28 research outputs found

    Semantic Web and Knowledge Management in User Data Privacy

    Get PDF
    This paper discusses knowledge representation for privacy andaccountability issues

    Training of students to standards and fire safety regulations on the basis of the educational platform "moodle"

    Get PDF
    The article describes experience in the development and application of e-learning course for teaching students the norms and rules of fire safety. Educational program for teaching students the norms and rules of fire safety was developed. E-course based on the platform "Moodle". The program includes theoretical material and a Bank of test tasks for checking knowledge.The content of the programme meets the norms and rules of fire safety in the Russian Federation

    Using semantics for automating the authentication of Web APIs

    Get PDF
    Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications based on Web APIs is, however, hampered by the lack of automation that can be achieved with current technologies. Research on semantic Web services is there fore trying to adapt the principles and technologies that were devised for traditional Web services, to deal with this new kind of services. In this paper we show that currently more than 80% of the Web APIs require some form of authentication. Therefore authentication plays a major role for Web API invocation and should not be neglected in the context of mashups and composite data applications. We present a thorough analysis carried out over a body of publicly available APIs that determines the most commonly used authentication approaches. In the light of these results, we propose an ontology for the semantic annotation of Web API authentication information and demonstrate how it can be used to create semantic Web API descriptions. We evaluate the applicability of our approach by providing a prototypical implementation, which uses authentication annotations as the basis for automated service invocation

    Language means of support of policy of access to semantic network based on situation of use

    Get PDF
    The article considers approach to creation of language means for support of policy of access. The solution based on use of intensional logic is proposed. The developed formal language and means of interpretation are presented. Elements of the offered approach have been approved for systems in the sphere of information support of introduction of the best available technologies (BAT)

    An overview of security ontologies

    Get PDF
    This paper presents an overview of ontologies in Information Systems Security. Information Systems Security is a broad and dynamic area that clearly benefits from the formalizations of concepts provided by ontologies. After a very short presentation of ontologies and Semantic Web, several works in Security Ontologies targeting different aspects of security engineering are presented together with another study that compares several publicly available security ontologies

    Privacy-knowledge modeling for the Internet of Things: a look back

    Get PDF
    Together, the Internet of Things (IoT) and cloud computing give us the ability to gather, process, and even trade data to better understand users' behaviors, habits, and preferences. However, future IoT applications must address the significant potential threats to privacy posed by such knowledge-discovery activities

    Security Conscious Web Service Composition with Semantic Web Support

    Full text link

    Ontology-based access control for social network systems

    Get PDF
    As the information flowing around in social network systems is mainly related or can be attributed to their users, controlling access to such information by individual users becomes a crucial requirement. The intricate semantic relations among data objects, different users, and between data objects and users further add to the complexity of access control needs. In this paper, we propose an access control model based on semantic web technologies that takes into account the above mentioned complex relations. The proposed model enables expressing much more fine-grained access control policies on a social network knowledge base than the existing models. We demonstrate the applicability of our approach by implementing a proof-of-concept prototype of the proposed access control framework and evaluating its performance

    A System to Filter Unwanted Messages from OSN User Walls

    Get PDF
    This paper proposes a system allowing OSN users to have a direct control on the messages posted on their walls. This is achieved through a flexible rule-based system, that allows users to customize the filtering criteria to be applied to their walls, and a Machine Learning based soft classifier automatically labeling messages in support of content-based filtering
    corecore