Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.

Similar presentations


Presentation on theme: "Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course."— Presentation transcript:

1 Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course

2 Outline of the Course Trustworthy Semantic Webs: Prof. Bhavani Thuraisingham Contents Introduction to the Course Part I: Supporting Technologies Trustworthy Systems Secure Data and Information Management Secure Web and Information Retrieval Systems Part II: Semantic Webs Overview of Semantic Webs Components of the Semantic Web XML, RDF, Ontologies, Rules Applications Conclusion to Part II

3 Outline of the Course Part III: Secure Semantic Web Overview of Secure Semantic Webs Components of Secure Semantic Web XML Security, Securing RDF Documents, Secure Ontologies Secure Web Rules, Inference Problem Multilevel Security and Malicious Attacks Part IV: Dependable Semantic Webs Trust Management Privacy and Platform for Privacy Preferences Data Provenance and Integrity Management Part V: Secure Semantic Applications Secure Semantic Interoperability Secure Web Services Secure Knowledge Management and E-Business Conclusion to the Course

4 Outline of the Course Textbook: A semantic web primer Grigoris Antoniou and Frank van Harmelen, MIT Press, 2007 “Building Trustworthy Semantic Web” Bhavani Thuraisingham, CRC Press, 2007.

5 Course Rules l Course attendance is mandatory; unless permission is obtained from instructor for missing a class with a valid reason (documentation needed for medical emergency for student or a close family member – e.g., spouse, parent, child). Attendance will be collected every lecture. 5 points will be deducted out of 100 for each lecture missed without approval. l Each student will work individually l Late assignments will not be accepted. All assignments have to be turned in just after the lecture on the due date l No make up exams unless student can produce a medical certificate or give evidence of close family emergency l Copying material from other sources will not be permitted unless the source is properly referenced l Any student who plagiarizes from other sources will be reported to the appropriate UTD authroities

6 Course Work l 2 Exams – Exam 1 and Exam 2: 20 points each l 2 surprise exams – 8 points each l Programming Project: 12 points (demonstrate the system to the Professor and TA) l Term Paper – 8 points – present the paper in class l 4 Homework assignments - 6 points each

7 Course Work l 2 Exams – Exam 1 and Exam 2: 20 points each - March11, April 29 l 2 surprise exams – 8 points each - March 4, Second Quiz TBD l Programming Project: 12 points (demonstrate the system to the Professor and TA) - April 22 (may extend to after exam #2) l Term Paper – 8 points – present the paper in class - April 15 l 4 Homework assignments - 6 points each - February 18/25, March 4, April 1, April 8

8 Papers to Read for Exam #1 (Mandatory) l Tyrone Cadenhead, Murat Kantarcioglu, Bhavani M. Thuraisingham: Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. DBSec 2010: 209-224 (will email paper) Tyrone CadenheadMurat KantarciogluDBSec 2010 l Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham: A semantic web based framework for social network access control. SACMAT 2009: 177-186 Barbara CarminatiElena FerrariRaymond HeatherlyMurat KantarciogluSACMAT 2009 l UTDCS-01-10 Semantic Web Implementation Scheme for National Vulnerability Common Platform Enumeration Data) Vaibhav Khadilkar, Jyothsna Rachapalli, Bhavani Thuraisingham, January 2010Semantic Web Implementation Scheme for National Vulnerability Common Platform Enumeration Data)

9 Papers to Read for Exam #1 (Optional) l RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996)Edward J. CoyneHal L. FeinsteinCharles E. YoumanIEEE Computer 29 l UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) - first 20 pagesRavi S. SandhuACM Trans. Inf. Syst. Secur. 7 l DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi- dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 (IEEE)Ravi S. SandhuPOLICY 2004 l Security Constraint Processing in a Multilevel Secure Distributed Database Management System, IEEE Transactions on Knowledge and Data Engineering, April 1995 (co-author: W. Ford).

