170 likes | 179 Views
Trustworthy Semantic Webs. Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course. Outline of the Course. Trustworthy Semantic Webs: Prof. Bhavani Thuraisingham Contents Introduction to the Course Part I: Supporting Technologies Trustworthy Systems
E N D
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course
Outline of the Course Trustworthy Semantic Webs: Prof. Bhavani Thuraisingham Contents Introduction to the Course Part I: Supporting Technologies Trustworthy Systems Secure Data and Information Management Secure Web and Information Retrieval Systems Part II: Semantic Webs Overview of Semantic Webs Components of the Semantic Web XML, RDF, Ontologies, Rules Applications Conclusion to Part II
Outline of the Course Part III: Secure Semantic Web Overview of Secure Semantic Webs Components of Secure Semantic Web XML Security, Securing RDF Documents, Secure Ontologies Secure Web Rules, Inference Problem Multilevel Security and Malicious Attacks Part IV: Dependable Semantic Webs Trust Management Privacy and Platform for Privacy Preferences Data Provenance and Integrity Management Part V: Secure Semantic Applications Secure Semantic Interoperability Secure Web Services Secure Knowledge Management and E-Business Conclusion to the Course
Outline of the Course Textbook: A semantic web primer Grigoris Antoniou and Frank van Harmelen, MIT Press, 2007 “Building Trustworthy Semantic Web” Bhavani Thuraisingham, CRC Press, 2007.
Course Rules • Course attendance is mandatory; unless permission is obtained from instructor for missing a class with a valid reason (documentation needed for medical emergency for student or a close family member – e.g., spouse, parent, child). Attendance will be collected every lecture. 5 points will be deducted out of 100 for each lecture missed without approval. • Each student will work individually • Late assignments will not be accepted. All assignments have to be turned in just after the lecture on the due date • No make up exams unless student can produce a medical certificate or give evidence of close family emergency • Copying material from other sources will not be permitted unless the source is properly referenced • Any student who plagiarizes from other sources will be reported to the appropriate UTD authroities
Course Work • 2 Exams – Exam 1 and Exam 2: 20 points each • 2 surprise exams – 8 points each • Programming Project: 12 points (demonstrate the system to the Professor and TA) • Term Paper – 8 points – present the paper in class • 4 Homework assignments - 6 points each
Course Work • 2 Exams – Exam 1 and Exam 2: 20 points each • March11, April 29 • 2 surprise exams – 8 points each • March 4, Second Quiz TBD • Programming Project: 12 points (demonstrate the system to the Professor and TA) • April 22 (may extend to after exam #2) • Term Paper – 8 points – present the paper in class • April 15 • 4 Homework assignments - 6 points each • February 18/25, March 4, April 1, April 8
Papers to Read for Exam #1 (Mandatory) • Tyrone Cadenhead, Murat Kantarcioglu, Bhavani M. Thuraisingham: Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. DBSec 2010: 209-224 (will email paper) • Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham: A semantic web based framework for social network access control. SACMAT 2009: 177-186 • UTDCS-01-10 Semantic Web Implementation Scheme for National Vulnerability Common Platform Enumeration Data) Vaibhav Khadilkar, Jyothsna Rachapalli, Bhavani Thuraisingham , January 2010
Papers to Read for Exam #1 (Optional) • RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996) • UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) - first 20 pages • DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 (IEEE) • Security Constraint Processing in a Multilevel Secure Distributed Database Management System, IEEE Transactions on Knowledge and Data Engineering, April 1995 (co-author: W. Ford).
Contact • For more information please contact • Dr. Bhavani Thuraisingham • Professor of Computer Science and • Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080 • Phone: 972-883-4738 • Fax: 972-883-2399 • Email: bhavani.thuraisingham@utdallas.edu
Project • CD-ROM - your software and demonstration of your system • Hard copy – design document • Project description • Architecture (prefer with a picture) and description (software – e.g., Oracle, Jena etc.) • Results • Analysis • Potential improvements • References
Paper: Original – you can use material from sources, reword (redraw) and give reference • Abstract • Introduction • Body of the paper • Comparing different approaches and analyzing • Discuss your approach, • Survey • Conclusions • References • ([1]. [2], - - -[THUR99]. • Embed the reference also within the text. • E.g., Tim Berners Lee has defined the semantic web to be -- -- [2].
Papers for April 1 • http://www.mindswap.org/papers/Trust.pdf • Trust Networks on the Semantic Web. Jennifer Golbeck, James Hendler, Bijan Parsia, WWW 2003. - Describes a web-of-trust/reputation system based on FOAF profiles and explicite ratings and proposes the use of network analysis to make trust recommendations based on implicite ratings. • http://groups.csail.mit.edu/dig/Rein/rein-paper.pdf • Rein Policy Framework for the Semantic Web. Decentralized framework for representing and reasoning over distributed policies in the Semantic Web using Rei and CWM. Lalana Kagal and Tim Berners-Lee.
Papers for April 1 Rahul Singh, Al Farooq Salam: Semantic information assurance for secure distributed knowledge management: a business process perspective. IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(3): 472-486 (2006) A Semantic Web Approach to the Provenance Challenge Authors: Jennifer Golbeck,, James Hendler 8400 Baltimore Ave., Suite 200 College Park, MD 20740 USA Using Semantic Web Technologies for Policy Management on the Webhttp://dig.csail.mit.edu/2006/Papers/AAAI/
Papers for April 8 • KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement • http://www4.wiwiss.fu-berlin.de/bizer/SWTSGuide/KAoS/KAoS_Policy_03.pdf On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework ¤ Li Ding , Pranam Kolari , Tim Finin , Anupam Joshi, Yun Peng, Yelena Yesha University of Maryland Baltimore County, Framework for Security and Trust Standards http://www.ninebynine.org/SWAD-E/Security-formats.html
Papers for April 8 SudhirAgarwal, Barbara Sprick, "Access Control for Semantic Web Services," icws, pp.770, IEEE International Conference on Web Services (ICWS'04), 2004 Thomas Trojer, Benjamin C. M. Fung, Patrick C. K. Hung: Service-Oriented Architecture for Privacy-Preserving Data Mashup. ICWS 2009
Papers for April 15 Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: Policy-Driven Service Composition with Information Flow Control. ICWS 2010: 50-57 Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: The SCIFC Model for Information Flow Control in Web Service Composition. ICWS 2009: 1-8 Wei She, I-Ling Yen, Bhavani M. Thuraisingham: Enhancing Security Modeling for Web Services Using Delegation and Pass-On. ICWS 2008: 545-552 Timothy W. Finin, Anupam Joshi, Lalana Kagal, JianweiNiu, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham: ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82