Skip to main content

Verifying Authenticity in Interactive Behaviors of SemanticWeb Services

  • Conference paper
  • 542 Accesses

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 86))

Abstract

There is an increasing need for usable tools to support knowledge elicitation, formalization and management. As an answer to this need, this paper describes fully integrated semantic web framework experiences, where users can represent and manage their data in a visual way, without the need of semantic web experts as intermediaries. These frameworks typically incorporate an ontology editor, a resource editor, reasoning capabilities and intuitive interaction and visualization facilities. The use of effective visualization techniques to graphically represent ontologies is investigated and the EasyOnto prototype is presented. In addition, different semantic web frameworks have been implemented as a result of research projects in different domains. In particular this paper presents the IRCS framework, an intelligent software to semantically index, search, and navigate the documentation used in water management plants, and the AWI environment, a collaborative environment aiming to collect and share knowledge of user communities, within the context of a digital factory.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baader, F.: Description logics. In: Tessaris, S., Franconi, E., Eiter, T., Gutierrez, C., Handschuh, S., Rousset, M.-C., Schmidt, R.A. (eds.) Reasoning Web. LNCS, vol. 5689, pp. 1–39. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  2. Baader, F., Lutz, C., Milicic, M., Sattler, U., Wolter, F.: A description logic based approach to reasoning about web services. In: The WWW 2005 Workshop on Web Service Semantics (WSS 2005), Chiba City, Japan (2005)

    Google Scholar 

  3. Baader, F., Lutz, C., Milicic, M., Sattler, U., Wolter, F.: Integrating description logics and action formalisms: First results. In: 20th National Conference on Artificial Intelligence and the 17th Innovative Applications of Artificial Intelligence Conference, AAAI 2005/IAAI 2005, July 9-13, vol. 2, pp. 572–577. AAAI, Menlo Park (2005)

    Google Scholar 

  4. Bhargavan, K., Fournet, C., Gordon, A.D.: A semantics for web services authentication. In: POPL 2004: 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Microsoft Res., Cambridge, UK, January 14-16, vol. 39, pp. 198–209. ACM, USA (2004)

    Chapter  Google Scholar 

  5. Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: TulaFale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol. 3188, pp. 197–222. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Blanchet, B., et al.: An efficient cryptographic protocol verifier based on Prolog rules. In: 14th IEEE Computer Security Foundations Workshop (CSFW-14), vol. 96. Citeseer (2001)

    Google Scholar 

  7. Carminati, B., Ferrari, E., Bishop, R., Hung, P.C.K.: Security conscious web service composition. In: 4th IEEE International Conference on Web Services (ICWS), pp. 489–496. IEEE Computer Society, Los Alamitos (2006)

    Chapter  Google Scholar 

  8. Corin, R., Saptawijaya, A.: A logic for constraint-based security protocol analysis. In: 2006 IEEE Symposium on Security and Privacy, Twente Univ., Netherlands, May 21-24, p. 14. IEEE Comput. Soc., Los Alamitos (2006)

    Google Scholar 

  9. Kagal, L., Finin, T., Joshi, A.: A policy based approach to security for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402–418. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Kleiner, E., Roscoe, A.W.: On the relationship between web services security and traditional protocols. In: Mathematical Foundations of Programming Semantics (MFPS XXI) (2005)

    Google Scholar 

  11. Levesque, H., Reiter, R., Lesperance, Y., Lin, F., Scherl, R.: Golog: a logic programming language for dynamic domains. Journal of Logic Programming 31(1-3), 59–83 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  12. Reiter, R.: Knowledge in Action. MIT Press, Cambridge (2001)

    MATH  Google Scholar 

  13. Woo, T.Y.C., Lam, S.S.: A semantic model for authentication protocols. In: IEEE Symposium on Research in Security and Privacy, Dept. of Comput. Sci., Texas Univ., Austin, TX, USA, May 24-26, pp. 178–194. IEEE Comput. Soc. Press, Los Alamitos (1993)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ye, X., Liao, L. (2011). Verifying Authenticity in Interactive Behaviors of SemanticWeb Services. In: Mugellini, E., Szczepaniak, P.S., Pettenati, M.C., Sokhn, M. (eds) Advances in Intelligent Web Mastering – 3. Advances in Intelligent and Soft Computing, vol 86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18029-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18029-3_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-18028-6

  • Online ISBN: 978-3-642-18029-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics