Capturing semantics for information security and privacy assurance

被引:0
|
作者
Chowdhury, Mohammad M. R. [1 ]
Chamizo, Javier [2 ]
Noll, Josef [1 ]
Gomez, Juan Miguel [2 ]
机构
[1] UniK Univ Grad Ctr, POB 70, N-2027 Kjeller, Norway
[2] Univ Carlos III Madrid, Madrid, Spain
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security and privacy assurance is indispensable for ubiquitous access to information and resources. This paper focuses on the security and privacy provisions in a restricted organizational environment through access control mechanism. It includes the representation of the semantics of art organization and its access control mechanism exploiting the Web Ontology Language. The system controls access to the resources of an organization through differential access privileges. These are formulated based on the roles of the individuals, and the projects and departments they belong to. Instead of explicit definitions, some additional facts of the mechanism are inferred by executing semantic rules using the Jess rule engine over the designed ontology. These information are then passed back to the ontology to enrich it. The ontology is designed to cope with the organization restructuring with minimal efforts.
引用
收藏
页码:105 / +
页数:3
相关论文
共 50 条
  • [1] Information Assurance, Privacy, and Security in Ubiquitous Questionnaire
    Goto, Yuichi
    Cheng, Jingde
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 619 - 624
  • [2] Privacy Law Protection Based on the Information Security Assurance Algorithm
    Wang, Zhanjiang
    Yue, Qifeng
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [3] A Case Study: The Deficiency of Information Security Assurance Practice of a Financial Institute in the Protection of Privacy Information
    Ng, R.
    Dong, L.
    2008 FIRST IEEE INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS, PROCEEDINGS, 2008, : 332 - 337
  • [4] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252
  • [5] Information security and privacy
    Pieprzyk, J
    Safavi-Naini, R
    AUSTRALIAN COMPUTER JOURNAL, 1999, 31 (02): : 33 - 33
  • [6] INFORMATION SECURITY AND PRIVACY
    Bui, Tung
    Clemons, Eric
    Streff, Kevin
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4702 - 4702
  • [7] Panel session - Learning modules for security, privacy and information assurance in undergraduate engineering education
    Manson, Daniel
    Meldal, Sigurd
    Sledge, Carol
    Maurer, Stephen M.
    Mitchell, John C.
    Spengler, Erich
    Sztipanovits, Janos
    Torner, Javier
    36th Annual Frontiers in Education, Conference Program, Vols 1-4: BORDERS: INTERNATIONAL, SOCIAL AND CULTURAL, 2006, : 611 - 612
  • [8] Security evaluation for information assurance
    Kim, Yong-Tae
    Park, Gil-Cheol
    Kim, Tai-Hoon
    Lee, Sang-Ho
    ICCSA 2007: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2007, : 227 - +
  • [9] Information Assurance for security protocols
    Bella, G
    Bistarelli, S
    COMPUTERS & SECURITY, 2005, 24 (04) : 322 - 333
  • [10] Adaptive Information Security and Privacy
    Nuseibeh, Bashar
    2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 17 - 17