Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3761))

Abstract

Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ontologies in other domains that focus on annotation of functional aspects of resources. Types of security information that could be described include mechanisms, protocols, objectives, algorithms, and credentials in various levels of detail and specificity. The NRL Security Ontology is more comprehensive and better organized than existing security ontologies. It is capable of representing more types of security statements and can be applied to any electronic resource. The class hierarchy of the ontology makes it both easy to use and intuitive to extend. We applied this ontology to a Service Oriented Architecture to annotate security aspects of Web service descriptions and queries. A refined matching algorithm was developed to perform requirement-capability matchmaking that takes into account not only the ontology concepts, but also the properties of the concepts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IA Architecture and Technical Framework. Executive Summary of the End-to-End IA Component of the GIG Integrated Architecture, National Security Agency Information Assurance Directorate (2004)

    Google Scholar 

  2. Denker, G., Kagal, L., Finin, T., Paolucci, M., Sycara, K.: Security for DAML Web Services: Annotation and Matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 335–350. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Denker, G., Nguyen, S., Ton, A.: OWL-S Semantics of Security Web Services: a Case Study. In: 1st European Semantic Web Symposium: Heraklion, Greece (2004)

    Google Scholar 

  4. Kagal, L., Paolucci, M., Srinivasan, N., Denker, G., Finin, T., Sycara, K.: Authorization and Privacy for Semantic Web Services. In: AAAI Spring Symposium, Workshop on Semantic Web Services: Stanford, California (2004)

    Google Scholar 

  5. W3C (2001). DAML+OIL, Reference Description TR/daml+oil-reference (March 2001), http://www.w3.org/

  6. W3C, OWL Web Ontology Language Overview (2004), http://www.w3.org/TR/owl-features/

  7. IETF and W3C Working Group, XML Encryption Encryption/2001 (2001), http://www.w3c.org/

  8. IETF and W3C Working Group, XML Signature (2003), http://www.w3c.org/Signature

  9. OASIS SSTC, Security Assertion Markup Language (SAML) 2.0 Technical Overview, Working Draft (2005), http://www.oasis-open.org/committees/download.php/12938/sstc-saml-tech-overview-2.0-draft-06.pdf

  10. Noy, N.F., McGuinness, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology, Stanford Knowledge Systems Laboratory, KSL-01-05 (2001)

    Google Scholar 

  11. Kim, A., Luo, J., Kang, M.: Security Ontology for Annotating Resources. pp. 51, Naval Research Lab, NRL Memorandum Report, NRL/MR/5540-05-641: Washington, D.C (2005)

    Google Scholar 

  12. W3C Recommendation. OWL Web Ontology Language Guide, vol. 2005, W3C (2004)

    Google Scholar 

  13. DAML Ontology Library, http://www.daml.org/ontologies/

  14. Schneier, B.: Applied Cryptography, 2nd edn. John Wiley and Sons, Inc., New York (1996)

    Google Scholar 

  15. Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, Norwood, MA, Artech House (2003)

    Google Scholar 

  16. Committee on National Security Systems, National Information Assurance (IA) Glossary. pp. 85, Ft. Meade, MD (2003), http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf

  17. Martin, D., Burstein, M., Hobbs, J., Lassila, O., McDermott, D., McIlraith, S., Narayanan, S., Paolucci, M., Parsia, B., Payne, T., Sirin, E., Srinivasan, N., Sycara, K.: OWL-S: Semantic Markup for Web Services (2003), http://www.daml.org/services/owl-s/1.1/overview/

  18. Jaeger, M., Tang, S.: Ranked Matching for Service Descriptions using DAML-S. In: Enterprise Modelling and Ontologies for Interoperability (EMOI), INTEROP 2004, Riga, Latvia (2004)

    Google Scholar 

  19. Srinivasan, N., Paolucci, M., Sycara, K.: Adding OWL-S to UDDI, Implementation and Throughput. In: First International Workshop on Semantic Web Services and Web Process Composition (SWSWPC 2004), San Diego, California (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, A., Luo, J., Kang, M. (2005). Security Ontology for Annotating Resources. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. OTM 2005. Lecture Notes in Computer Science, vol 3761. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11575801_34

Download citation

  • DOI: https://doi.org/10.1007/11575801_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29738-3

  • Online ISBN: 978-3-540-32120-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics