Building Trustworthy Semantic WebsOutlineSecure Web data/information managementSecure Web Database FunctionsSecure Query Management: Language IssuesSecurity/Integrity ManagementSecure Digital LibrariesSecure Information RetrievalSecure BrowsingInteroperability of Heterogeneous Database SystemsTechnical Issues on the Interoperability of Heterogeneous Database SystemsFederated Database ManagementSchema Integration and Transformation in a Federated EnvironmentTransforming Secure Data ModelsSecure Schema IntegrationSecurity Policy IntegrationFederated Data and Policy ManagementInference ControlApplications of Semantic Web TechnologiesWhat are web portals?PersonalizationVirtual WorkspacesSemantic Web Applications for Web PortalsBuilding Trustworthy Semantic WebsDr. Bhavani ThuraisinghamThe University of Texas at DallasSemantic web technologies for secure interoperability and digital librariesMarch 2010OutlineSecure Digital libraries and semantic webSecure heterogeneous/federated data management and semantic webSecure web portalsSecure Web data/information managementSecure data models-Secure XML, RDF, - - - --Relational, object-oriented, text, images, video, etc.Secure data management functions-Secure query, transactions, storage, metadataKey components for secure digital libraries and information retrieval/browsingSecure Web Database FunctionsSecure Web DataManagementSecure Metadata ManagementSecure Data Warehousing Secure Web MiningSecure InteroperabilitySecure Query ProcessingSecure Transaction ManagementSecure Storage ManagementSecurity and IntegritySecure Query Management: Language IssuesQuery language to access the databases-SQL extensions are being examined-XML-based query languages combined with SQL are emerging-Example: XML-QL-Querying RDF DataXML extensions for Multimedia databases such as SMIL (Synchronized Multimedia Interface Language)Mappings between multiple languagesWeb rules and query languages developed by W3CSecurity should be incorporated into all aspectsSecurity/Integrity ManagementSupport for flexible security policiesNegotiations between different database administratorsAuthorization and access control models such as role-based access controlIdentification and authenticationPrivacy ControlCopyright protection / PlagiarismMaintaining the quality of the data coming from foreign sourcesRepresent data and policies in XML, RDF, OWL and reason to determine quality and ensure securitySecure Digital LibrariesDigital libraries are e-libraries-Several communities have developed digital librariesMedical, Social, Library of CongressComponents technologies-Web data management, Multimedia, information retrieval, indexing, browsing, -- - -Security has to be incorporated into all aspects-Secure models for digital libraries, secure functionsSecure Information RetrievalSecure QueryProcessorSecure Browser/EditorSecure UpdateProcessorSecurity/IntegrityManagerSecure Metadata ManagerSecure StorageManagerSecure StorageManagerSecure BrowsingBrowser augments a multimedia system to develop a hypermedia systemSearch space consist of nodes and links with different access control rules and/or classification levelsMay be represented as RDF GraphsCan a user traverse a link or access the contents of a node?-What authorization does he/she have?Interoperability of Heterogeneous Database SystemsDatabase System ADatabase System BNetworkDatabase System C(Legacy)Transparent accessto heterogeneousdatabases - both usersand application programs;Query, Transactionprocessing(Relational)(Object-Oriented)Technical Issues on the Interoperability of Heterogeneous Database SystemsHeterogeneity with respect to data models, schema, query processing, query languages, transaction management, semantics, integrity, and security policiesFederated database management-Collection of cooperating, autonomous, and possibly heterogeneous component database systems, each belonging to one or more federationsInteroperability based on client-server architecturesFederated Database ManagementDatabase System ADatabase System BDatabase System CCooperating databasesystems yet maintainingsome degree ofautonomyFederation F1Federation F2Schema Integration and Transformation in a Federated EnvironmentAdapted from Sheth and Larson, ACM Computing Surveys, September 1990Component Schema for Component AComponent Schema for Component BComponent Schema for Component CGeneric Schema for Component AGeneric Schemafor Component BGeneric Schemafor Component CExport Schemafor Component AExport Schema Ifor Component BExport Schemafor Component CFederated Schemafor FDS - 1Federated Schemafor FDS - 2ExternalSchema 1.2 Schema 2.1ExternalSchema 2.2ExternalSchema 1.1Export Schema IIfor Component BExternalTransforming Secure Data ModelsEMP: Level = SecretSS# Ename Salary D# 1 John 20K 102 Paul 30K 203 Mary 40K 20Class EMP is SecretIt has 3 instances:John, Paul and MaryDEPTD# Dname Mgr10MathSmith U20 Physics Jones CLevelClass DEPT is UnclassifiedIt has 2 instances Math and PhysicsMath is UnclassifiedPhysics is ConfidentialSecure Schema IntegrationSecure Schemas at the Componentlevel: e.g., Component schemasfor components A, B, and CGeneric schemas for the components:e.g., generic schemas for components A, B, and CExternal schemas: Schemasfor the various classes of usersLayer 1Layer 2Layer 5Federated schemas: integrate export schemas of the components of the federationLayer 4Export schemas for the components:e.g., export schemas for components A, B, and C(note: component may export different schemasto different federations)Layer 3Security must be maintained during transformationsSecurity Policy IntegrationPolicies at the Componentlevel: e.g., Component policiesfor components A, B, and CGeneric policies for the components:e.g., generic policies for components A, B, and CExport policies for the components:e.g., export policies for components A, B, and C(note: component may export different policiesto different federations)Federated policies: integrate export policies of the components of the federationExternal policies: Policiesfor the various classes of usersLayer 1Layer 2Layer 3Layer 4Layer 5Federated Data and Policy ManagementExportData/PolicyComponentData/Policy for Agency AData/Policy for FederationExportData/PolicyComponentData/Policy for Agency CComponentData/Policy for Agency
View Full Document