10 Contact l For more information please contact - Dr. Bhavani Thuraisingham - Professor of Computer Science and - Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080 - Phone: 972-883-4738 - Fax: 972-883-2399 - Email: bhavani.thuraisingham@utdallas.edu

11 Project l CD-ROM - your software and demonstration of your system l Hard copy – design document - Project description - Architecture (prefer with a picture) and description (software – e.g., Oracle, Jena etc.) - Results - Analysis - Potential improvements - References

12 Paper: Original – you can use material from sources, reword (redraw) and give reference l Abstract l Introduction l Body of the paper - Comparing different approaches and analyzing - Discuss your approach, - Survey l Conclusions l References - ([1]. [2], - - -[THUR99]. - Embed the reference also within the text. - E.g., Tim Berners Lee has defined the semantic web to be -- -- [2].

13 Papers for April 1 - http://www.mindswap.org/papers/Trust.pdf http://www.mindswap.org/papers/Trust.pdf - Trust Networks on the Semantic Web. Jennifer Golbeck, James Hendler, Bijan Parsia, WWW 2003. - Describes a web-of- trust/reputation system based on FOAF profiles and explicite ratings and proposes the use of network analysis to make trust recommendations based on implicite ratings. Trust Networks on the Semantic Web - http://groups.csail.mit.edu/dig/Rein/rein-paper.pdf http://groups.csail.mit.edu/dig/Rein/rein-paper.pdf - Rein Policy Framework for the Semantic Web. Decentralized framework for representing and reasoning over distributed policies in the Semantic Web using Rei and CWM. Lalana Kagal and Tim Berners-Lee. Rein Policy Framework for the Semantic Web

14 Papers for April 1 Rahul Singh, Al Farooq Salam: Semantic information assurance for secure distributed knowledge management: a business process perspective. IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(3): 472-486 (2006)Al Farooq SalamIEEE Transactions on Systems, Man, and Cybernetics, Part A 36 A Semantic Web Approach to the Provenance Challenge Authors: Jennifer Golbeck,, James Hendler 8400 Baltimore Ave., Suite 200 College Park, MD 20740 USA Using Semantic Web Technologies for Policy Management on the Web http://dig.csail.mit.edu/2006/Papers/AAAI/ http://dig.csail.mit.edu/2006/Papers/AAAI/

15 Papers for April 8 l KAoS Policy and Domain Services: Toward a Description- Logic Approach to Policy Representation, Deconfliction, and Enforcement l http://www4.wiwiss.fu- berlin.de/bizer/SWTSGuide/KAoS/KAoS_Policy_03.pdf http://www4.wiwiss.fu- berlin.de/bizer/SWTSGuide/KAoS/KAoS_Policy_03.pdf On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework ¤ Li Ding, Pranam Kolari, Tim Finin, Anupam Joshi, Yun Peng, Yelena Yesha University of Maryland Baltimore County, Framework for Security and Trust Standards http://www.ninebynine.org/SWAD-E/Security-formats.html

16 Papers for April 8 Sudhir Agarwal, Barbara Sprick, "Access Control for Semantic Web Services," icws, pp.770, IEEE International Conference on Web Services (ICWS'04), 2004 Thomas TrojerThomas Trojer, Benjamin C. M. Fung, Patrick C. K. Hung: Service-Oriented Architecture for Privacy-Preserving Data Mashup. ICWS 2009Benjamin C. M. FungPatrick C. K. Hung

17 Papers for April 15 Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: Policy-Driven Service Composition with Information Flow Control. ICWS 2010: 50-57I-Ling YenBhavani M. ThuraisinghamElisa BertinoICWS 2010 Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: The SCIFC Model for Information Flow Control in Web Service Composition. ICWS 2009: 1-8I-Ling YenBhavani M. ThuraisinghamElisa BertinoICWS 2009 Wei She, I-Ling Yen, Bhavani M. Thuraisingham: Enhancing Security Modeling for Web Services Using Delegation and Pass-On. ICWS 2008: 545-552I-Ling YenBhavani M. ThuraisinghamICWS 2008 Timothy W. FininTimothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham: ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82Anupam JoshiJianwei NiuRavi S. Sandhu William H. WinsboroughBhavani M. ThuraisinghamSACMAT 2008


Download ppt "Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course."

Similar presentations


Ads by Google