DOC PREVIEW
UTD CS 7301 - Building Trustworthy Semantic Webs

This preview shows page 1-2-22-23 out of 23 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Building Trustworthy Semantic WebsOutlineSecure Web data/information managementSecure Web Database FunctionsSecure Query Management: Language IssuesSecurity/Integrity ManagementSecure Digital LibrariesSecure Information RetrievalSecure BrowsingInteroperability of Heterogeneous Database SystemsTechnical Issues on the Interoperability of Heterogeneous Database SystemsFederated Database ManagementSchema Integration and Transformation in a Federated EnvironmentTransforming Secure Data ModelsSecure Schema IntegrationSecurity Policy IntegrationFederated Data and Policy ManagementInference ControlApplications of Semantic Web TechnologiesWhat are web portals?PersonalizationVirtual WorkspacesSemantic Web Applications for Web PortalsBuilding Trustworthy Semantic WebsDr. Bhavani ThuraisinghamThe University of Texas at DallasSemantic web technologies for secure interoperability and digital librariesMarch 2010OutlineSecure Digital libraries and semantic webSecure heterogeneous/federated data management and semantic webSecure web portalsSecure Web data/information managementSecure data models-Secure XML, RDF, - - - --Relational, object-oriented, text, images, video, etc.Secure data management functions-Secure query, transactions, storage, metadataKey components for secure digital libraries and information retrieval/browsingSecure Web Database FunctionsSecure Web DataManagementSecure Metadata ManagementSecure Data Warehousing Secure Web MiningSecure InteroperabilitySecure Query ProcessingSecure Transaction ManagementSecure Storage ManagementSecurity and IntegritySecure Query Management: Language IssuesQuery language to access the databases-SQL extensions are being examined-XML-based query languages combined with SQL are emerging-Example: XML-QL-Querying RDF DataXML extensions for Multimedia databases such as SMIL (Synchronized Multimedia Interface Language)Mappings between multiple languagesWeb rules and query languages developed by W3CSecurity should be incorporated into all aspectsSecurity/Integrity ManagementSupport for flexible security policiesNegotiations between different database administratorsAuthorization and access control models such as role-based access controlIdentification and authenticationPrivacy ControlCopyright protection / PlagiarismMaintaining the quality of the data coming from foreign sourcesRepresent data and policies in XML, RDF, OWL and reason to determine quality and ensure securitySecure Digital LibrariesDigital libraries are e-libraries-Several communities have developed digital librariesMedical, Social, Library of CongressComponents technologies-Web data management, Multimedia, information retrieval, indexing, browsing, -- - -Security has to be incorporated into all aspects-Secure models for digital libraries, secure functionsSecure Information RetrievalSecure QueryProcessorSecure Browser/EditorSecure UpdateProcessorSecurity/IntegrityManagerSecure Metadata ManagerSecure StorageManagerSecure StorageManagerSecure BrowsingBrowser augments a multimedia system to develop a hypermedia systemSearch space consist of nodes and links with different access control rules and/or classification levelsMay be represented as RDF GraphsCan a user traverse a link or access the contents of a node?-What authorization does he/she have?Interoperability of Heterogeneous Database SystemsDatabase System ADatabase System BNetworkDatabase System C(Legacy)Transparent accessto heterogeneousdatabases - both usersand application programs;Query, Transactionprocessing(Relational)(Object-Oriented)Technical Issues on the Interoperability of Heterogeneous Database SystemsHeterogeneity with respect to data models, schema, query processing, query languages, transaction management, semantics, integrity, and security policiesFederated database management-Collection of cooperating, autonomous, and possibly heterogeneous component database systems, each belonging to one or more federationsInteroperability based on client-server architecturesFederated Database ManagementDatabase System ADatabase System BDatabase System CCooperating databasesystems yet maintainingsome degree ofautonomyFederation F1Federation F2Schema Integration and Transformation in a Federated EnvironmentAdapted from Sheth and Larson, ACM Computing Surveys, September 1990Component Schema for Component AComponent Schema for Component BComponent Schema for Component CGeneric Schema for Component AGeneric Schemafor Component BGeneric Schemafor Component CExport Schemafor Component AExport Schema Ifor Component BExport Schemafor Component CFederated Schemafor FDS - 1Federated Schemafor FDS - 2ExternalSchema 1.2 Schema 2.1ExternalSchema 2.2ExternalSchema 1.1Export Schema IIfor Component BExternalTransforming Secure Data ModelsEMP: Level = SecretSS# Ename Salary D# 1 John 20K 102 Paul 30K 203 Mary 40K 20Class EMP is SecretIt has 3 instances:John, Paul and MaryDEPTD# Dname Mgr10MathSmith U20 Physics Jones CLevelClass DEPT is UnclassifiedIt has 2 instances Math and PhysicsMath is UnclassifiedPhysics is ConfidentialSecure Schema IntegrationSecure Schemas at the Componentlevel: e.g., Component schemasfor components A, B, and CGeneric schemas for the components:e.g., generic schemas for components A, B, and CExternal schemas: Schemasfor the various classes of usersLayer 1Layer 2Layer 5Federated schemas: integrate export schemas of the components of the federationLayer 4Export schemas for the components:e.g., export schemas for components A, B, and C(note: component may export different schemasto different federations)Layer 3Security must be maintained during transformationsSecurity Policy IntegrationPolicies at the Componentlevel: e.g., Component policiesfor components A, B, and CGeneric policies for the components:e.g., generic policies for components A, B, and CExport policies for the components:e.g., export policies for components A, B, and C(note: component may export different policiesto different federations)Federated policies: integrate export policies of the components of the federationExternal policies: Policiesfor the various classes of usersLayer 1Layer 2Layer 3Layer 4Layer 5Federated Data and Policy ManagementExportData/PolicyComponentData/Policy for Agency AData/Policy for FederationExportData/PolicyComponentData/Policy for Agency CComponentData/Policy for Agency


View Full Document

UTD CS 7301 - Building Trustworthy Semantic Webs

Documents in this Course
Load more
Download Building Trustworthy Semantic Webs
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Building Trustworthy Semantic Webs and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Building Trustworthy Semantic Webs 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?