper, we address this issue with an approach for identifying potential data derivations using a rule-based formalisation of examples documented in the literature using Semantic Web standards.  ...  Acknowledgements: This work is supported by funding under EU's Horizon 2020 research and innovation programme: grant 731601 (SPECIAL), the Austrian Research Promotion Agency's (FFG) program "ICT of the  ... 
doi:10.5281/zenodo.3246434 fatcat:6qrglotscvdt3kr5nxatgpdnvy

Health Information Management On Semantic Web :(Semantic HIM)

Nasim Khozoie
2012 International journal of Web & Semantic Technology  
Information technology have changed information media by networking and internet .using technology in health as same as another part improve efficieincy and effectivness. currently the medical document  ...  In the meantime semantic HIM seem best solution. KEYWORDS Health Information management (HIM), medical document, health information system(HIS), semantic web, security, trust.  ...  of semantic Web technologies.  ... 
doi:10.5121/ijwest.2012.3106 fatcat:lxx6xu54o5a2ldpfuputn6rpwi

AI and Security Informatics

Hsinchun Chen
2010 IEEE Intelligent Systems  
The main objective is the development of advanced information technologies, systems, algorithms, and databases for security-related applications using an integrated technological, organizational, and policy-based  ...  The US 2002 National Strategy for Homeland Security report identifi ed science and technology as the keys to winning this international security war. 1 It is widely believed that information technology  ...  Acknowledgments We thank Elisa Bertino, Elena Ferrari, and Barbara Carminati for collaborating with us on the topics we discussed here.  ... 
doi:10.1109/mis.2010.116 fatcat:75x42d7bbbac7b4yj3qtowd744

Accelerating Knowledge Discovery through Community Data Sharing and Integration

Y.L. Yip
2009 IMIA Yearbook of Medical Informatics  
Enabling technologies, either Semantic Web or other solutions, are expected to play an increasingly important role in generating new knowledge in the foreseeable future.  ...  Results The selection process for this yearbook's section on Bioinformatics results in six excellent articles highlighting several important trends First, it can be noted that Semantic Web technology continues  ...  Acknowledgement I would like to acknowledge the support of Martina Hutter and the reviewers in the selection process of the IMIA Yearbook.  ... 
doi:10.1055/s-0038-1638650 fatcat:dmird6o2g5buldu7pnhbfirvoi

Introduction [chapter]

Tharam S. Dillon, Elizabeth Chang, Robert Meersman, Katia Sycara
2008 Lecture Notes in Computer Science  
This has been a sudden upsurge of research activity in the problems associated with adding semantics to the Web. This work on semantics will involve data, knowledge, and process semantics.  ...  The Web has now been in existence for quite some time and it is pervasive in its influence on all aspects of society and commerce.  ...  Interoperability and Integration for IS Theme 6: Applications of Semantic Web in Domains • Formal and Practical knowledge representation and inference for the seman- tic Web • Human centered aspects  ... 
doi:10.1007/978-3-540-89784-2_1 fatcat:ewc2brfrzndjha7dgcfruj2h3a

Semantic Insecurity: Security and the Semantic Web

Harry Halpin
2017 International Semantic Web Conference  
TLS is not in use currently for the majority of URIs on the Semantic Web, and this leads to a number of potential attacks on the network, web, and even semantic level.  ...  After explaining the necessity and arguments over the TLS on the Semantic Web, we point out security and privacy flaws in WebID+TLS and recent other proposed Semantic Web standards at the W3C.  ...  of cryptography in WebID+TLS. 2 This also problematically leads to the Semantic Web to become a privacy risk for personal data, rather than being a force for privacy.  ... 
dblp:conf/semweb/Halpin17 fatcat:px35zugik5abjpbwhmvusoeqyq

An Ontology based Approach for Context-Aware Security in the Internet of Things (IoT)

Asifa Nazir, Department of Computer Science &Engineering Islamic University of Science &Technology, Awantipora, India
2021 International Journal of Wireless and Microwave Technologies  
The semantic specifications of different sensors are presented in paper [18] . Many tools are accessible to define, present and share ontologies developed by the World Wide Web Consortium.  ...  Different parameters addressed in this work are authentication, access-control, authorization and privacy using context-awareness methodology that can enable naive users make informed security decision  ...  Acknowledgement This research work is funded under the seed grant initiative of TEQIP-III project currently being implemented at Islamic university of Science and Technology, Awantipora, Jammu and Kashmir  ... 
doi:10.5815/ijwmt.2021.01.04 fatcat:dvdtt5nntvbtlnkmnv476lf234

Secure Semantic Smart HealthCare (S3HC)

Sanju Mishra Tiwari, Sarika Jain, Ajith Abraham, Smita Shandilya
2019 Journal of Web Engineering  
reasoning of even highly skilled and knowledgeable experts putting the lives of patients at risk.  ...  The situation may become even worse when data is coming from various healthcare devices and sensors which are themselves characterized by a number of representation and serialization formats.  ...  • Semantic Web of Things (SWoT) SWoT is an integration of web based IoT applications and semantic web technologies to improve the data and enable its significance in diverse and multiple applications  ... 
doi:10.13052/jwe1540-9589.1782 fatcat:2aebtzstdvbczb72hgivyi7ipa

Semantic Web Enabled Record Linkage Attacks on Anonymized Data

Jacob Miracle, Michelle Cheatham
2016 International Semantic Web Conference  
This paper explores the components of a record linkage attack and how semantic web technologies could play a role in facilitating them.  ...  Most of these attacks are currently conducted manually and can be labor-intensive, but as semantic web technologies continue to gain popularity, the potential for automating various aspects of these attacks  ...  The ramifications of Semantic Web technologies on privacy are likely to be profound.  ... 
dblp:conf/semweb/MiracleC16 fatcat:wirky6w2nndqph4syr6waeav5y

The Personal Health Library (PHL): Enabling an mHealth Recommender System for Self-Management of Diabetes among Underserved Population with Multiple Chronic Conditions (Preprint)

Nariman Ammar, James E Bailey, Robert L Davis, Arash Shaban-Nejad
2020 JMIR Formative Research  
We describe the technological infrastructures used to construct, manage, and integrate the types of knowledge stored in the PHL.  ...  We used the results to identify the technologies needed to address those requirements.  ...  Solid is shaping the future vision of the decentralized Web (Web 3.0) by enhancing the technologies used to build Web 2.0 while bringing back the privacy and freedom-oriented values of Web 1.0.  ... 
doi:10.2196/24738 pmid:33724197 fatcat:zdkjkq6ldng4hekdgvvqyteguu

Standards for secure data sharing across organizations

Douglas Harris, Latifur Khan, Raymond Paul, Bhavani Thuraisingham
2007 Computer Standards & Interfaces  
, semantic web data management, knowledge management, visualization, metadata extraction and management, and security management for data sharing are discussed.  ...  We will illustrate the ideas with an example from emergency response and public health awareness application domain.  ...  Acknowledgements We thank Mike Roberts of GTM Partnership for coauthoring a white paper from which we got ideas for the application domain. We also thank Li Liu for redrawing the figures.  ... 
doi:10.1016/j.csi.2006.01.004 fatcat:brebhotekrbozdbs7mnzf5gyh4
« Previous Showing results 1 — 15 out of 7,034 results