50,118 Hits in 3.4 sec

Trustworthy Semantic Web Technologies for Secure Knowledge Management

Bhavani Thuraisingham, Pranav Parikh
2008 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing  
In this paper we explore the applications of trustworthy semantic web technologies for secure knowledge management.  ...  Semantic web technologies have many applications due to their expressive and reasoning power.  ...  One of the crucial applications of semantic web technologies is knowledge management.  ... 
doi:10.1109/euc.2008.174 dblp:conf/euc/ThuraisinghamP08 fatcat:hesyz4ralfdxnajyxseigwfeqa

Health Information Management On Semantic Web :(Semantic HIM)

Nasim Khozoie
2012 International journal of Web & Semantic Technology  
In the meantime semantic HIM seem best solution. KEYWORDS Health Information management (HIM), medical document, health information system(HIS), semantic web, security, trust.  ...  Information technology have changed information media by networking and internet .using technology in health as same as another part improve efficieincy and effectivness. currently the medical document  ...  The next section will elaborate on semantic Web technologies for e-HIS. The integration of e-HIS with the semantic Web has come to be known as semantic e-HIS.  ... 
doi:10.5121/ijwest.2012.3106 fatcat:lxx6xu54o5a2ldpfuputn6rpwi

Policy based Security Framework in Semantic Web

2020 International Journal of Engineering and Advanced Technology  
Success of Semantic Web depends on the way security is handle at various layers. Here, we are providing a policy based security framework containing Knowledge base, Distributed policy Management.  ...  Semantic Web (SW), an extension of Web2.0 which can integrate various application and system such that data can be processed by machine instead of human using RDF, SPARQL, OWL technologies.  ...  Policy Based Security Framework In Semantic Web It is a security framework based on policies which is using a distributed policy management approaches, semantically risk and enforces security policies.  ... 
doi:10.35940/ijeat.d8697.049420 fatcat:fxjyrnfvrrg4bigmyzetrnwnvi

Privacy, security and policies: A review of problems and solutions with semantic web technologies

Sabrina Kirrane, Serena Villata, Mathieu d'Aquin, Mathieu d'Aquin, Sabrina Kirrane, Serena Villata
2018 Semantic Web Journal  
Monitoring Monitor the use and distribution of the artifact for policy management. Policy enforcement Put mechanisms in place to enforce compliance with the policy.  ...  Following on from this we use the aforementioned classifications to frame our discussion of existing work on privacy, security and policies in the Semantic Web domain.  ... 
doi:10.3233/sw-180289 fatcat:xrv6ts4xz5awva7fseg4urh5dm

Trust and Security on Semantic HIM (Health Information Management)

Nasim Khozouei, Razie Vanda, Peyman Khozouei
2012 Intelligent Information Management  
These processes are difficult and time consuming for human. In the meantime semantic HIM seem best solution.  ...  Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness.  ...  The next section will elaborate on semantic Web technologies for e-HIS. The integration of e-HIS with the semantic Web has come to be known as semantic e-HIS.  ... 
doi:10.4236/iim.2012.46045 fatcat:nqzwn3ck4vhpjkzej2apufc2em

Secure Semantic Sensor Web and Pervasive Computing

Bhavani Thuraisingham, Kevin W. Hamlen
2010 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing  
In this paper we discuss issues on developing a secure semantic sensor web. SensorML is the starting point for this work. We explore the layers for a semantic sensor web and discuss security issues.  ...  We also discuss secure peer-to-peer computing as it relates to sensor web.  ...  In the recent workshop on Semantic Sensor Networks in Athens, Georgia [11] , there were discussions on the use of semantic webs to address sensor networking applications using RFID technologies as well  ... 
doi:10.1109/sutc.2010.75 dblp:conf/sutc/ThuraisinghamH10 fatcat:bipnakigpnal3kzwqsqpmk3tay


2011 International Journal of Semantic Computing (IJSC)  
Past and current research on the application of semantic web technologies for policy management and inference control, the application of data mining technologies for intrusion and malware detection, and  ...  This paper explores the integration of semantic computing technologies with security technologies.  ...  Semantic web technologies have also been applied for policy management for organizational data sharing [7] .  ... 
doi:10.1142/s1793351x11001201 fatcat:5yddnb5kgngfnpy3urke6ulwai

Using semantic rules to determine access control for web services

Brian Shields, Owen Molloy, Gerard Lyons, Jim Duggan
2006 Proceedings of the 15th international conference on World Wide Web - WWW '06  
Semantic Web technologies are bring increasingly employed to solve knowledge management issues in traditional Web technologies.  ...  Using these rules, a system will be able to manage access to Web Services and also the information accessed via these services.  ...  Damiani et al [3] outline how "current standard policy languages such as XACML can be extended" to be able to semantically define access control policies for the Semantic Web.  ... 
doi:10.1145/1135777.1135941 dblp:conf/www/ShieldsMLD06 fatcat:7queb4uap5cv5b6alavfch7qwa

Access control management for e-Healthcare in cloud environment

Lili Sun, Jianming Yong, Jeffrey Soar
2014 EAI Endorsed Transactions on Scalable Information Systems  
This work shows how the semantic web technology provides efficient solutions for the management of complex and distributed data in heterogeneous systems, and it can be used in the medical information systems  ...  We have enriched the research for semantic web technology with role-based access control that is able to be applied in the field of medical information system or e-Healthcare system.  ...  Our goal is to request and extend the RBAC model using semantic web technologies.  ... 
doi:10.4108/sis.1.2.e3 fatcat:jkhmx6no4bh4ve4wqbdegiwfwm

Security standards for the semantic web

Bhavani Thuraisingham
2005 Computer Standards & Interfaces  
This paper first describes the developments in standards for the semantic web and then describes standards for secure semantic web.  ...  Some details of our research on access control and dissemination of XML documents are also given. Next privacy issues for the semantic web are discussed.  ...  Acknowledgements I thank the National Science Foundation and the MITRE Corporation for their support of my research on security issues for the semantic web.  ... 
doi:10.1016/j.csi.2004.07.002 fatcat:kztl5j3k75halch3xqu2djdhpi

Cloud Platform Support for API Governance

Chandra Krintz, Hiranya Jayathilaka, Stratos Dimopoulos, Alexander Pucher, Rich Wolski, Tevfik Bultan
2014 2014 IEEE International Conference on Cloud Engineering  
In this paper, we postulate that recent advances in cloud computing make cloud platforms as-aservice (PaaS) ideal for deployment, lifecycle management, and policy-based control -i.e.  ...  As scalable information technology evolves to a more cloud-like model, digital assets (code, data and software environments) increasingly require curation as web-accessible services.  ...  ACKNOWLEDGEMENTS We thank the reviewers for their valuable feedback. This work was funded in part by NSF (CNS-0905237 and CNS-1218808) and NIH (1R01EB014877-01).  ... 
doi:10.1109/ic2e.2014.90 dblp:conf/ic2e/KrintzJDPWB14 fatcat:sp7zr654mfhjrkrm5l2pywyrie

Personal Semantics: Personal Information Management in the Web with Semantic Technologies [chapter]

Salman Elahi
2011 Lecture Notes in Computer Science  
In this PhD, we will investigate research issues and challenges in realizing such a system based on semantic technologies.  ...  To tackle issues associated with current service-centric approaches, we propose a user-centric architecture where the interaction between a user and other agents is managed based on a global profile for  ...  The policy framework derives security policies based on the rich semantic information about the agents the user is interacting with and defines access rights on the contents which are then used in the  ... 
doi:10.1007/978-3-642-21064-8_41 fatcat:z5nil3zey5fjlhqbr7vhovnpcy

An Approach for Establishing Trust Relationships in the Web Service Technology [chapter]

Diego Zuquim Guimarãaes Garcia, Maria Beatriz Felgar de Toledo
2008 IFIP International Federation for Information Processing  
The approach integrates WS-Trust with standards for policy and ontology, which are used to preserve privacy. 53 Please use the following format when citing this chapter:  ...  Based on this fact, the goal of this paper is to propose a trust approach for Web services.  ...  ., 2004) use the Semantic Web technology to handle authorization for Web services. Shields et al (Shields et al., 2006) propose an approach for the specification of access control policies.  ... 
doi:10.1007/978-0-387-84837-2_53 fatcat:hralochio5am5chh34kwmua7ci

Security and Privacy for Web Databases and Services [chapter]

Elena Ferrari, Bhavani Thuraisingham
2004 Lecture Notes in Computer Science  
While much progress has been made toward developing such an intelligent web, there is still a lot to be done. For example, there is little work on security and privacy for the semantic web.  ...  However, before we examine security for the semantic web we need to ensure that its key components, such as web databases and services, are secure.  ...  That is, hypermedia technology has to be integrated with database management technology. Transaction management is essential for many applications.  ... 
doi:10.1007/978-3-540-24741-8_3 fatcat:g57gvzdgafdd5h77kzkr5i6wey

A Semantic Policy Management Environment for End-Users and Its Empirical Study [chapter]

Anna V. Zhdanova, Joachim Zeiß, Antitza Dantcheva, Rene Gabner, Sandford Bessler
2009 Studies in Computational Intelligence  
We describe a policy management environment (PME) for the Semantic Web and show its added value compared to existing policy-related developments.  ...  The implementation of such a policy editor has at its core a semantic reasoner operating on N3 rules and a simple web-based user interface.  ...  Acknowledgements The Telecommunications Research Center Vienna (ftw.) is supported by the Austrian government and the City of Vienna within the competence center program COMET.  ... 
doi:10.1007/978-3-642-02184-8_17 fatcat:b4w2ot7qrvbilbt6g3tavj4o4m
« Previous Showing results 1 — 15 out of 50,118 results