Abstract
Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ontologies in other domains that focus on annotation of functional aspects of resources. Types of security information that could be described include mechanisms, protocols, objectives, algorithms, and credentials in various levels of detail and specificity. The NRL Security Ontology is more comprehensive and better organized than existing security ontologies. It is capable of representing more types of security statements and can be applied to any electronic resource. The class hierarchy of the ontology makes it both easy to use and intuitive to extend. We applied this ontology to a Service Oriented Architecture to annotate security aspects of Web service descriptions and queries. A refined matching algorithm was developed to perform requirement-capability matchmaking that takes into account not only the ontology concepts, but also the properties of the concepts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IA Architecture and Technical Framework. Executive Summary of the End-to-End IA Component of the GIG Integrated Architecture, National Security Agency Information Assurance Directorate (2004)
Denker, G., Kagal, L., Finin, T., Paolucci, M., Sycara, K.: Security for DAML Web Services: Annotation and Matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 335–350. Springer, Heidelberg (2003)
Denker, G., Nguyen, S., Ton, A.: OWL-S Semantics of Security Web Services: a Case Study. In: 1st European Semantic Web Symposium: Heraklion, Greece (2004)
Kagal, L., Paolucci, M., Srinivasan, N., Denker, G., Finin, T., Sycara, K.: Authorization and Privacy for Semantic Web Services. In: AAAI Spring Symposium, Workshop on Semantic Web Services: Stanford, California (2004)
W3C (2001). DAML+OIL, Reference Description TR/daml+oil-reference (March 2001), http://www.w3.org/
W3C, OWL Web Ontology Language Overview (2004), http://www.w3.org/TR/owl-features/
IETF and W3C Working Group, XML Encryption Encryption/2001 (2001), http://www.w3c.org/
IETF and W3C Working Group, XML Signature (2003), http://www.w3c.org/Signature
OASIS SSTC, Security Assertion Markup Language (SAML) 2.0 Technical Overview, Working Draft (2005), http://www.oasis-open.org/committees/download.php/12938/sstc-saml-tech-overview-2.0-draft-06.pdf
Noy, N.F., McGuinness, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology, Stanford Knowledge Systems Laboratory, KSL-01-05 (2001)
Kim, A., Luo, J., Kang, M.: Security Ontology for Annotating Resources. pp. 51, Naval Research Lab, NRL Memorandum Report, NRL/MR/5540-05-641: Washington, D.C (2005)
W3C Recommendation. OWL Web Ontology Language Guide, vol. 2005, W3C (2004)
DAML Ontology Library, http://www.daml.org/ontologies/
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley and Sons, Inc., New York (1996)
Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, Norwood, MA, Artech House (2003)
Committee on National Security Systems, National Information Assurance (IA) Glossary. pp. 85, Ft. Meade, MD (2003), http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf
Martin, D., Burstein, M., Hobbs, J., Lassila, O., McDermott, D., McIlraith, S., Narayanan, S., Paolucci, M., Parsia, B., Payne, T., Sirin, E., Srinivasan, N., Sycara, K.: OWL-S: Semantic Markup for Web Services (2003), http://www.daml.org/services/owl-s/1.1/overview/
Jaeger, M., Tang, S.: Ranked Matching for Service Descriptions using DAML-S. In: Enterprise Modelling and Ontologies for Interoperability (EMOI), INTEROP 2004, Riga, Latvia (2004)
Srinivasan, N., Paolucci, M., Sycara, K.: Adding OWL-S to UDDI, Implementation and Throughput. In: First International Workshop on Semantic Web Services and Web Process Composition (SWSWPC 2004), San Diego, California (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, A., Luo, J., Kang, M. (2005). Security Ontology for Annotating Resources. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. OTM 2005. Lecture Notes in Computer Science, vol 3761. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11575801_34
Download citation
DOI: https://doi.org/10.1007/11575801_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29738-3
Online ISBN: 978-3-540-32120-0
eBook Packages: Computer ScienceComputer Science (R0)