www.dbebooks.com - Free Books & magazines Building TrusTworThy semanTic weBs AU5080.indb 1 11/8/07 10:35:43 AM OTHER AUERBACH PUBLICATIONS Ad Hoc Mobile Wireless Networks: Operational Excellence: Using Lean Six Sigma Principles, Protocols and Applications to Translate Customer Value Subir Kumar Sarkar, T.G. Basavaraju and through Global Supply Chain C. Puttamadappa James William Martin ISBN 1-4200-6221-2 ISBN 1-4200-6250-6 Computer Fraud: An In-depth Framework Physical Principles of Wireless for Detecting and Defending against Communications Insider IT Attacks Victor L. Granatstein Kenneth C. Brancik ISBN 0-8493-3259-1 ISBN 1-4200-4659-4 Practical Guide to Project Planning Design Science Research Methods and Ricardo Viana Vargas Patterns: Innovating Information and ISBN 1-4200-4504-0 Communication Technology Vijay K. Vaishnavi and William Kuechler Jr. Principles of Mobile Computing and ISBN 1-4200-5932-7 Communications Mazliza Othman Determining Project Requirements ISBN 1-4200-6158-5 Hans Jonasson ISBN 1-4200-4502-4 Programming Languages for Business Problem Solving Price Digital Privacy: Theory, Technologies, and Practices Shouhong Wang and Hai Wang Alessandro Acquisti, Stefanos Gritzalis, Costos ISBN 1-4200-6264-6 Lambrinoudakis and Sabrina di Vimercati ISBN 1-4200-521-79 Retail Supply Chain Management James B. Ayers and Mary Ann Odegaard Effective Communications for Project ISBN 0-8493-9052-4 Management Ralph L. Kliem Security in Wireless Mesh Networks ISBN 1-4200-6246-8 Yan Zhang, Jun Zheng and Honglin Hu ISBN 0-8493-8250-5 Effective Transition from Design to Production David F. Ciambrone Service-Oriented Architecture: SOA ISBN 1-4200-4686-1 Strategy, Methodology, and Technology James P. Lawler and H. Howell-Barber Elements of Compiler Design ISBN 1-4200-4500-8 Alexander Meduna ISBN 1-4200-6323-5 The Strategic Project Leader: Mastering Service-Based Project Leadership How to Achieve 27001 Certification: An Jack Ferraro Example of Applied Compliance Management ISBN 0-8493-8794-9 Sigurjon Thor Arnason and Keith D. Willett ISBN 0-8493-3648-1 Simplified TRIZ: New Problem Solving Applications for Engineers and Manufacturing Inter- and Intra-Vehicle Communications Professionals, Second Edition Gilbert Held Kalevi Rantanen and Ellen Domb ISBN 1-4200-5221-7 ISBN 1-4200-6273-5 Manage Software Testing Value-Added Services for Next Generation Peter Farrell-Vinay Networks ISBN 0-8493-9383-3 Thierry Van de Velde ISBN 0-8493-7318-2 Managing Global Development Risk James M. Hussey and Steven E. Hall WiMAX: A Wireless Technology Revolution ISBN 1-4200-5520-8 G.S.V. Radha Krishna Rao and G. Radhamani Mobile WiMAX: Toward Broadband Wireless ISBN 0-8493-7059-0 Metropolitan Area Networks Yan Zhang and Hsiao-Hwa Chen ISBN 0-8493-2624-9 AU5080.indb 2 11/8/07 10:35:44 AM Building TrusTworThy semanTic weBs Bhavani Thuraisingham New York London AU5080.indb 3 11/8/07 10:35:44 AM Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487‑2742 © 2008 by Taylor & Francis Group, LLC Auerbach is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid‑free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number‑13: 978‑0‑8493‑5080‑1 (Hardcover) This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the conse‑ quences of their use. No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www. copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923, 978‑750‑8400. CCC is a not‑for‑profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging‑in‑Publication Data Thuraisingham, Bhavani M. Building trustworthy semantic webs / Bhavani Thuraisingham. p. cm. Includes bibliographical references and index. ISBN‑13: 978‑0‑8493‑5080‑1 (alk. paper) ISBN‑10: 0‑8493‑5080‑8 (alk. paper) 1. Semantic Web. 2. Database security. I. Title. TK5105.88815T59 2008 025.04‑‑dc22 2007027962 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the Auerbach Web site at http://www.auerbach‑publications.com AU5080.indb 4 11/8/07 10:35:44 AM T&F_LOC_A_Master.indd 1 7/12/07 8:00:55 AM Dedication In Memory of My Parents Nitchingam 3 October 1913 – 30 October 1971 and Gnanam 25 September 1919 – 28 October 1984 Although your time with me was short, you gave me the strength to be brave and take on challenges. AU5080.indb 5 11/8/07 10:35:45 AM AU5080.indb 6 11/8/07 10:35:45 AM Contents Preface...........................................................................................................xix Acknowledgments......................................................................................xxvii The.Author..................................................................................................xxix Chapter 1 Introduction.............................................................................1 1.1 Trends.................................................................................................1 1.2 Organization of This Chapter .............................................................2 1.3 Research, Products, and Standards .....................................................3 1.4 Trustworthy Information Systems ......................................................4 1.5 Secure Semantic Webs ........................................................................5 1.6 Dependable Semantic Webs ................................................................7 1.7 Applications ........................................................................................7 1.8 Specialized Trustworthy Semantic Webs ............................................8 1.9 Organization of This Book .................................................................9 1.10 Next Steps ........................................................................................11 Part I: SuPPortIng teChnologIeS for truStworthy SemantIC webS . 15 Chapter 2 trustworthy Systems............................................................17 2.1 Overview ..........................................................................................17 2.2 Secure Systems ..................................................................................17 2.2.1 Overview ...............................................................................17 2.2.2 Access Control and Other Security Concepts ........................18 2.2.3 Types of Secure Systems ........................................................19 2.2.4 Secure Operating Systems .....................................................20 2.2.5 Secure Database Systems .......................................................21 2.2.6 Secure Networks ...................................................................23 2.2.7 Emerging Trends ...................................................................23 2.2.8 Impact of the Web .................................................................24 2.2.9 Steps to Building Secure Systems ..........................................25 ii AU5080.indb 7 11/8/07 10:35:45 AM iii n Contents 2.3 Dependable Systems .........................................................................26 2.3.1 Overview ...............................................................................26 2.3.2 Trust Management ................................................................27 2.3.3 Digital Rights Management ..................................................28 2.3.4 Privacy ..................................................................................29 2.3.5 Integrity, Data Quality, and High Assurance ........................29 2.4 Web Security ....................................................................................30 2.4.1 Overview ...............................................................................30 2.4.2 Threats to Web Security ........................................................31 2.4.2.1 Overview ...............................................................31 2.4.2.2 General Cyber-Threats ...........................................31 2.4.2.3 Threats to Web Databases .....................................33 2.4.3 Web Security Solutions .........................................................35 2.4.3.1 Overview ...............................................................35 2.4.3.2 Solutions for General Threats ................................36 2.4.3.3 Risk Analysis .........................................................38 2.4.3.4 Biometrics, Forensics, and Other Solutions ...........38 2.4.3.5 Solutions for Threats to Web Databases ................39 2.5 Summary and Directions ..................................................................43 References ..................................................................................................43 Exercises ....................................................................................................45 Chapter 3 Secure Data, Information, and Knowledge management......................................................................................47 3.1 Overview ..........................................................................................47 3.2 Secure Data Management .................................................................48 3.2.1 Overview ...............................................................................48 3.2.2 Database Management ..........................................................48 3.2.2.1 Data Model ...........................................................48 3.2.2.2 Functions ..............................................................49 3.2.2.3 Data Distribution ..................................................49 3.2.3 Heterogeneous Data Integration............................................50 3.2.4 Data Warehousing and Data Mining ....................................51 3.2.5 Web Data Management ........................................................53 3.2.6 Security Impact .....................................................................54 3.3 Secure Information Management .....................................................55 3.3.1 Overview ...............................................................................55 3.3.2 Information Retrieval ............................................................56 3.3.2.1 Text Retrieval ........................................................56 3.3.2.2 Image Retrieval .....................................................57 3.3.2.3 Video Retrieval ......................................................57 3.3.2.4 Audio Retrieval .....................................................58 AU5080.indb 8 11/8/07 10:35:46 AM Contents n ix 3.3.3 Multimedia Information Management ..................................58 3.3.4 Collaboration and Data Management ...................................59 3.3.5 Digital Libraries ....................................................................61 3.3.5.1 Search Engines ......................................................61 3.3.5.2 Question-Answering Systems ................................63 3.3.6 E-business .............................................................................63 3.3.7 Security Impact ....................................................................64 3.4 Secure Knowledge Management .......................................................65 3.4.1 Knowledge Management .......................................................65 3.4.2 Security Impact .....................................................................67 3.5 Summary and Directions ..................................................................67 References ..................................................................................................68 Exercises ....................................................................................................70 Chapter 4 Semantic web........................................................................71 4.1 Overview ..........................................................................................71 4.2 Layered Architecture .........................................................................72 4.3 XML .................................................................................................74 4.3.1 XML Statement and Elements ..............................................74 4.3.2 XML Attributes ....................................................................74 4.3.3 XML DTDs ..........................................................................75 4.3.4 XML Schemas .......................................................................75 4.3.5 XML Namespaces .................................................................75 4.3.6 XML Federations and Distribution .......................................75 4.3.7 XML-QL, XQuery, XPath, XSLT .........................................76 4.4 RDF .................................................................................................76 4.4.1 RDF Basics ..........................................................................77 4.4.2 RDF Container Model .........................................................77 4.4.3 RDF Specification .................................................................78 4.4.4 RDF Schemas .......................................................................79 4.4.5 RDF Axiomatic Semantics ....................................................79 4.4.6 RDF Inferencing ...................................................................79 4.4.7 RDF Query ..........................................................................80 4.5 Ontologies .......................................................................................80 4.6 Web Rules ........................................................................................82 4.7 A Note on Agents .............................................................................83 4.8 Applications ......................................................................................83 4.9 Motivating Scenario .........................................................................86 4.10 Summary and Directions ..................................................................87 References ..................................................................................................88 Exercises ....................................................................................................88 Conclusion to Part I.................................................................................89 AU5080.indb 9 11/8/07 10:35:46 AM
Description: