DOC PREVIEW
UTD CS 7301 - Lecture #1- Introduction to Trustworthy Semantic Web

This preview shows page 1-2-3-24-25-26 out of 26 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1OutlineDevelopments in Data and Applications Security: 1975 - PresentDevelopments in Data and Applications Security: Multilevel Secure Databases - IDevelopments in Data and Applications Security: Multilevel Secure Databases - IISome Directions and Challenges for Data and Applications Security - ISome Directions and Challenges for Data and Applications Security - IICoalition Data and Policy SharingOther TopicsSemantic Web: OverviewLayered Architecture for Dependable Semantic WebRelationships between Dependability, Confidentiality, Privacy, TrustWhat is XML all about?Example XML DocumentSpecifying User Credentials in XMLSpecifying Security Policies in XMLRDFOntology MappingsRules ProcessingRule-Processing (Concluded)Semantic Web Database ManagementWeb ServicesWeb service architectureSecure Web Service ArchitectureExample Web ServiceInformation IntegrationDr. Bhavani ThuraisinghamJanuary 14, 2011Building Trustworthy Semantic WebsLecture #1: Introduction to Trustworthy Semantic Web12-201/14/19 08:59 Outline0Data and Applications Security -Developments and Directions0Secure Semantic Web-XML Security; Other directions0Some Emerging Secure DAS Technologies-Secure Sensor Information Management; Secure Dependable Information Management0Some Directions for Privacy Research -Data Mining for handling security problems; Privacy vs. National Security; Privacy Constraint Processing; Foundations of the Privacy Problem0What are the Challenges?12-301/14/19 08:59 Developments in Data and Applications Security: 1975 - Present0Access Control for Systems R and Ingres (mid 1970s)0Multilevel secure database systems (1980 – present)-Relational database systems: research prototypes and products; Distributed database systems: research prototypes and some operational systems; Object data systems; Inference problem and deductive database system; Transactions0Recent developments in Secure Data Management (1996 – Present)-Secure data warehousing, Role-based access control (RBAC); E-commerce; XML security and Secure Semantic Web; Data mining for intrusion detection and national security; Privacy; Dependable data management; Secure knowledge management and collaboration12-401/14/19 08:59 Developments in Data and Applications Security: Multilevel Secure Databases - I0Air Force Summer Study in 19820Early systems based on Integrity Lock approach0Systems in the mid to late 1980s, early 90s-E.g., Seaview by SRI, Lock Data Views by Honeywell, ASD and ASD Views by TRW-Prototypes and commercial products-Trusted Database Interpretation and Evaluation of Commercial Products0Secure Distributed Databases (late 80s to mid 90s)-Architectures; Algorithms and Prototype for distributed query processing; Simulation of distributed transaction management and concurrency control algorithms; Secure federated data management12-501/14/19 08:59 Developments in Data and Applications Security: Multilevel Secure Databases - II0Inference Problem (mid 80s to mid 90s)-Unsolvability of the inference problem; Security constraint processing during query, update and database design operations; Semantic models and conceptual structures0Secure Object Databases and Systems (late 80s to mid 90s)-Secure object models; Distributed object systems security; Object modeling for designing secure applications; Secure multimedia data management0Secure Transactions (1990s)-Single Level/ Multilevel Transactions; Secure recovery and commit protocols12-601/14/19 08:59 Some Directions and Challenges for Data and Applications Security - I0Secure semantic web -Security models0Secure Information Integration-How do you securely integrate numerous and heterogeneous data sources on the web and otherwise0Secure Sensor Information Management-Fusing and managing data/information from distributed and autonomous sensors0Secure Dependable Information Management-Integrating Security, Real-time Processing and Fault Tolerance0Data Sharing vs. Privacy-Federated database architectures?12-701/14/19 08:59 Some Directions and Challenges for Data and Applications Security - II0Data mining and knowledge discovery for intrusion detection-Need realistic models; real-time data mining0Secure knowledge management-Protect the assets and intellectual rights of an organization0Information assurance, Infrastructure protection, Access Control-Insider cyber-threat analysis, Protecting national databases, Role-based access control for emerging applications0Security for emerging applications-Geospatial, Biomedical, E-Commerce, etc. 0Other Directions-Trust and Economics, Trust Management/Negotiation, Secure Peer-to-peer computing,12-801/14/19 08:59 Coalition Data and Policy SharingExportData/PolicyComponentData/Policy for Agency AData/Policy for FederationExportData/PolicyComponentData/Policy for Agency CComponentData/Policy for Agency BExportData/Policy12-901/14/19 08:59 Other Topics0Secure Semantic Web0Secure Cloud Computing0Mobile code security0Vulnerability Analysis0Infrastructure security-Power grid0Healthcare Security0Financial Security12-1001/14/19 08:59 Semantic Web: Overview0According to Tim Berners Lee, The Semantic Web supports-Machine readable and understandable web pages-Enterprise application integration-Nodes and links that essentially form a very large databasePremise:Semantic Web Technologies = XML, RDF, Ontologies, RulesApplications: Web Database Management, Web Services, Information Integration12-1101/14/19 08:59 Layered Architecture for Dependable Semantic WebXML, XML SchemasRules/QueryLogic, Proof and TrustTRUSTOtherServicesRDF, OntologiesURI, UNICODEPRIVACY0Adapted from Tim Berners Lee’s description of the Semantic Web12-1201/14/19 08:59 Relationships between Dependability, Confidentiality, Privacy, TrustDependabilityConfidentialityPrivacyTrustDependability: Security, Privacy, Trust, Real-time Processing, Fault Tolerance; also sometimes referred to as “Trustworthiness”Confidentiality: Preventing the release of unauthorized information considered sensitivePrivacy: Preventing the release of unauthorized information about individuals considered sensitiveTrust: Confidence one has that an individual will give him/her correct information or an individual will protect sensitive information12-1301/14/19 08:59 What is XML all about?0XML is needed due to the limitations of HTML and complexities of SGML0It is an extensible markup language specified by the W3C


View Full Document

UTD CS 7301 - Lecture #1- Introduction to Trustworthy Semantic Web

Documents in this Course
Load more
Download Lecture #1- Introduction to Trustworthy Semantic Web
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #1- Introduction to Trustworthy Semantic Web and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #1- Introduction to Trustworthy Semantic Web 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?