Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.

Slides:



Advertisements
Similar presentations
ROWLBAC – Representing Role Based Access Control in OWL
Advertisements

Dr. Bhavani Thuraisingham February 18, 2011 Building Trustworthy Semantic Webs RDF and RDF Security.
Pranam Kolari – Policy 2005 Enhancing Web Privacy Protection Through Declarative Policies Pranam Kolari 1 Li Ding 1, Lalana Kagal 2, Shashi Ganjugunte.
Cyber Security Essentials Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for Final Exam November 19, 2010.
Secure Web Services and Cloud Computing Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course and Overview of Material.
Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection Boanerges Aleman-Meza, Meenakshi Nagarajan,
Pranam Kolari – Policy 2005 Enhancing Web Privacy Protection Through Declarative Policies Pranam Kolari 1 Li Ding 1, Lalana Kagal 2, Shashi Ganjugunte.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications Harry Chen, Filip Perich, Tim Finin, Anupam Joshi Department of Computer Science & Electrical.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 24, 2011.
OWL Capturing Semantic Information using a Standard Web Ontology Language Aditya Kalyanpur Jennifer Jay Banerjee James Hendler Presented By Rami Al-Ghanmi.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.
Data and Applications Security Developments and Directions Guest Lecture Dr. Kevin Hamlen Given in February 2012.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for the Final Exam December 8, 2008.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 20, 2007.
The Semantic Web: An Interview with Tim Berners-Lee VISION: What new capabilities will the Semantic Web have? STATUS: Who is committed and how do we get.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Computational Policies in a Need to Share Environment Tim Finin University of Maryland, Baltimore County SemGrail workshop, Redmond WA, 21 June 2007.
Dr. Bhavani Thuraisingham September 24, 2008 Building Trustworthy Semantic Webs Lecture #9: RDF and RDF Security.
Dr. Bhavani Thuraisingham September 18, 2006 Building Trustworthy Semantic Webs Lecture #9: Logic and Inference Rules.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
© The ATHENA Consortium. Susan Thomas SAP AG, Research Department How do you do semantics? Semantic Web Drawings by Sebastian Cremers Unit 3:
1 T. Hill Review of: ROWLBAC – Representing Role Based Access Control in OWL T. Finin, A. Joshi L. Kagal, B. Thuraisingham, J. Niu, R. Sandhu, W. Winsborough.
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Data and Applications Security
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Building Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Digital Forensics Dr. Bhavani Thuraisingham
Lecture #11: Ontology Engineering Dr. Bhavani Thuraisingham
Data and Applications Security
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Building Trustworthy Semantic Webs
Building Trustworthy Semantic Web
Prof. Bhavani Thuraisingham The University of Texas at Dallas
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Web
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Semantic Web Towards a Web of Knowledge - Outline
Data and Applications Security
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Developing and Securing the Cloud
Data and Applications Security
Data and Applications Security
Digital Forensics Dr. Bhavani Thuraisingham
Presentation transcript:

Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course

Outline of the Course Trustworthy Semantic Webs: Prof. Bhavani Thuraisingham Contents Introduction to the Course Part I: Supporting Technologies Trustworthy Systems Secure Data and Information Management Secure Web and Information Retrieval Systems Part II: Semantic Webs Overview of Semantic Webs Components of the Semantic Web XML, RDF, Ontologies, Rules Applications Conclusion to Part II

Outline of the Course Part III: Secure Semantic Web Overview of Secure Semantic Webs Components of Secure Semantic Web XML Security, Securing RDF Documents, Secure Ontologies Secure Web Rules, Inference Problem Multilevel Security and Malicious Attacks Part IV: Dependable Semantic Webs Trust Management Privacy and Platform for Privacy Preferences Data Provenance and Integrity Management Part V: Secure Semantic Applications Secure Semantic Interoperability Secure Web Services Secure Knowledge Management and E-Business Conclusion to the Course

Outline of the Course Textbook: A semantic web primer Grigoris Antoniou and Frank van Harmelen, MIT Press, 2007 “Building Trustworthy Semantic Web” Bhavani Thuraisingham, CRC Press, 2007.

Course Rules l Unless special permission is obtained from the instructor, each student will work individually l Copying material from other sources will not be permitted unless the source is properly referenced l Any student who plagiarizes from other sources will be reported to the Computer Science department and any other committees as advices by the department l No copying of anything from a paper except for about 10 words in quotes. No copying of figure even if its attributed. You have to draw all figures.

Course Plan l 4 assignments 8 points each # 1 Given Feb 1, Due Feb 15 – Due Feb 17 – Returned #2 Given Feb 15, Due March 1 – Due March 8 - Returned #3 Given March1, Due March 29 – Given March 10 – due March 31 #4 March 29 Due April 12 – Given March 31, Due April 14 l Two exams – 16 points each Exam #1: March 3 or March 10 – March 10 – will return March 31 - returned Exam #2: May 3 or May 10 – May 10 l 2 term papers – 10 points each - #1: Due March 3 or March 10 (depending on exam) - Returned - #2: April 19 l Programming project: 16 points April 26 l Total 100 points

Contact l For more information please contact - Dr. Bhavani Thuraisingham - Professor of Computer Science and - Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX Phone: Fax: URL: -

Project l CD-ROM - your software l Hard copy – design document - Project description - Architecture (prefer with a picture) and description (software – e.g., Oracle, Jena etc.) - Results - Analysis - Potential improvements - References

Paper: Original – you can use material from sources, reword (redraw) and give reference l Abstract l Introduction l Body of the paper - Comparing different approaches and analyzing - Discuss your approach, - Survey l Conclusions l References - ([1]. [2], - - -[THUR99]. - Embed the reference also within the text. - E.g., Tim Berners Lee has defined the semantic web to be [2].

Review for the Exam #1 – March 10, 2010 l NVD database – use of semantic technologies l Confidentiality, privacy and trust and applied to semantic web l Secure third party publishing of XML documents l Inference problem and semantic web l RDF and Security l OWL and Security l Ontology alignment and security l ROWLBAC – question on paper l Platform for privacy preferences l Assured information sharing l Web Services and Security l SAML, XACML l Extra credit question

Policy for Second Half of the Semester l Because this is a PhD level class, during the second half, the students will be reading papers and presenting in class. l Students will read all the papers assigned; the paper will be posted in the Introduction section on the Monday prior to the following week (e.g., March 22 for lectures on March 29 and March 31) l One or more students will be selected at random and requested to present the paper and the entire class will participate l While it is unlikely that a student will be selected twice, it is not improbable l If a student is absent without a valid excuse prior to the class (e.g., a student is sick) 5 points will be deducted from the final score if a student is not present to present the paper.

Papers for March 29 and March Trust Networks on the Semantic Web. Jennifer Golbeck, James Hendler, Bijan Parsia, WWW Describes a web-of- trust/reputation system based on FOAF profiles and explicite ratings and proposes the use of network analysis to make trust recommendations based on implicite ratings. Trust Networks on the Semantic Web Rein Policy Framework for the Semantic Web. Decentralized framework for representing and reasoning over distributed policies in the Semantic Web using Rei and CWM. Lalana Kagal and Tim Berners-Lee. Rein Policy Framework for the Semantic Web

Papers for April 5 and April 7, A Semantic Web Approach to the Provenance Challenge Authors: Jennifer Golbeck,, James Hendler 8400 Baltimore Ave., Suite 200 College Park, MD USA 2. Rahul Singh, Al Farooq Salam: Semantic information assurance for secure distributed knowledge management: a business process perspective. IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(3): (2006)Al Farooq SalamIEEE Transactions on Systems, Man, and Cybernetics, Part A 36

Papers for April 12 and April 14, 2010 l KAoS Policy and Domain Services: Toward a Description- Logic Approach to Policy Representation, Deconfliction, and Enforcement l berlin.de/bizer/SWTSGuide/KAoS/KAoS_Policy_03.pdf berlin.de/bizer/SWTSGuide/KAoS/KAoS_Policy_03.pdf 2. Using Semantic Web Technologies for Policy Management on the Web

Papers for April 19 and April 21, On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework ¤ Li Ding, Pranam Kolari, Tim Finin, Anupam Joshi, Yun Peng, Yelena Yesha University of Maryland Baltimore County, 2. Framework for Security and Trust Standards

Papers for April 26 and April 28, Sudhir Agarwal, Barbara Sprick, "Access Control for Semantic Web Services," icws, pp.770, IEEE International Conference on Web Services (ICWS'04), Thomas Trojer2. Thomas Trojer, Benjamin C. M. Fung, Patrick C. K. Hung: Service-Oriented Architecture for Privacy-Preserving Data Mashup. ICWS 2009Benjamin C. M. FungPatrick C. K. Hung