DMCA
Security and Privacy on the Semantic Web
Cached
Download Links
Citations: | 4 - 1 self |
Citations
271 | Trust management for the semantic web
- Richardson, Agrawal, et al.
- 2003
(Show Context)
Citation Context ...ased security, privacy and trust on the Semantic Web and does not deal with approaches based on individual trust ratings and propagation through a web of trust providing means to rate unknown sources =-=[15, 16, 17]-=-. 2 Policy Based Interaction and Evaluation Policies allow for security and privacy descriptions in a machine understandable way. More specifically, service or information providers may use security p... |
241 | Automated trust negotiation
- Winsborough, Seamons, et al.
(Show Context)
Citation Context ... it implies that not all policies are known in advance but they may be disclosed at a later stage. Therefore, a negotiation protocol in which security and trust is iteratively established is required =-=[13]-=-. However, specifying policies is as difficult as writing imperative code, getting a policy right is as hard as getting a piece of software correct, and maintaining a large number of them is even hard... |
214 | Keromytis,“KeyNote: Trust management of public-key infrastructures,”
- Blaze, Feignhbaum, et al.
- 1998
(Show Context)
Citation Context ...s), and to estimate trust based on parties’ properties (trust management policies) [2]. Distributed access control has addressed some of these issues though not solved them yet. Examples like KeyNote =-=[3]-=- or PolicyMaker [4] provide a separation between enforcement and decision mechanisms by means of policies. However, policies are bound to public keys (identities) and are not expressive enough to deal... |
174 | Trust networks on the semantic web. In:
- Golbeck, Parsia, et al.
- 2003
(Show Context)
Citation Context ...ased security, privacy and trust on the Semantic Web and does not deal with approaches based on individual trust ratings and propagation through a web of trust providing means to rate unknown sources =-=[15, 16, 17]-=-. 2 Policy Based Interaction and Evaluation Policies allow for security and privacy descriptions in a machine understandable way. More specifically, service or information providers may use security p... |
143 | OWL Web Ontology Language Reference. - Dean, Schreiber, et al. - 2004 |
143 | RT: A Role-based Trust-management Framework. In: - Li, Mitchell - 2003 |
137 | KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement.
- Uszok, Bradshaw, et al.
- 2003
(Show Context)
Citation Context ...uage, and only describes purpose for the gathered data) and it does not allow for enforcement mechanisms. On the other hand, there is a wide offer of policy languages that have been developed to date =-=[5, 6, 7, 8, 9]-=-, addressing the general requirements for a Semantic Web policy language: expressiveness, simplicity, enforceability, scalability, and analyzability [10]. These policies can be exchanged between entit... |
119 | Regulating service access and information release on the web - Bonatti, Samarati - 2000 |
116 | Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, - Tonti, Bradshaw, et al. - 2003 |
109 |
A Policy Based Approach to Security for the Semantic Web.
- Kagal
- 2003
(Show Context)
Citation Context ...n mechanisms in which users must authenticate themselves (either by means of certificates or typing a user name and password). Semantic Web policies overcome such limitations of the Web. Kagal et al. =-=[6]-=- describe how the REI language can be applied in order to control access to web resources. Web pages are marked up with policies specifying which credentials are required to access such pages. A polic... |
106 |
Cassandra: Distributed access control policies with tunable expressiveness.
- Becker, Sewell
- 2004
(Show Context)
Citation Context ...uage, and only describes purpose for the gathered data) and it does not allow for enforcement mechanisms. On the other hand, there is a wide offer of policy languages that have been developed to date =-=[5, 6, 7, 8, 9]-=-, addressing the general requirements for a Semantic Web policy language: expressiveness, simplicity, enforceability, scalability, and analyzability [10]. These policies can be exchanged between entit... |
94 | Compliance checking in the PolicyMaker trust management system,” in
- Blaze, Feigenbaum, et al.
- 1998
(Show Context)
Citation Context ... trust based on parties’ properties (trust management policies) [2]. Distributed access control has addressed some of these issues though not solved them yet. Examples like KeyNote [3] or PolicyMaker =-=[4]-=- provide a separation between enforcement and decision mechanisms by means of policies. However, policies are bound to public keys (identities) and are not expressive enough to deal with Semantic Web ... |
94 | D.: Driving and monitoring provisional trust negotiation with metapolicies
- Bonatti, Olmedilla
(Show Context)
Citation Context ...uage, and only describes purpose for the gathered data) and it does not allow for enforcement mechanisms. On the other hand, there is a wide offer of policy languages that have been developed to date =-=[5, 6, 7, 8, 9]-=-, addressing the general requirements for a Semantic Web policy language: expressiveness, simplicity, enforceability, scalability, and analyzability [10]. These policies can be exchanged between entit... |
85 | No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: European Semantic Web Symposium
- Gavriloaie, Nejdl, et al.
- 2004
(Show Context)
Citation Context ...uage, and only describes purpose for the gathered data) and it does not allow for enforcement mechanisms. On the other hand, there is a wide offer of policy languages that have been developed to date =-=[5, 6, 7, 8, 9]-=-, addressing the general requirements for a Semantic Web policy language: expressiveness, simplicity, enforceability, scalability, and analyzability [10]. These policies can be exchanged between entit... |
83 | Authorization and Privacy for Semantic Web Services.
- Kagal, Paolucci, et al.
- 2004
(Show Context)
Citation Context ...ies from two different entities are compatible or not consists in gathering the relevant policies (and possibly relevant credentials) from the involved entities and checking whether they match (e.g., =-=[11]-=-). On the other hand, if policies may be private (typical situation for business rules [12]), it implies that not all policies are known in advance but they may be disclosed at a later stage. Therefor... |
68 | Hoof: Representation and reasoning for DAML-based policy and domain services - Bradshaw, Uszok, et al. - 2003 |
56 | Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks. EKAW
- Golbeck, Hendler
- 2004
(Show Context)
Citation Context ...ased security, privacy and trust on the Semantic Web and does not deal with approaches based on individual trust ratings and propagation through a web of trust providing means to rate unknown sources =-=[15, 16, 17]-=-. 2 Policy Based Interaction and Evaluation Policies allow for security and privacy descriptions in a machine understandable way. More specifically, service or information providers may use security p... |
45 | Security For DAML Web Services: Annotation and Matchmaking, - Denker, Kagal, et al. - 2003 |
40 | Semantic web policies - a discussion of requirements and research issues”, - Bonatti, Duma, et al. - 2006 |
39 | Agent-Oriented Enterprise Modeling Based on Business Rules.
- Taveter, Wagner
- 2001
(Show Context)
Citation Context ...licies (and possibly relevant credentials) from the involved entities and checking whether they match (e.g., [11]). On the other hand, if policies may be private (typical situation for business rules =-=[12]-=-), it implies that not all policies are known in advance but they may be disclosed at a later stage. Therefore, a negotiation protocol in which security and trust is iteratively established is require... |
35 | A policy-based approach to governing autonomous behavior in distributed environments - Kagal - 2004 |
34 | Editor), “The Pudding of Trust - Staab - 2004 |
28 | Trust negotiation for semantic web services - Olmedilla, Lara, et al. - 2004 |
24 | Kaos: A policy and domain services framework for grid computing and semantic web services - Uszok, Bradshaw, et al. - 2004 |
13 | Dynamically Distributed Query Evaluation - Trevor, Suciu - 2001 |
12 | A Distributed Tabling Algorithm for Rule Based Policy Systems. - Alves, Damásio, et al. - 2006 |
12 | Policy Based Dynamic Negotiation for Grid Services Authorization - Constandache, Olmedilla, et al. - 2005 |
11 |
Andrzej Uszok. Semantic web languages for policy representation and reasoning: A comparison of kaos, rei, and ponder
- Tonti, Bradshaw, et al.
- 2003
(Show Context)
Citation Context ...es that have been developed to date [5, 6, 7, 8, 9], addressing the general requirements for a Semantic Web policy language: expressiveness, simplicity, enforceability, scalability, and analyzability =-=[10]-=-. These policies can be exchanged between entities on the Semantic Web and therefore they are described using languages with well-founded semantics. The policy languages listed above differ in express... |
9 | Ontology-Based Policy Specification and Management
- Nejdl, Olmedilla, et al.
- 2005
(Show Context)
Citation Context ... maintaining a large number of them is even harder. Fortunately, ontologies and policy reasoning may help users and administrators on specification, conflict detection and resolution of such policies =-=[5, 14]-=-. This chapter first describes how policies are exchanged and how they interact among parties on the Semantic Web, with a brief description of the main Semantic Web policy languages and how ontologies... |
8 | T.: Enhancing Web Privacy Protection through Declarative Policies - Kolari, Ding, et al. - 2005 |
5 | Rule-based policy specification - Antoniou - 2007 |