Filters








76,570 Hits in 4.3 sec

Using semantic rules to determine access control for web services

Brian Shields, Owen Molloy, Gerard Lyons, Jim Duggan
2006 Proceedings of the 15th international conference on World Wide Web - WWW '06  
This paper follows that trend and proposes using Semantic rule languages to construct rules for defining access control rules for Web Services.  ...  Using these rules, a system will be able to manage access to Web Services and also the information accessed via these services.  ...  The final two areas of research are more similar to this paper, although the research by Qin et al does not lend itself specifically to access control for Web Services and the work of Damiani et al enriches  ... 
doi:10.1145/1135777.1135941 dblp:conf/www/ShieldsMLD06 fatcat:7queb4uap5cv5b6alavfch7qwa

Access Control Mechanisms for Semantic Web services-A Discussion on Requirements & Future Directions [article]

Mandeep Kaur Gondara
2011 arXiv   pre-print
Security becomes the crucial factor for the adoption of the semantic based web services.  ...  Semantic Web is an open, distributed, and dynamic environment where access to resources cannot be controlled in a safe manner unless the access decision takes into account during discovery of web services  ...  These aspects include many parameters as discussed in section 4 for access control mechanism in semantic based web services.  ... 
arXiv:1105.0141v1 fatcat:t7ybrzt3efhe7p2nb4j3lxaovy

Access control for semantic Web services

S. Agarwal, B. Sprick
2004 Proceedings. IEEE International Conference on Web Services, 2004.  
semantics) and SPKI/SDSI (for specifying authorization based access control).  ...  In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web services with machine-processable  ...  We motivated that authorization based access control is better suited for the Semantic Web than authentication based access control.  ... 
doi:10.1109/icws.2004.1314813 dblp:conf/icws/AgarwalS04 fatcat:psidass4orajnnou63wjigoaxy

Using Semantic Web Services for AI-Based Research in Industry 4.0 [article]

Lukas Malburg and Patrick Klein and Ralph Bergmann
2020 arXiv   pre-print
In this paper, we present semantic web services for AI-based research in Industry 4.0.  ...  Therefore, we developed more than 300 semantic web services for a physical simulation factory based on Web Ontology Language for Web Services (OWL-S) and Web Service Modeling Ontology (WSMO) and linked  ...  The basic components of the semantic web services were developed and implemented in a student research project at Trier  ... 
arXiv:2007.03580v1 fatcat:4por3mig5rgxbkjpunwxlb4ndu

EXPRESS: EXPressing REstful Semantic Services Using Domain Ontologies [chapter]

Areeb Alowisheq, David E. Millard, Thanassis Tiropanis
2009 Lecture Notes in Computer Science  
Existing approaches to Semantic Web Services (SWS) require a domain ontology and a semantic description of the service.  ...  Its simplicity stems from the similarities between REST and the Semantic Web such as resource realization, self describing representations, and uniform interfaces.  ...  It offers fine grained role based access control, controlling what can be accessed, how and who can access it.  ... 
doi:10.1007/978-3-642-04930-9_59 fatcat:ottasuvievb2xf7fevfocw4l7m

Reasoning with semantics-aware access control policies for geospatial web services

Ashraful Alam, Ganesh Subbiah, Bhavani Thuraisingam, Latifur Khan
2006 Proceedings of the 3rd ACM workshop on Secure web services - SWS '06  
Geospatial semantic Web services can employ the framework to enforce resource access and intelligently make decisions about policy rules.  ...  To solve the problem, semantics-aware Web services have been proposed. The other major huddle for Web services is the security architecture.  ...  SEMANTICS FOR WEB SERVICE ACCESS CONTROL This section describes the policy constructs of the semantics-aware access control language for Web services.  ... 
doi:10.1145/1180367.1180380 dblp:conf/sws/AlamSTK06 fatcat:ywb3dj7n6bhnffxiomzhqqthxu

Near-Term Prospects for Semantic Technologies

V. Richard Benjamins, John Davies, Ricardo Baeza-Yates, Peter Mika, Hugo Zaragoza, Mark Greaves, Jose Manuel Gomez-Perez, Jesus Contreras, John Domingue, Dieter Fensel
2008 IEEE Intelligent Systems  
The use of semantics thus forms a scalable access layer over Web service data and processes.  ...  Web 2.0 technology can thus provide a means to generate and access the semantic service layer outlined above.  ... 
doi:10.1109/mis.2008.10 fatcat:wpv2mjskrndv5fo7lnosr7mb6y

Cloud Platform Support for API Governance

Chandra Krintz, Hiranya Jayathilaka, Stratos Dimopoulos, Alexander Pucher, Rich Wolski, Tevfik Bultan
2014 2014 IEEE International Conference on Cloud Engineering  
As scalable information technology evolves to a more cloud-like model, digital assets (code, data and software environments) increasingly require curation as web-accessible services.  ...  "Service-izing" digital assets consists of encapsulating assets in software that exposes them to web and mobile applications via well-defined yet flexible, network accessible, application programming interfaces  ...  API similarity can be analyzed from two perspectives: • Syntactic similarity -Similarity of the inputs and outputs of web APIs, and • Semantic similarity -Functional and behavioral similarity of web APIs  ... 
doi:10.1109/ic2e.2014.90 dblp:conf/ic2e/KrintzJDPWB14 fatcat:sp7zr654mfhjrkrm5l2pywyrie

