Skip to main content

Security Intelligence: Web Contents Security System for Semantic Web

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4252))

  • 2898 Accesses

Abstract

WWW (World Wide Web) has incurred the problem that users are not necessarily provided with the information they want to receive, at a time when the amount of information is explosively increasing. Therefore, Tim Berners-Lee proposed the Semantic Web as the new web paradigm to solve this problem. But there is always a security problem in Semantic Web such as WWW and the study about this is insufficient. Therefore, the authors of this paper propose that the Security Intelligence system should be used to present semantic information using ontology and prevents that users flow out the information. This system is an ACM(Access Control Matrix) based access control model basically, and It is a system that prevent information leakage by user’s deliberation and by user’s mistake. It can be also used for WWW.

This work was supported by the Soongsil University Research Fund.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.w3.org/2001/sw/

  2. Berners-Lee, T.: Semantic Web, W3C, (2000), http://www.w3.org/2000/Talks/1206-xml2k-tbl/

  3. Berners-Lee, T., Hendler, J., Lassila, O.: Scientific American article: The Semantic Web. Scientific American issue, May 17 (2001)

    Google Scholar 

  4. Dzbor, M., Domingue, J., Motta, E.: Magpie: Towards a Semantic Web Browser. In: Proc. of the 2nd Intl. Semantic Web Conf (ISWC), Florida, USA (2003)

    Google Scholar 

  5. Domingue, J., Dzbor, M., Motta, E.: Magpie: Supporting Browsing and Navigation on the Semantic Web. In: Proc. of Intl. Conf. on Intelligent User Interfaces (IUI), Portugal (2004)

    Google Scholar 

  6. Quan, D., Karger, D.R.: How to Make a Semantic Web Browser. In: Proceedings International WWW Conference, New York, USA (2004)

    Google Scholar 

  7. http://news.com.com/2100-1032_3-5605922.html

  8. Freier, A., Karlton, P., Kocher, P.: The SSL Protocol Version 3.0 (March, 1996), http://www.netscape.com/eng/ssl3/3-spec.ps

  9. Dierks, T., et al.: The TLS Protocol 1.0, RFC2246 (January 1999)

    Google Scholar 

  10. Weeks, J., et al.: CCI-Based WebSecurity: A Design Using PGP. WWW Journal (1995)

    Google Scholar 

  11. Rescorla, B., et al.: The Secure HyperText Transfer Protocol, RFC 2660 (August 1999)

    Google Scholar 

  12. Cho, N.D., Park, H.G.: Design and Implementation of ACM-based Web Security Access Control System for Intranet Security. Korea Information Processing Society Journal 12(5), 643–648 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cho, Nd., Lee, Es., Park, Hg. (2006). Security Intelligence: Web Contents Security System for Semantic Web. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893004_104

Download citation

  • DOI: https://doi.org/10.1007/11893004_104

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46537-9

  • Online ISBN: 978-3-540-46539-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics