Building trustworthy semantic webs:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
Auerbach Publications
2008
|
Schlagworte: | |
Online-Zugang: | Publisher description Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references (p. 343-344) and index |
Beschreibung: | XXX, 402 S. Ill. 25 cm |
ISBN: | 9780849350801 0849350808 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035134084 | ||
003 | DE-604 | ||
005 | 20081208 | ||
007 | t | ||
008 | 081031s2008 xxua||| |||| 00||| eng d | ||
010 | |a 2007027962 | ||
020 | |a 9780849350801 |c alk. paper |9 978-0-8493-5080-1 | ||
020 | |a 0849350808 |c alk. paper |9 0-8493-5080-8 | ||
035 | |a (OCoLC)154678182 | ||
035 | |a (DE-599)BVBBV035134084 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-355 | ||
050 | 0 | |a TK5105.88815 | |
082 | 0 | |a 025.04 | |
084 | |a ST 205 |0 (DE-625)143613: |2 rvk | ||
100 | 1 | |a Thuraisingham, Bhavani M. |d 1954- |e Verfasser |0 (DE-588)101927705X |4 aut | |
245 | 1 | 0 | |a Building trustworthy semantic webs |c Bhavani Thuraisingham |
264 | 1 | |a New York [u.a.] |b Auerbach Publications |c 2008 | |
300 | |a XXX, 402 S. |b Ill. |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 343-344) and index | ||
650 | 4 | |a Semantic Web | |
650 | 4 | |a Database security | |
650 | 0 | 7 | |a Semantic Web |0 (DE-588)4688372-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Qualitätssicherung |0 (DE-588)4126457-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Semantic Web |0 (DE-588)4688372-1 |D s |
689 | 0 | 1 | |a Qualitätssicherung |0 (DE-588)4126457-5 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0730/2007027962-d.html |3 Publisher description | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016801552&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016801552 |
Datensatz im Suchindex
_version_ | 1804138117366546432 |
---|---|
adam_text | Contents
Preface
..........................................................................................................xix
Acknowledgments
.....................................................................................xxvii
Ine
Authot.................................................................................................xxix
Chapter
1
Introduction
............................................................................
і
1.1
Trends
.................................................................................................1
1.2
Organization of This Chapter
.............................................................2
1.3
Research, Products, and Standards
.....................................................3
1.4
Trustworthy Information Systems
............................................,.........4
1.5
Secure Semantic Webs
........................................................................5
1.6
Dependable Semantic Webs
................................................................7
1.7
Applications
........................................................................................7
1.8
Specialized Trustworthy Semantic Webs
............................................8
1.9
Organization of This Book
.................................................................9
1.10
Next Steps
........................................................................................11
PART
1:
SUPPORTING TECHNOLOGIES FOR
TRUSTWORTHY SEMANTIC WEBS
15
Chapter
2
Trustworthy Systems
...........................................................17
2.1
Overview
..........................................................................................17
2.2
Secure Systems
..................................................................................17
2.2.1
Overview
...............................................................................17
2.2.2
Access Control and Other Security Concepts
........................18
2.2.3
Types of Secure Systems
........................................................19
2.2.4
Secure Operating Systems
.....................................................20
2.2.5
Secure Database Systems
.......................................................21
2.2.6
Secure Networb
...................................................................23
2.2.7
Emerging Trends
...................................................................23
2.2.8
Impact of the Web
.................................................................24
2.2.9
Steps to Building Secure Systems
..........................................25
vii
viii
■ Contents
2.3
Dependable Systems
.........................................................................26
2.3.1
Overview
...............................................................................26
2.3.2
Trust Management
................................................................27
2.3.3
Digital Rights Management
..................................................28
2.3.4
Privacy
..................................................................................29
2.3.5
Integrity, Data Quality, and High Assurance
........................29
2.4
Web Security
....................................................................................30
2.4.1
Overview
...............................................................................30
2.4.2
Threats to Web Security
........................................................31
2.4.2.1
Overview
...............................................................31
2.4.2.2
General Cyber-Threats
...........................................31
2.4.2.3
Threats to Web Databases
.....................................33
2.4.3
Web Security Solutions
.........................................................35
2.4.3.1
Overview
...............................................................35
2.4.3.2
Solutions for General Threats
................................36
2.4.3.3
Risk Analysis
.........................................................38
2 A3
A Biometrics, Forensics, and Other Solutions
...........38
2.4.3.5
Solutions for Threats to Web Databases
................39
2.5
Summary and Directions
..................................................................43
References
..................................................................................................43
Exercises
....................................................................................................45
Chapter
3
Secure Data, Information, and Knowledge
Management
.....................................................................................47
3.1
Overview
..........................................................................................47
3.2
Secure Data Management
.................................................................48
3.2.1
Overview
...............................................................................48
3.2.2
Database Management
..........................................................48
3.2.2.1
Data Model
...........................................................48
3.2.2.2
Functions
..............................................................49
3.2.2.3
Data Distribution
..................................................49
3.2.3
Heterogeneous Data Integration
............................................50
3.2.4
Data Warehousing and Data Mining
....................................51
3.2.5
Web Data Management
........................................................53
3.2.6
Security Impact
.....................................................................54
3.3
Secure Information Management
.....................................................55
3.3.1
Overview
...............................................................................55
3.3.2
Information Retrieval
............................................................56
3.3.2.1
Text Retrieval
........................................................56
3.3.2.2
Image Retrieval
.....................................................57
3.3.2.3
Video Retrieval
......................................................57
3.3.2.4
Audio Retrieval
.....................................................58
Contents ■ ix
3.3.3 Multimedia Information Management..................................58
3.3.4
Collaboration
and Data Management...................................59
3.3.5 Digital Libraries....................................................................61
3.3.5.1
Search Engines
......................................................61
3.3.5.2
Question-Answering
Systems................................63
3.3.6 E-business.............................................................................63
3.3.7
Security Impact....................................................................
64
3.4
Secure
Knowledge Management.......................................................65
3.4.1 Knowledge Management.......................................................65
3.4.2
Security Impact.....................................................................
67
3.5
Summary and Directions
..................................................................67
References
..................................................................................................68
Exercises
....................................................................................................70
Chapter
4
Semantic Web
.......................................................................71
4.1
Overview
..........................................................................................71
4.2
Layered Architecture
.........................................................................72
4.3
XML
.................................................................................................74
4.3.1
XML Statement and Elements
..............................................74
4.3.2
XML Attributes
....................................................................74
4.3.3
XML DTDs
..........................................................................75
4.3.4 XML Schemas.......................................................................75
4.3.5
XML Namespaces
.................................................................75
4.3.6
XML Federations and Distribution
.......................................75
4.3.7
XML-QL, XQuery, XPath, XSLT
.........................................76
4.4
RDF
.................................................................................................76
4.4.1
RDF Basics
..........................................................................77
4.4.2
RDF Container Model
.........................................................77
4.4.3
RDF Specification
.................................................................78
4.4.4
RDF
Schemas.......................................................................79
4.4.5
RDF Axiomatic Semantics
....................................................79
4.4.6
RDF Inferencing
...................................................................79
4.4.7
RDF Query
..........................................................................80
4.5
Ontologies
.......................................................................................80
4.6
Web Rules....
....................................................................................82
4.7
A Note on Agents
.............................................................................83
4.8
Applications
......................................................................................83
4.9
Motivating Scenario
.........................................................................86
4.10
Summary and Directions
..................................................................87
References
..................................................................................................88
Exercises
....................................................................................................88
Conclusion to Part 1
................................................................................89
Contents
Part II: Secure Semantic
Webs
.............................................................91
Chapter
5
Security and the Semantic Web
.......................................93
5.1
Overview
..........................................................................................93
5.2
Security for the Semantic Web
.........................................................94
5.2.1
Overview
...............................................................................94
5.2.2
XML Security
.......................................................................95
5.2.3
RDF Security
........................................................................96
5.2.4
Security and Ontologies
........................................................97
5.2.5
Secure Query and Rules Processing for the
Semantic Web
.......................................................................97
5.3
Privacy and Trust for the Semantic Web
...........................................98
5.3.1
Overview
...............................................................................98
5.3.2
Data Mining, National Security, Privacy, and the
Semantic Web
.......................................................................98
5.3.3
Solutions to the Privacy Problem
...........................................99
5.3.4
Trust for the Semantic Web
................................................100
5.4
Secure Semantic Web Applications
.................................................101
5.4.1
Secure Web Services
............................................................101
5.4.2
Secure Information Interoperability
....................................102
5.4.3
Secure Agents and Related Technologies
.............................102
5.4.4
Secure Grid and Secure Semantic Grid
...............................103
5.5
Specialized Semantic Webs
.............................................................104
5.6
Summary and Directions
................................................................104
References
................................................................................................105
Exercises
..................................................................................................106
Chapter
6
Security and XML
...............................................................107
6.1
Overview
........................................................................................107
6.2
Sample XML Document
................................................................108
6.2.1
XML Specification for the Graph in Figure
6.1...................108
6.2.2
XML DTD for the Above XML Specification
....................109
6.2.3
XML Schema for the Above XML Specification
.................110
6.3
Issues in XML Security
...................................................................112
6.3.1
XML Elements
....................................................................112
6.3.2
XML Attributes
..................................................................113
6.3.3
XML DTDs
........................................................................113
6.3.4 XML Schemas.....................................................................114
6.3.5
Namespaces
.........................................................................114
6A Policy Specification in XML
...........................................................115
6.4.1
Credentials
..........................................................................115
6.4.2
Policies
................................................................................116
6.5
Access Control for XML Documents
..............................................117
Contents ■ xi
6.6
Secure
Publication of XML Documents
.........................................118
6.7
Secure XML Databases
...................................................................119
6.8
Secure Distribution and Federation of XML Documents
...............120
6.8.1
Distribution
........................................................................120
6.8.2
Rule
.....................................................................................121
6.8.2.1
Site
1
Document
.................................................121
6.8.2.2
Site
2
Document
.................................................121
6.8.3
Federations
..........................................................................122
6.9
Standards
........................................................................................122
6.10
Summary and Directions
................................................................123
References
................................................................................................123
Exercises
..................................................................................................124
Chapter
7
Security and RDF
...............................................................125
7.1
Overview
........................................................................................125
7.2
Example of an RDF Document
......................................................126
7.2.1
RDF Document
..................................................................126
7.2.2
RDF Schema with Policy Specification
...............................126
7.3
Issues in RDF Security
...................................................................127
7.3.1
Basic Concepts
....................................................................127
7-3.1.1
Resources
............................................................127
7.3.1.2
Properties
............................................................128
7.3.1.3
Statements
...........................................................128
7.3.1.4
Reification
...........................................................129
7.3.1.5
Data Types
..........................................................129
7.3.2
Advanced Concepts
.............................................................129
7.3.2.1
RDF Schema
.......................................................129
7.4
Policy Specification in RDF
............................................................130
7.5
Access Control
................................................................................131
7.5
Secure RDF Databases
...................................................................133
7.5.I Requested Query
.................................................................133
7.6
Summary and Directions
................................................................134
References
................................................................................................134
Exercises
..................................................................................................135
Chapter
8
Security and Ontologies
...................................................137
8.1
Overview
........................................................................................137
8.2
Owl Example
..................................................................................138
8.3
Securing Ontologies
........................................................................140
8.4
Policy Specification in OWL
..........................................................141
8.5
Access Control
................................................................................141
8.6
