Trustworthy Semantic WebsOutline of the CourseSlide 3Slide 4Course RulesCourse WorkSlide 7Papers to Read for Exam #1 (Mandatory)Papers to Read for Exam #1 (Optional)ContactProjectPaper: Original – you can use material from sources, reword (redraw) and give referencePapers for April 1Slide 14Papers for April 8Slide 16Papers for April 15Trustworthy Semantic WebsDr. Bhavani ThuraisinghamThe University of Texas at DallasIntroduction to the CourseOutline of the CourseTrustworthy Semantic Webs: Prof. Bhavani ThuraisinghamContentsIntroduction to the Course Part I: Supporting Technologies Trustworthy SystemsSecure Data and Information ManagementSecure Web and Information Retrieval SystemsPart II: Semantic WebsOverview of Semantic WebsComponents of the Semantic Web XML, RDF, Ontologies, RulesApplicationsConclusion to Part IIOutline of the CoursePart III: Secure Semantic WebOverview of Secure Semantic WebsComponents of Secure Semantic Web XML Security, Securing RDF Documents, Secure OntologiesSecure Web Rules, Inference Problem Multilevel Security and Malicious AttacksPart IV: Dependable Semantic WebsTrust ManagementPrivacy and Platform for Privacy PreferencesData Provenance and Integrity ManagementPart V: Secure Semantic ApplicationsSecure Semantic InteroperabilitySecure Web ServicesSecure Knowledge Management and E-BusinessConclusion to the CourseOutline of the CourseTextbook: A semantic web primerGrigoris Antoniou and Frank van Harmelen, MIT Press, 2007“Building Trustworthy Semantic Web”Bhavani Thuraisingham, CRC Press, 2007.Course RulesCourse attendance is mandatory; unless permission is obtained from instructor for missing a class with a valid reason (documentation needed for medical emergency for student or a close family member – e.g., spouse, parent, child). Attendance will be collected every lecture. 5 points will be deducted out of 100 for each lecture missed without approval. Each student will work individuallyLate assignments will not be accepted. All assignments have to be turned in just after the lecture on the due dateNo make up exams unless student can produce a medical certificate or give evidence of close family emergencyCopying material from other sources will not be permitted unless the source is properly referencedAny student who plagiarizes from other sources will be reported to the appropriate UTD authroitiesCourse Work2 Exams – Exam 1 and Exam 2: 20 points each2 surprise exams – 8 points eachProgramming Project: 12 points (demonstrate the system to the Professor and TA)Term Paper – 8 points – present the paper in class4 Homework assignments - 6 points eachCourse Work2 Exams – Exam 1 and Exam 2: 20 points each-March11, April 292 surprise exams – 8 points each-March 4, Second Quiz TBDProgramming Project: 12 points (demonstrate the system to the Professor and TA)-April 22 (may extend to after exam #2)Term Paper – 8 points – present the paper in class-April 154 Homework assignments - 6 points each-February 18/25, March 4, April 1, April 8Papers to Read for Exam #1 (Mandatory)Tyrone Cadenhead, Murat Kantarcioglu, Bhavani M. Thuraisingham: Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. DBSec 2010: 209-224 (will email paper)Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham: A semantic web based framework for social network access control. SACMAT 2009: 177-186UTDCS-01-10 Semantic Web Implementation Scheme for National Vulnerability Common Platform Enumeration Data) Vaibhav Khadilkar, Jyothsna Rachapalli, Bhavani Thuraisingham , January 2010Papers to Read for Exam #1 (Optional)RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996) UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) - first 20 pagesDCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 (IEEE)Security Constraint Processing in a Multilevel Secure Distributed Database Management System, IEEE Transactions on Knowledge and Data Engineering, April 1995 (co-author: W. Ford).ContactFor more information please contact-Dr. Bhavani Thuraisingham-Professor of Computer Science and-Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080-Phone: 972-883-4738-Fax: 972-883-2399-Email: [email protected]CD-ROM - your software and demonstration of your systemHard copy – design document-Project description-Architecture (prefer with a picture) and description (software – e.g., Oracle, Jena etc.)-Results-Analysis-Potential improvements-ReferencesPaper: Original – you can use material from sources, reword (redraw) and give referenceAbstractIntroductionBody of the paper-Comparing different approaches and analyzing-Discuss your approach,- SurveyConclusionsReferences -([1]. [2], - - -[THUR99].-Embed the reference also within the text. -E.g., Tim Berners Lee has defined the semantic web to be -- -- [2].Papers for April 1-http://www.mindswap.org/papers/Trust.pdf-Trust Networks on the Semantic Web. Jennifer Golbeck, James Hendler, Bijan Parsia, WWW 2003. - Describes a web-of-trust/reputation system based on FOAF profiles and explicite ratings and proposes the use of network analysis to make trust recommendations based on implicite ratings.-http://groups.csail.mit.edu/dig/Rein/rein-paper.pdf-Rein Policy Framework for the Semantic Web. Decentralized framework for representing and reasoning over distributed policies in the Semantic Web using Rei and CWM. Lalana Kagal and Tim Berners-Lee.Papers for April 1Rahul Singh, Al Farooq Salam: Semantic information assurance for secure distributed knowledge management: a business process perspective. IEEE Transactions on Systems, Man, and Cybernetics, Part A 36 (3): 472-486 (2006) A Semantic Web Approach to the Provenance ChallengeAuthors: Jennifer Golbeck,, James Hendler8400 Baltimore Ave., Suite 200 College Park, MD 20740 USAUsing Semantic Web Technologies for Policy Management on the Webhttp://dig.csail.mit.edu/2006/Papers/AAAI/Papers for April 8KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy
View Full Document