A Policy Based Approach to Security for the Semantic Web [chapter]

Lalana Kagal, Tim Finin, Anupam Joshi
2003 Lecture Notes in Computer Science  
We present a security framework, based on this policy language, which addresses security issues for web resources, agents and services in the Semantic Web.  ...  Our research investigates the marking up of web entities with a semantic policy language and the use of distributed policy management as an alternative to traditional authentication and access control  ...  Our work is similar to role based access control -in that a user's access rights are computed from his/her properties.  ... 
doi:10.1007/978-3-540-39718-2_26 fatcat:iaa4tnvrdnghrcprihnjly3ww4

Semantic-based policy management for cloud computing environments

Hassan Takabi, James B.D. Joshi
2012 International Journal of Cloud Computing  
The semantic web technologies can provide the solution to interoperability of heterogeneous cloud service providers.  ...  In this paper, we introduce a semantic-based policy management framework that is designed to give users a unified control point for managing policies that control access to their data no matter where the  ...  Yague et al. (2003) have developed the semantic access control (SAC) model that applies semantic web technologies to the access control in open, heterogeneous and distributed systems.  ... 
doi:10.1504/ijcc.2012.046717 fatcat:jvnrlakt3rhzzp2iho5xi6frye

EXPRESS: EXPressing REstful Semantic Services

Areeb Alowisheq, David E. Millard
2009 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology  
We introduce a new approach for RESTful Semantic Web Services called EXPRESS.  ...  We also discuss other RESTful and non-RESTful approaches to Semantic Web Services and show how they relate.  ...  Approaches to Semantic Web Services Semantically enhanced Web Services These approaches can be either SOA based or REST based. SOA based SWS.  ... 
doi:10.1109/wi-iat.2009.324 dblp:conf/iat/AlowisheqM09 fatcat:nofbt2rcdbbihbc3ip6p7uwkxq

Security and Privacy for Web Databases and Services [chapter]

Elena Ferrari, Bhavani Thuraisingham
2004 Lecture Notes in Computer Science  
However, before we examine security for the semantic web we need to ensure that its key components, such as web databases and services, are secure.  ...  This paper will mainly focus on security and privacy issues for web databases and services. Finally, some directions toward developing a secure semantic web will be provided.  ...  This implies that traditional identity-based mechanisms for performing access control are not enough.  ... 
doi:10.1007/978-3-540-24741-8_3 fatcat:g57gvzdgafdd5h77kzkr5i6wey

A Semantic Security Architecture for Web Services The Access-eGov Solution

Stefan Dürbeck, Christoph Fritsch, Günther Pernul, Rolf Schillinger
2010 2010 International Conference on Availability, Reliability and Security  
Based on architectural research work conducted within the EU-funded research project Access-eGov, we outline our implementation of a semantic security architecture for web services by using industry-standard  ...  The security aspect is lagging behind its possibilities, and new access control approaches native to the semantic environment need to be applied.  ...  This work was achieved within the Access-eGov project, which was supported by the European Union under the IST Programme, contract No. FP6-2004-27020.  ... 
doi:10.1109/ares.2010.117 dblp:conf/IEEEares/DurbeckFPS10 fatcat:ak2scbkp2nb4pm54gz76dd3b2a

Dynamic data integration using Web services

Fujun Zhu, M. Turner, I. Kotsiopoulos, K. Bennett, M. Russell, D. Budgena, P. Breretona, J. Keane, P. Layzell, M. Rigby, Jie Xu
2004 Proceedings. IEEE International Conference on Web Services, 2004.  
Current web services technology has been used extensively and largely successfully in these distributed prototype systems.  ...  The work shows that web services provide a good infrastructure layer, but integration demands a higher level "broker" architectural layer; the paper identifies eight specific requirements for such an architecture  ...  Data Access Service (DAS) DAS Similar, but in prototype 1 we do not use semantic descriptions.  ... 
doi:10.1109/icws.2004.1314747 dblp:conf/icws/ZhuTKBRBBKLRX04 fatcat:ololnkgbv5fnheuw7tka5m4rba

Composing web services for large-scale tasks

In-Young Ko, R. Neches
2003 IEEE Internet Computing  
Conventional Web-based information-management systems consist of a client subsystem, which lets users uniformly access informationmanagement services, and a service access infrastructure, which lets higher-level  ...  Currently, Web services research focuses on developing mechanisms to describe individual services, locate them in a network environment, and access them based on functionalities and constraints.  ... 
doi:10.1109/mic.2003.1232518 fatcat:4mdoui45lbhcfd7nfphe6rpunq
« Previous Showing results 1 — 15 out of 76,570 results