Security and Privacy for Web Databases and Services
A semantic web can be thought of as a web that is highly intelligent and sophisticated and one needs little or no human intervention to carry out tasks such as scheduling appointments, coordinating activities, searching for complex documents as well as integrating disparate databases and information systems. While much progress has been made toward developing such an intelligent web, there is still a lot to be done. For example, there is little work on security and privacy for the semantic web. However, before we examine security for the semantic web we need to ensure that its key components, such as web databases and services, are secure. This paper will mainly focus on security and privacy issues for web databases and services. Finally, some directions toward developing a secure semantic web will be provided.
Unable to display preview. Download preview PDF.
- 1.Agrawal, R., Srikant, R.: Privacy-preserving Data Mining. In: Proceedings of the ACM SIGMOD Conference (2000), Dallas, TX, USA (2000)Google Scholar
- 2.Berners Lee, T., et al.: The Semantic Web. Scientific American (2001)Google Scholar
- 3.Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B., Gupta, A.: Selective and Authentic Third-party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering (to appear)Google Scholar
- 4.Bertino, E., Carminati, B., Ferrari, E.: A Flexible Authentication Method for UDDI Registries. In: Proceedings of the ICWS Conference, Las Vegas, Nevada, USA (2003)Google Scholar
- 7.Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining Privacy for Data Mining. In: Proceedings of the Next Generation Data Mining Workshop (2002), Baltimore, MD, USA (2002)Google Scholar
- 8.Gehrke, J.: Research Problems in Data Stream Processing and Privacy-Preserving Data Mining. In: Proceedings of the Next Generation Data Mining Workshop (2002), Baltimore, MD, USA (2002)Google Scholar
- 9.IBM Corporation: Security in a Web Services World: A Proposed Architecture and Roadmap, White Paper, Version 1.0 (2002), Available at: http://www-106.ibm.com/developerworks/library/ws-secroad/
- 10.Stallings, W.: Network Security Essentials: Applications and Standards. Prentice-Hall, Englewood Cliffs (2000)Google Scholar
- 11.Pollmann, C.G.: The XML Security Page, Available at: http://www.nue.et-inf.uni-siegen.de/~geuer-pollmann/xml_security.html
- 13.Thuraisingham, B.: Privacy Constraint Processing in a Privacy Enhanced Database System. Data and Knowledge Engineering (to appear)Google Scholar
- 14.Thuraisingham, B., Ford, W.: Security Constraint Processing in a Distributed Database Management System. IEEE Transactions on Knowledge and Data Engineering (1995)Google Scholar
- 15.World Wide Web Consortium: http://www.w3c.org
- 16.Universal Description, Discovery and Integration (UDDI): UDDI Version 3.0, UDDI Spec Technical Committee Specification, July 19 (2002), Available at: http://uddi.org/pubs/uddi-v3.00-published-20020719.htm