DOC PREVIEW
UTD CS 7301 - CS 7301 Introduction

This preview shows page 1-2-3-4-5-6 out of 17 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Trustworthy Semantic WebsOutline of the CourseSlide 3Slide 4Course RulesCourse WorkSlide 7Papers to Read for Exam #1 (Mandatory)Papers to Read for Exam #1 (Optional)ContactProjectPaper: Original – you can use material from sources, reword (redraw) and give referencePapers for April 1Slide 14Papers for April 8Slide 16Papers for April 15Trustworthy Semantic WebsDr. Bhavani ThuraisinghamThe University of Texas at DallasIntroduction to the CourseOutline of the CourseTrustworthy Semantic Webs: Prof. Bhavani ThuraisinghamContentsIntroduction to the Course Part I: Supporting Technologies Trustworthy SystemsSecure Data and Information ManagementSecure Web and Information Retrieval SystemsPart II: Semantic WebsOverview of Semantic WebsComponents of the Semantic Web XML, RDF, Ontologies, RulesApplicationsConclusion to Part IIOutline of the CoursePart III: Secure Semantic WebOverview of Secure Semantic WebsComponents of Secure Semantic Web XML Security, Securing RDF Documents, Secure OntologiesSecure Web Rules, Inference Problem Multilevel Security and Malicious AttacksPart IV: Dependable Semantic WebsTrust ManagementPrivacy and Platform for Privacy PreferencesData Provenance and Integrity ManagementPart V: Secure Semantic ApplicationsSecure Semantic InteroperabilitySecure Web ServicesSecure Knowledge Management and E-BusinessConclusion to the CourseOutline of the CourseTextbook: A semantic web primerGrigoris Antoniou and Frank van Harmelen, MIT Press, 2007“Building Trustworthy Semantic Web”Bhavani Thuraisingham, CRC Press, 2007.Course RulesCourse attendance is mandatory; unless permission is obtained from instructor for missing a class with a valid reason (documentation needed for medical emergency for student or a close family member – e.g., spouse, parent, child). Attendance will be collected every lecture. 5 points will be deducted out of 100 for each lecture missed without approval. Each student will work individuallyLate assignments will not be accepted. All assignments have to be turned in just after the lecture on the due dateNo make up exams unless student can produce a medical certificate or give evidence of close family emergencyCopying material from other sources will not be permitted unless the source is properly referencedAny student who plagiarizes from other sources will be reported to the appropriate UTD authroitiesCourse Work2 Exams – Exam 1 and Exam 2: 20 points each2 surprise exams – 8 points eachProgramming Project: 12 points (demonstrate the system to the Professor and TA)Term Paper – 8 points – present the paper in class4 Homework assignments - 6 points eachCourse Work2 Exams – Exam 1 and Exam 2: 20 points each-March11, April 292 surprise exams – 8 points each-March 4, Second Quiz TBDProgramming Project: 12 points (demonstrate the system to the Professor and TA)-April 22 (may extend to after exam #2)Term Paper – 8 points – present the paper in class-April 154 Homework assignments - 6 points each-February 18/25, March 4, April 1, April 8Papers to Read for Exam #1 (Mandatory)Tyrone Cadenhead, Murat Kantarcioglu, Bhavani M. Thuraisingham: Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. DBSec 2010: 209-224 (will email paper)Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham: A semantic web based framework for social network access control. SACMAT 2009: 177-186UTDCS-01-10 Semantic Web Implementation Scheme for National Vulnerability Common Platform Enumeration Data) Vaibhav Khadilkar, Jyothsna Rachapalli, Bhavani Thuraisingham , January 2010Papers to Read for Exam #1 (Optional)RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996) UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) - first 20 pagesDCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 (IEEE)Security Constraint Processing in a Multilevel Secure Distributed Database Management System, IEEE Transactions on Knowledge and Data Engineering, April 1995 (co-author: W. Ford).ContactFor more information please contact-Dr. Bhavani Thuraisingham-Professor of Computer Science and-Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080-Phone: 972-883-4738-Fax: 972-883-2399-Email: [email protected]CD-ROM - your software and demonstration of your systemHard copy – design document-Project description-Architecture (prefer with a picture) and description (software – e.g., Oracle, Jena etc.)-Results-Analysis-Potential improvements-ReferencesPaper: Original – you can use material from sources, reword (redraw) and give referenceAbstractIntroductionBody of the paper-Comparing different approaches and analyzing-Discuss your approach,- SurveyConclusionsReferences -([1]. [2], - - -[THUR99].-Embed the reference also within the text. -E.g., Tim Berners Lee has defined the semantic web to be -- -- [2].Papers for April 1-http://www.mindswap.org/papers/Trust.pdf-Trust Networks on the Semantic Web. Jennifer Golbeck, James Hendler, Bijan Parsia, WWW 2003. - Describes a web-of-trust/reputation system based on FOAF profiles and explicite ratings and proposes the use of network analysis to make trust recommendations based on implicite ratings.-http://groups.csail.mit.edu/dig/Rein/rein-paper.pdf-Rein Policy Framework for the Semantic Web. Decentralized framework for representing and reasoning over distributed policies in the Semantic Web using Rei and CWM. Lalana Kagal and Tim Berners-Lee.Papers for April 1Rahul Singh, Al Farooq Salam: Semantic information assurance for secure distributed knowledge management: a business process perspective. IEEE Transactions on Systems, Man, and Cybernetics, Part A 36 (3): 472-486 (2006) A Semantic Web Approach to the Provenance ChallengeAuthors: Jennifer Golbeck,, James Hendler8400 Baltimore Ave., Suite 200 College Park, MD 20740 USAUsing Semantic Web Technologies for Policy Management on the Webhttp://dig.csail.mit.edu/2006/Papers/AAAI/Papers for April 8KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy


View Full Document

UTD CS 7301 - CS 7301 Introduction

Documents in this Course
Load more
Download CS 7301 Introduction
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 7301 Introduction and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 7301 Introduction 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?