Security and Privacy for Web Databases and Services

  • Elena Ferrari
  • Bhavani Thuraisingham
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2992)

Abstract

A semantic web can be thought of as a web that is highly intelligent and sophisticated and one needs little or no human intervention to carry out tasks such as scheduling appointments, coordinating activities, searching for complex documents as well as integrating disparate databases and information systems. While much progress has been made toward developing such an intelligent web, there is still a lot to be done. For example, there is little work on security and privacy for the semantic web. However, before we examine security for the semantic web we need to ensure that its key components, such as web databases and services, are secure. This paper will mainly focus on security and privacy issues for web databases and services. Finally, some directions toward developing a secure semantic web will be provided.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Agrawal, R., Srikant, R.: Privacy-preserving Data Mining. In: Proceedings of the ACM SIGMOD Conference (2000), Dallas, TX, USA (2000)Google Scholar
  2. 2.
    Berners Lee, T., et al.: The Semantic Web. Scientific American (2001)Google Scholar
  3. 3.
    Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B., Gupta, A.: Selective and Authentic Third-party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering (to appear)Google Scholar
  4. 4.
    Bertino, E., Carminati, B., Ferrari, E.: A Flexible Authentication Method for UDDI Registries. In: Proceedings of the ICWS Conference, Las Vegas, Nevada, USA (2003)Google Scholar
  5. 5.
    Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security 5(3), 290–331 (2002)CrossRefGoogle Scholar
  6. 6.
    Castano, S., Fugini, M.G., Martella, G., Samarati, P.: Database Security. Addison-Wesley, Reading (1995)MATHGoogle Scholar
  7. 7.
    Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining Privacy for Data Mining. In: Proceedings of the Next Generation Data Mining Workshop (2002), Baltimore, MD, USA (2002)Google Scholar
  8. 8.
    Gehrke, J.: Research Problems in Data Stream Processing and Privacy-Preserving Data Mining. In: Proceedings of the Next Generation Data Mining Workshop (2002), Baltimore, MD, USA (2002)Google Scholar
  9. 9.
    IBM Corporation: Security in a Web Services World: A Proposed Architecture and Roadmap, White Paper, Version 1.0 (2002), Available at: http://www-106.ibm.com/developerworks/library/ws-secroad/
  10. 10.
    Stallings, W.: Network Security Essentials: Applications and Standards. Prentice-Hall, Englewood Cliffs (2000)Google Scholar
  11. 11.
    Pollmann, C.G.: The XML Security Page, Available at: http://www.nue.et-inf.uni-siegen.de/~geuer-pollmann/xml_security.html
  12. 12.
    Thuraisingham, B.: Web Data Mining: Technologies and Their Applications to Business Intelligence and Counter-terrorism. CRC Press, Boca Raton (2003)CrossRefGoogle Scholar
  13. 13.
    Thuraisingham, B.: Privacy Constraint Processing in a Privacy Enhanced Database System. Data and Knowledge Engineering (to appear)Google Scholar
  14. 14.
    Thuraisingham, B., Ford, W.: Security Constraint Processing in a Distributed Database Management System. IEEE Transactions on Knowledge and Data Engineering (1995)Google Scholar
  15. 15.
    World Wide Web Consortium: http://www.w3c.org
  16. 16.
    Universal Description, Discovery and Integration (UDDI): UDDI Version 3.0, UDDI Spec Technical Committee Specification, July 19 (2002), Available at: http://uddi.org/pubs/uddi-v3.00-published-20020719.htm

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Elena Ferrari
    • 1
  • Bhavani Thuraisingham
    • 2
  1. 1.Università dell’InsubriaComoItaly
  2. 2.The National Science FoundationArlingtonUSA

Personalised recommendations