Secure OWL Databases
..................................................................143
8.7
Ontology for Policy and Data Integration
.......................................143
xii ■ Contents
8.8
Summary and Directions
................................................................143
References
................................................................................................144
Exercises
..................................................................................................145
Chapter
9
Security and Rules
.............................................................147
9.1
Overview
........................................................................................147
9.2
Nonmonotonic-Typed Multilevel Logic for Secure Data and
Knowledge Management
................................................................148
9.3
Securing Rules
................................................................................148
9.4
Policy Specification Using Rules
.....................................................151
9.5
Inference Problem and Policy Reasoning
........................................152
9.6
Summary and Directions
................................................................154
References
................................................................................................154
Exercises
..................................................................................................155
Conclusion to Part II
.............................................................................157
Part III: Dependable Semantic Webs
...............................................159
Chapter
10
Trust Management and the Semantic Web
..............161
10.1
Overview
........................................................................................161
10.2
Trust Management
.........................................................................162
10.3
Semantic Web for Trust Management
............................................163
10.4
Trust Management for the Semantic Web
......................................165
10.5
Trust and Risk Management
..........................................................166
10.6
Digital Rights Management
...........................................................167
10.7
Reputation-Based Systems
..............................................................167
10.8
Summary and Directions
................................................................168
References
................................................................................................169
Exercises
..................................................................................................170
Chapter
11
Privacy and the Semantic Web
....................................171
11.1
Overview
........................................................................................171
11.2
Privacy Management
......................................................................172
11.3
Semantic Web Applications for Privacy Management
.....................174
11.4
Privacy for the Semantic Web
.........................................................174
11.5
Platform for Privacy Preferences
.....................................................175
11.6
Privacy Problem through Inference
.................................................176
11.7
Privacy-Preserving Semantic Web Mining
......................................178
11.8
Prototype Privacy Controller Implementation
................................178
11.9
Summary and Directions
................................................................179
References
................................................................................................180
Exercises
..................................................................................................181
Contents ■ xiii
Chapter
12
Integrity Management and the Semantic Web
.......183
12.1
Overview
........................................................................................183
12.2
Integrity, Data Quality, and Provenance
.........................................184
12.3
Semantic Web for Integrity Management
.......................................185
12.4
Integrity for the Semantic Web
.......................................................187
12.5
Inferencing, Data Quality, and Data Provenance
...........................188
12.6
Summary and Directions
................................................................190
References
................................................................................................190
Exercises
..................................................................................................191
Chapter
13
Multilevel Security
...........................................................193
13.1
Overview
........................................................................................193
13.2
Multilevel Secure Data Management Systems
................................194
13.3
Multilevel XML, RDF, OWL, and RuleML Documents
...............196
13.4
Reasoning and the Inference Problem
.............................................197
13.5
Summary and Directions
................................................................198
References
................................................................................................198
Exercises
..................................................................................................199
Chapter
14
Policy Engineering
...........................................................201
14.1
Overview
........................................................................................201
14.2
Revisiting Semantic Web Policies
...................................................202
14.2.1
Policies
................................................................................202
14.2.2
Policy Framework
................................................................203
14.2.3
Trust Management and Negotiation
...................................203
14.2.4
Cooperative Policy Enforcement
........................................204
14.2.5
Natural Language Policies
...................................................205
14.2.6
Next Steps
...........................................................................205
14.3
Policy Generation and Specification
...............................................205
14.4
Policy Consistency
.........................................................................206
14.5
Policy Evolution and Reuse
.............................................................207
14.6
Policy Integration and Interoperability
..........................................208
14.7
Policy Management, Visualization, and Mining
............................209
14.8
Summary and Directions
................................................................211
References
................................................................................................212
Exercise
....................................................................................................212
Chapter
15
Research, Standards, Products, and Applications
..213
15.1
Overview
........................................................................................213
15.2
Research
.........................................................................................214
15.3
Standards
........................................................................................215
15.4
Commercial Products
.....................................................................216
15.5
Applications
....................................................................................217
15.6
Summary and Directions
................................................................218
xiv ■ Contents
References
................................................................................................219
Exercise
....................................................................................................219
Conclusion to Part
Hl............................................................................221
Part IV: Applications of Trustworthy Semantic Webs
..................223
Chapter
16
Secure Semantic Web Services
....................................225
16.1
Overview
........................................................................................225
16.2
Web Services
..................................................................................226
16.3
Secure Web Services
.......................................................................227
16.4
XACML and SAML
......................................................................228
16.5
Shibboleth
......................................................................................229
16.6
Secure Web Services and the Semantic Web
...................................231
16.7
Summary and Directions
................................................................232
References
................................................................................................233
Exercises
..................................................................................................233
Chapter
17
Secure Semantic Data, Information, and
Knowledge Management
.............................................................235
17.1
Overview
........................................................................................235
17.2
Secure Data Management
...............................................................236
17.2.1
Discretionary Security
.........................................................236
17.2.2
Multilevel Security
..............................................................236
17.2.3
Multilevel Relational Data Model
.......................................237
17.2.4
Inference Problem
...............................................................238
17.2.5
Secure Distributed and Heterogeneous Data
Management
.......................................................................238
17.2.6
Secure Object Data Systems
................................................238
17-2.7
Data Warehousing, Data Mining, Security, and Privacy
.....239
17.2.8
Secure Web Data Management
...........................................241
17-2.9
Emerging Secure Data-Management Technologies
.............241
17.3
Secure Information Management
..................................................242
17.3.1
Secure Multimedia Information Management
...................242
17.3.1.1
Security Policy
.......................................................242
17.3.1.2
Secure Multimedia Data Representation
...............244
17.3.1.3
Security Impact on Multimedia Data and
Information-Management Functions
....................244
17.3.2
Secure Workflow and Collaboration
...................................245
17.4
Secure Knowledge Management
....................................................246
17.5
Applications of the Semantic Web
..................................................248
17-5-1
Secure Data Management
...................................................248
17.5.2
Secure Information Management
........................................249
17.5-3
Secure Knowledge Management
.........................................250
Contents ■ xv
17.6
Summary and Directions
................................................................251
References
................................................................................................251
Exercises
..................................................................................................252
Chapter
18
Secure Semantic Interoperability
................................253
18.1
Overview
........................................................................................253
18.2
Background
....................................................................................254
18.3
Schema and Policy Integration
........................................................255
18.4
Semantic Heterogeneity
..................................................................256
18.5
Inference Problem
...........................................................................257
18.6
Application of Semantic Web
.........................................................258
18.7
Summary and Directions
...............................................................260
References
................................................................................................261
Exercises
..................................................................................................261
Chapter
19
Secure Semantic E-Business
..........................................263
19.1
Overview
........................................................................................263
19.2
Secure E-Business
..........................................................................264
19.3
Applications of the Semantic Web
.................................................266
19.4
Summary and Directions
...............................................................268
References
...............................................................................................268
Exercises
..................................................................................................269
Chapter
20
Secure Semantic Digital Libraries
...............................271
20.1
Overview
........................................................................................271
20.2
Secure Digital Libraries
..................................................................272
20.2.1
Overview
.............................................................................272
20.2.2
Secure Information Retrieval
.............................................273
20.2.3
Secure Search Engines
........................................................274
20.2.4
Secure Question-Answering Systems
..................................275
20.3
Applications of the Semantic Web
..................................................276
20.4
Summary and Directions
................................................................278
References
................................................................................................278
Exercises
..................................................................................................279
Chapter
21
Assured Semantic Information Sharing
.....................281
21.1
Overview
........................................................................................281
21.2
Organization Data Sharing
.............................................................282
21.3
Service-Oriented Architectures for Assured Information Sharing...283
21.4
Data Integration and Analysis Technologies
...................................283
21.4.1
Data Integration
..................................................................283
21.4.2
Multimedia and Geospatial Data
........................................285
21.4.3
Data Mining
.......................................................................285
xvi ■ Contents
21.5
Security Policy Enforcement
..........................................................286
21.5.1
Security Policy Integration
..................................................287
21.6
Dependability Aspects
...................................................................288
21.7
Balancing Conflicting Requirements
..............................................289
21.8
The Role of the Semantic Web
........................................................290
21.9
Summary and Directions
................................................................290
References
................................................................................................291
Exercises
..................................................................................................292
Conclusion to Part IV
............................................................................293
Part V: Specialized Trustworthy Semantic Webs
..........................295
Chapter
22
Domain-Specific Semantic Webs and Security
.......297
22.1
Overview
........................................................................................297
22.2
Defense and Intelligence Domain
...................................................298
22.3
Homeland Security and Border Control
.........................................299
22.4
Healthcare and Life Sciences
..........................................................301
22.5
Financial Domain
...........................................................................302
22.6
Summary and Directions
................................................................303
References
...............................................................................................304
Exercises
.................................................................................................304
Chapter
23
Secure Geospatial Semantic Web
...............................305
23.1
Overview
........................................................................................305
23.2
Geospatial Semantic Web
..............................................................306
23.3
Secure Geospatial Data Management
............................................308
23.4
Secure Geospatial Semantic Web
....................................................310
23.5
Secure Interoperability with GRDF
................................................312
23.6
Geo-RSS
.........................................................................................314
23.7
Summary and Direction
.................................................................315
References
................................................................................................316
Exercises
..................................................................................................316
Chapter
24
Secure Semantic Sensor Web and Pervasive
Computing
.....................................................................................317
24.1
Overview
........................................................................................317
24.2
Security for Sensor Data Systems
....................................................318
24.3
Secure Wireless Data Management
.................................................322
24.4
Secure Mobile and RFID Data Management
.................................324
24.5
Secure Semantic Sensor Web
..........................................................324
24.6
Pervasive Computing and the Semantic Web
..................................325
24.7
Summary and Directions
................................................................327
References
................................................................................................327
Exercises
..................................................................................................328
Contents ■ xvii
Conclusion
to Part V
.............................................................................329
Chapter
25
Summary and Directions
...............................................331
25.1
About This Chapter
........................................................................331
25.2
Summary of This Book
...................................................................331
25.3
Revisiting the Scenario
...................................................................336
25.4
Directions for Trustworthy Semantic Webs
....................................338
25.5
Where Do We Go from Here?
........................................................341
Bibliography
................................................................................................343
Information Security
..............................................................................343
Data Management
..................................................................................343
Semantic Web
.........................................................................................344
Appendix A Data Management Systems: Developments
and Trends
.......................................................................................345
A.I Overview
........................................................................................345
A.2 Developments in Database Systems
...............................................346
A.3 Status, Vision, and Issues
................................................................350
A.4 Data Management Systems Framework
..........................................351
A.5 Building Information Systems from the Framework
.......................354
A.6 Relationship between the Texts
......................................................357
A.7 Summary and Directions
................................................................359
References
................................................................................................359
Appendix
В
Secure Data Management
............................................361
B.I Overview
........................................................................................361
B.2 Access Control Policies
...................................................................362
B.2.1 Overview
.............................................................................362
B.2.
2
Authorization Policies
..........................................................363
B.2.3 Role-Based Access Control
.................................................364
B.3 Other Policies
................................................................................366
B.3.1 Administration Policies
......................................................366
B.3.2 Identification and Authentication
........................................367
B.3.3 Auditing a Database System
...............................................368
B.3.4 Views for Security
..............................................................368
B.4 Policy Enforcement and Related Issues
..........................................368
B.4.1 SQL Extensions for Security
...............................................368
B.4.2 Query Modification
............................................................370
B.4.3 Discretionary Security and Database Functions
..................371
B.4.4 Visualization of Policies
.......................................................372
B.4.5 Prototypes and Products
......................................................373
B.5 Summary and Directions
................................................................374
References
................................................................................................375
xviii ■ Contents
Appendix
С
Developments
with Standards,
Products,
and Tools..........................................................................................377
C.I Overview
.........................................................................................377
C.2 Standards........................................................................................378
C.2.1 World Wide Web
Consortium
..............................................378
C.2.2
Organization for the Advancement of Structured
Information Standards
........................................................379
C.3 Products
..........................................................................................380
C.4 Tools
...............................................................................................381
C.5 Summary and Directions
.................................................................383
References
................................................................................................383
Index
....................................................................................................................385
|
adam_txt |
Contents
Preface
.xix
Acknowledgments
.xxvii
Ine
Authot.xxix
Chapter
1
Introduction
.
і
1.1
Trends
.1
1.2
Organization of This Chapter
.2
1.3
Research, Products, and Standards
.3
1.4
Trustworthy Information Systems
.,.4
1.5
Secure Semantic Webs
.5
1.6
Dependable Semantic Webs
.7
1.7
Applications
.7
1.8
Specialized Trustworthy Semantic Webs
.8
1.9
Organization of This Book
.9
1.10
Next Steps
.11
PART
1:
SUPPORTING TECHNOLOGIES FOR
TRUSTWORTHY SEMANTIC WEBS
15
Chapter
2
Trustworthy Systems
.17
2.1
Overview
.17
2.2
Secure Systems
.17
2.2.1
Overview
.17
2.2.2
Access Control and Other Security Concepts
.18
2.2.3
Types of Secure Systems
.19
2.2.4
Secure Operating Systems
.20
2.2.5
Secure Database Systems
.21
2.2.6
Secure Networb
.23
2.2.7
Emerging Trends
.23
2.2.8
Impact of the Web
.24
2.2.9
Steps to Building Secure Systems
.25
vii
viii
■ Contents
2.3
Dependable Systems
.26
2.3.1
Overview
.26
2.3.2
Trust Management
.27
2.3.3
Digital Rights Management
.28
2.3.4
Privacy
.29
2.3.5
Integrity, Data Quality, and High Assurance
.29
2.4
Web Security
.30
2.4.1
Overview
.30
2.4.2
Threats to Web Security
.31
2.4.2.1
Overview
.31
2.4.2.2
General Cyber-Threats
.31
2.4.2.3
Threats to Web Databases
.33
2.4.3
Web Security Solutions
.35
2.4.3.1
Overview
.35
2.4.3.2
Solutions for General Threats
.36
2.4.3.3
Risk Analysis
.38
2 A3
A Biometrics, Forensics, and Other Solutions
.38
2.4.3.5
Solutions for Threats to Web Databases
.39
2.5
Summary and Directions
.43
References
.43
Exercises
.45
Chapter
3
Secure Data, Information, and Knowledge
Management
.47
3.1
Overview
.47
3.2
Secure Data Management
.48
3.2.1
Overview
.48
3.2.2
Database Management
.48
3.2.2.1
Data Model
.48
3.2.2.2
Functions
.49
3.2.2.3
Data Distribution
.49
3.2.3
Heterogeneous Data Integration
.50
3.2.4
Data Warehousing and Data Mining
.51
3.2.5
Web Data Management
.53
3.2.6
Security Impact
.54
3.3
Secure Information Management
.55
3.3.1
Overview
.55
3.3.2
Information Retrieval
.56
3.3.2.1
Text Retrieval
.56
3.3.2.2
Image Retrieval
.57
3.3.2.3
Video Retrieval
.57
3.3.2.4
Audio Retrieval
.58
Contents ■ ix
3.3.3 Multimedia Information Management.58
3.3.4
Collaboration
and Data Management.59
3.3.5 Digital Libraries.61
3.3.5.1
Search Engines
.61
3.3.5.2
Question-Answering
Systems.63
3.3.6 E-business.63
3.3.7
Security Impact.
64
3.4
Secure
Knowledge Management.65
3.4.1 Knowledge Management.65
3.4.2
Security Impact.
67
3.5
Summary and Directions
.67
References
.68
Exercises
.70
Chapter
4
Semantic Web
.71
4.1
Overview
.71
4.2
Layered Architecture
.72
4.3
XML
.74
4.3.1
XML Statement and Elements
.74
4.3.2
XML Attributes
.74
4.3.3
XML DTDs
.75
4.3.4 XML Schemas.75
4.3.5
XML Namespaces
.75
4.3.6
XML Federations and Distribution
.75
4.3.7
XML-QL, XQuery, XPath, XSLT
.76
4.4
RDF
.76
4.4.1
RDF Basics
.77
4.4.2
RDF Container Model
.77
4.4.3
RDF Specification
.78
4.4.4
RDF
Schemas.79
4.4.5
RDF Axiomatic Semantics
.79
4.4.6
RDF Inferencing
.79
4.4.7
RDF Query
.80
4.5
Ontologies
.80
4.6
Web Rules.
.82
4.7
A Note on Agents
.83
4.8
Applications
.83
4.9
Motivating Scenario
.86
4.10
Summary and Directions
.87
References
.88
Exercises
.88
Conclusion to Part 1
.89
Contents
Part II: Secure Semantic
Webs
.91
Chapter
5
Security and the Semantic Web
.93
5.1
Overview
.93
5.2
Security for the Semantic Web
.94
5.2.1
Overview
.94
5.2.2
XML Security
.95
5.2.3
RDF Security
.96
5.2.4
Security and Ontologies
.97
5.2.5
Secure Query and Rules Processing for the
Semantic Web
.97
5.3
Privacy and Trust for the Semantic Web
.98
5.3.1
Overview
.98
5.3.2
Data Mining, National Security, Privacy, and the
Semantic Web
.98
5.3.3
Solutions to the Privacy Problem
.99
5.3.4
Trust for the Semantic Web
.100
5.4
Secure Semantic Web Applications
.101
5.4.1
Secure Web Services
.101
5.4.2
Secure Information Interoperability
.102
5.4.3
Secure Agents and Related Technologies
.102
5.4.4
Secure Grid and Secure Semantic Grid
.103
5.5
Specialized Semantic Webs
.104
5.6
Summary and Directions
.104
References
.105
Exercises
.106
Chapter
6
Security and XML
.107
6.1
Overview
.107
6.2
Sample XML Document
.108
6.2.1
XML Specification for the Graph in Figure
6.1.108
6.2.2
XML DTD for the Above XML Specification
.109
6.2.3
XML Schema for the Above XML Specification
.110
6.3
Issues in XML Security
.112
6.3.1
XML Elements
.112
6.3.2
XML Attributes
.113
6.3.3
XML DTDs
.113
6.3.4 XML Schemas.114
6.3.5
Namespaces
.114
6A Policy Specification in XML
.115
6.4.1
Credentials
.115
6.4.2
Policies
.116
6.5
Access Control for XML Documents
.117
Contents ■ xi
6.6
Secure
Publication of XML Documents
.118
6.7
Secure XML Databases
.119
6.8
Secure Distribution and Federation of XML Documents
.120
6.8.1
Distribution
.120
6.8.2
Rule
.121
6.8.2.1
Site
1
Document
.121
6.8.2.2
Site
2
Document
.121
6.8.3
Federations
.122
6.9
Standards
.122
6.10
Summary and Directions
.123
References
.123
Exercises
.124
Chapter
7
Security and RDF
.125
7.1
Overview
.125
7.2
Example of an RDF Document
.126
7.2.1
RDF Document
.126
7.2.2
RDF Schema with Policy Specification
.126
7.3
Issues in RDF Security
.127
7.3.1
Basic Concepts
.127
7-3.1.1
Resources
.127
7.3.1.2
Properties
.128
7.3.1.3
Statements
.128
7.3.1.4
Reification
.129
7.3.1.5
Data Types
.129
7.3.2
Advanced Concepts
.129
7.3.2.1
RDF Schema
.129
7.4
Policy Specification in RDF
.130
7.5
Access Control
.131
7.5
Secure RDF Databases
.133
7.5.I Requested Query
.133
7.6
Summary and Directions
.134
References
.134
Exercises
.135
Chapter
8
Security and Ontologies
.137
8.1
Overview
.137
8.2
Owl Example
.138
8.3
Securing Ontologies
.140
8.4
Policy Specification in OWL
.141
8.5
Access Control
.141
8.6
Secure OWL Databases
.143
8.7
Ontology for Policy and Data Integration
.143
xii ■ Contents
8.8
Summary and Directions
.143
References
.144
Exercises
.145
Chapter
9
Security and Rules
.147
9.1
Overview
.147
9.2
Nonmonotonic-Typed Multilevel Logic for Secure Data and
Knowledge Management
.148
9.3
Securing Rules
.148
9.4
Policy Specification Using Rules
.151
9.5
Inference Problem and Policy Reasoning
.152
9.6
Summary and Directions
.154
References
.154
Exercises
.155
Conclusion to Part II
.157
Part III: Dependable Semantic Webs
.159
Chapter
10
Trust Management and the Semantic Web
.161
10.1
Overview
.161
10.2
Trust Management
.162
10.3
Semantic Web for Trust Management
.163
10.4
Trust Management for the Semantic Web
.165
10.5
Trust and Risk Management
.166
10.6
Digital Rights Management
.167
10.7
Reputation-Based Systems
.167
10.8
Summary and Directions
.168
References
.169
Exercises
.170
Chapter
11
Privacy and the Semantic Web
.171
11.1
Overview
.171
11.2
Privacy Management
.172
11.3
Semantic Web Applications for Privacy Management
.174
11.4
Privacy for the Semantic Web
.174
11.5
Platform for Privacy Preferences
.175
11.6
Privacy Problem through Inference
.176
11.7
Privacy-Preserving Semantic Web Mining
.178
11.8
Prototype Privacy Controller Implementation
.178
11.9
Summary and Directions
.179
References
.180
Exercises
.181
Contents ■ xiii
Chapter
12
Integrity Management and the Semantic Web
.183
12.1
Overview
.183
12.2
Integrity, Data Quality, and Provenance
.184
12.3
Semantic Web for Integrity Management
.185
12.4
Integrity for the Semantic Web
.187
12.5
Inferencing, Data Quality, and Data Provenance
.188
12.6
Summary and Directions
.190
References
.190
Exercises
.191
Chapter
13
Multilevel Security
.193
13.1
Overview
.193
13.2
Multilevel Secure Data Management Systems
.194
13.3
Multilevel XML, RDF, OWL, and RuleML Documents
.196
13.4
Reasoning and the Inference Problem
.197
13.5
Summary and Directions
.198
References
.198
Exercises
.199
Chapter
14
Policy Engineering
.201
14.1
Overview
.201
14.2
Revisiting Semantic Web Policies
.202
14.2.1
Policies
.202
14.2.2
Policy Framework
.203
14.2.3
Trust Management and Negotiation
.203
14.2.4
Cooperative Policy Enforcement
.204
14.2.5
Natural Language Policies
.205
14.2.6
Next Steps
.205
14.3
Policy Generation and Specification
.205
14.4
Policy Consistency
.206
14.5
Policy Evolution and Reuse
.207
14.6
Policy Integration and Interoperability
.208
14.7
Policy Management, Visualization, and Mining
.209
14.8
Summary and Directions
.211
References
.212
Exercise
.212
Chapter
15
Research, Standards, Products, and Applications
.213
15.1
Overview
.213
15.2
Research
.214
15.3
Standards
.215
15.4
Commercial Products
.216
15.5
Applications
.217
15.6
Summary and Directions
.218
xiv ■ Contents
References
.219
Exercise
.219
Conclusion to Part
Hl.221
Part IV: Applications of Trustworthy Semantic Webs
.223
Chapter
16
Secure Semantic Web Services
.225
16.1
Overview
.225
16.2
Web Services
.226
16.3
Secure Web Services
.227
16.4
XACML and SAML
.228
16.5
Shibboleth
.229
16.6
Secure Web Services and the Semantic Web
.231
16.7
Summary and Directions
.232
References
.233
Exercises
.233
Chapter
17
Secure Semantic Data, Information, and
Knowledge Management
.235
17.1
Overview
.235
17.2
Secure Data Management
.236
17.2.1
Discretionary Security
.236
17.2.2
Multilevel Security
.236
17.2.3
Multilevel Relational Data Model
.237
17.2.4
Inference Problem
.238
17.2.5
Secure Distributed and Heterogeneous Data
Management
.238
17.2.6
Secure Object Data Systems
.238
17-2.7
Data Warehousing, Data Mining, Security, and Privacy
.239
17.2.8
Secure Web Data Management
.241
17-2.9
Emerging Secure Data-Management Technologies
.241
17.3
Secure Information Management
.242
17.3.1
Secure Multimedia Information Management
.242
17.3.1.1
Security Policy
.242
17.3.1.2
Secure Multimedia Data Representation
.244
17.3.1.3
Security Impact on Multimedia Data and
Information-Management Functions
.244
17.3.2
Secure Workflow and Collaboration
.245
17.4
Secure Knowledge Management
.246
17.5
Applications of the Semantic Web
.248
17-5-1
Secure Data Management
.248
17.5.2
Secure Information Management
.249
17.5-3
Secure Knowledge Management
.250
Contents ■ xv
17.6
Summary and Directions
.251
References
.251
Exercises
.252
Chapter
18
Secure Semantic Interoperability
.253
18.1
Overview
.253
18.2
Background
.254
18.3
Schema and Policy Integration
.255
18.4
Semantic Heterogeneity
.256
18.5
Inference Problem
.257
18.6
Application of Semantic Web
.258
18.7
Summary and Directions
.260
References
.261
Exercises
.261
Chapter
19
Secure Semantic E-Business
.263
19.1
Overview
.263
19.2
Secure E-Business
.264
19.3
Applications of the Semantic Web
.266
19.4
Summary and Directions
.268
References
.268
Exercises
.269
Chapter
20
Secure Semantic Digital Libraries
.271
20.1
Overview
.271
20.2
Secure Digital Libraries
.272
20.2.1
Overview
.272
20.2.2
Secure Information Retrieval
.273
20.2.3
Secure Search Engines
.274
20.2.4
Secure Question-Answering Systems
.275
20.3
Applications of the Semantic Web
.276
20.4
Summary and Directions
.278
References
.278
Exercises
.279
Chapter
21
Assured Semantic Information Sharing
.281
21.1
Overview
.281
21.2
Organization Data Sharing
.282
21.3
Service-Oriented Architectures for Assured Information Sharing.283
21.4
Data Integration and Analysis Technologies
.283
21.4.1
Data Integration
.283
21.4.2
Multimedia and Geospatial Data
.285
21.4.3
Data Mining
.285
xvi ■ Contents
21.5
Security Policy Enforcement
.286
21.5.1
Security Policy Integration
.287
21.6
Dependability Aspects
.288
21.7
Balancing Conflicting Requirements
.289
21.8
The Role of the Semantic Web
.290
21.9
Summary and Directions
.290
References
.291
Exercises
.292
Conclusion to Part IV
.293
Part V: Specialized Trustworthy Semantic Webs
.295
Chapter
22
Domain-Specific Semantic Webs and Security
.297
22.1
Overview
.297
22.2
Defense and Intelligence Domain
.298
22.3
Homeland Security and Border Control
.299
22.4
Healthcare and Life Sciences
.301
22.5
Financial Domain
.302
22.6
Summary and Directions
.303
References
.304
Exercises
.304
Chapter
23
Secure Geospatial Semantic Web
.305
23.1
Overview
.305
23.2
Geospatial Semantic Web
.306
23.3
Secure Geospatial Data Management
.308
23.4
Secure Geospatial Semantic Web
.310
23.5
Secure Interoperability with GRDF
.312
23.6
Geo-RSS
.314
23.7
Summary and Direction
.315
References
.316
Exercises
.316
Chapter
24
Secure Semantic Sensor Web and Pervasive
Computing
.317
24.1
Overview
.317
24.2
Security for Sensor Data Systems
.318
24.3
Secure Wireless Data Management
.322
24.4
Secure Mobile and RFID Data Management
.324
24.5
Secure Semantic Sensor Web
.324
24.6
Pervasive Computing and the Semantic Web
.325
24.7
Summary and Directions
.327
References
.327
Exercises
.328
Contents ■ xvii
Conclusion
to Part V
.329
Chapter
25
Summary and Directions
.331
25.1
About This Chapter
.331
25.2
Summary of This Book
.331
25.3
Revisiting the Scenario
.336
25.4
Directions for Trustworthy Semantic Webs
.338
25.5
Where Do We Go from Here?
.341
Bibliography
.343
Information Security
.343
Data Management
.343
Semantic Web
.344
Appendix A Data Management Systems: Developments
and Trends
.345
A.I Overview
.345
A.2 Developments in Database Systems
.346
A.3 Status, Vision, and Issues
.350
A.4 Data Management Systems Framework
.351
A.5 Building Information Systems from the Framework
.354
A.6 Relationship between the Texts
.357
A.7 Summary and Directions
.359
References
.359
Appendix
В
Secure Data Management
.361
B.I Overview
.361
B.2 Access Control Policies
.362
B.2.1 Overview
.362
B.2.
2
Authorization Policies
.363
B.2.3 Role-Based Access Control
.364
B.3 Other Policies
.366
B.3.1 Administration Policies
.366
B.3.2 Identification and Authentication
.367
B.3.3 Auditing a Database System
.368
B.3.4 Views for Security
.368
B.4 Policy Enforcement and Related Issues
.368
B.4.1 SQL Extensions for Security
.368
B.4.2 Query Modification
.370
B.4.3 Discretionary Security and Database Functions
.371
B.4.4 Visualization of Policies
.372
B.4.5 Prototypes and Products
.373
B.5 Summary and Directions
.374
References
.375
xviii ■ Contents
Appendix
С
Developments
with Standards,
Products,
and Tools.377
C.I Overview
.377
C.2 Standards.378
C.2.1 World Wide Web
Consortium
.378
C.2.2
Organization for the Advancement of Structured
Information Standards
.379
C.3 Products
.380
C.4 Tools
.381
C.5 Summary and Directions
.383
References
.383
Index
.385 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Thuraisingham, Bhavani M. 1954- |
author_GND | (DE-588)101927705X |
author_facet | Thuraisingham, Bhavani M. 1954- |
author_role | aut |
author_sort | Thuraisingham, Bhavani M. 1954- |
author_variant | b m t bm bmt |
building | Verbundindex |
bvnumber | BV035134084 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.88815 |
callnumber-search | TK5105.88815 |
callnumber-sort | TK 45105.88815 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 205 |
ctrlnum | (OCoLC)154678182 (DE-599)BVBBV035134084 |
dewey-full | 025.04 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 025 - Operations of libraries and archives |
dewey-raw | 025.04 |
dewey-search | 025.04 |
dewey-sort | 225.04 |
dewey-tens | 020 - Library and information sciences |
discipline | Allgemeines Informatik |
discipline_str_mv | Allgemeines Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01744nam a2200445zc 4500</leader><controlfield tag="001">BV035134084</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20081208 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">081031s2008 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007027962</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780849350801</subfield><subfield code="c">alk. paper</subfield><subfield code="9">978-0-8493-5080-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0849350808</subfield><subfield code="c">alk. paper</subfield><subfield code="9">0-8493-5080-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)154678182</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035134084</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.88815</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">025.04</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 205</subfield><subfield code="0">(DE-625)143613:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thuraisingham, Bhavani M.</subfield><subfield code="d">1954-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)101927705X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building trustworthy semantic webs</subfield><subfield code="c">Bhavani Thuraisingham</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">Auerbach Publications</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXX, 402 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 343-344) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Semantic Web</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Semantic Web</subfield><subfield code="0">(DE-588)4688372-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Qualitätssicherung</subfield><subfield code="0">(DE-588)4126457-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Semantic Web</subfield><subfield code="0">(DE-588)4688372-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Qualitätssicherung</subfield><subfield code="0">(DE-588)4126457-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0730/2007027962-d.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016801552&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016801552</subfield></datafield></record></collection> |
id | DE-604.BV035134084 |
illustrated | Illustrated |
index_date | 2024-07-02T22:25:26Z |
indexdate | 2024-07-09T21:23:05Z |
institution | BVB |
isbn | 9780849350801 0849350808 |
language | English |
lccn | 2007027962 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016801552 |
oclc_num | 154678182 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XXX, 402 S. Ill. 25 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Auerbach Publications |
record_format | marc |
spelling | Thuraisingham, Bhavani M. 1954- Verfasser (DE-588)101927705X aut Building trustworthy semantic webs Bhavani Thuraisingham New York [u.a.] Auerbach Publications 2008 XXX, 402 S. Ill. 25 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references (p. 343-344) and index Semantic Web Database security Semantic Web (DE-588)4688372-1 gnd rswk-swf Qualitätssicherung (DE-588)4126457-5 gnd rswk-swf Semantic Web (DE-588)4688372-1 s Qualitätssicherung (DE-588)4126457-5 s DE-604 http://www.loc.gov/catdir/enhancements/fy0730/2007027962-d.html Publisher description Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016801552&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Thuraisingham, Bhavani M. 1954- Building trustworthy semantic webs Semantic Web Database security Semantic Web (DE-588)4688372-1 gnd Qualitätssicherung (DE-588)4126457-5 gnd |
subject_GND | (DE-588)4688372-1 (DE-588)4126457-5 |
title | Building trustworthy semantic webs |
title_auth | Building trustworthy semantic webs |
title_exact_search | Building trustworthy semantic webs |
title_exact_search_txtP | Building trustworthy semantic webs |
title_full | Building trustworthy semantic webs Bhavani Thuraisingham |
title_fullStr | Building trustworthy semantic webs Bhavani Thuraisingham |
title_full_unstemmed | Building trustworthy semantic webs Bhavani Thuraisingham |
title_short | Building trustworthy semantic webs |
title_sort | building trustworthy semantic webs |
topic | Semantic Web Database security Semantic Web (DE-588)4688372-1 gnd Qualitätssicherung (DE-588)4126457-5 gnd |
topic_facet | Semantic Web Database security Qualitätssicherung |
url | http://www.loc.gov/catdir/enhancements/fy0730/2007027962-d.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016801552&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT thuraisinghambhavanim buildingtrustworthysemanticwebs |