Skip to main content

Bringing Semantic Security To Semantic Web Services

  • Chapter
The Semantic Web

Part of the book series: Semantic Web And Beyond Computing for Human Experience ((ADSW,volume 6))

  • 727 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Akkiraju R, Farell J, Miller J, Nagarajan M, Sheth A and Verma K, "Web Service Semantics WSDL-S” Proceedings of the W3C Workshop on Frameworks for Semantics in Web Service (W3CW’05), Innsbruck, Austria (June 2005) pages 5.

    Google Scholar 

  • Boanerges Aleman-Meza, Meenakshi Nagarajan1, Cartic Ramakrishnan1, Li Ding, Pranam Kolari, Amit P. Sheth1, I. Budak Arpinar, Anupam Joshi, Tim Finin, underline International World Wide Web Conference, Proceedings of the 15th international conference on World Wide Web, Edinburgh, Scotland, SESSION: Social networks, 2006, pp 407 - 416

    Google Scholar 

  • Kemafor Anyanwu, Amit P. Sheth, Jorge Cardoso, John A. Miller and Krys J. Kochut, "Healthcare Enterprise Process Development and Integration," underline Journal of Research and Practice in Information Technology ( JRPIT), Special Issue on Health Knowledge Management, Vol. 35, No. 2 (May 2003) pp. 83-98. Australian Computer Society, Inc.

    Google Scholar 

  • Kemafor Anyanwu and Amit P. Sheth, “The $ρ $ Operator: Discovering and Ranking Associations on the Semantic Web”ACM SPECIAL ISSUE: Special section on semantic web and data management, Volume 31 , Issue 4 2002 pp 42 - 47

    Google Scholar 

  • S. Agarwal, B. Sprick, S. Wortmann; “Credential Based Access Control for Semantic Web Services”; http://www.aifb.uni- karlsruhe.de/WBS/sag/papers/Agarwal_Sprick_WortmannCredentialBasedAccessControlForSemanticWebServices-AAAI_SS_SWS-04.pdf.

    Google Scholar 

  • Census Bureau, 2000Industry Categories for the Special EEO File, 2000. Christensen E., Curbera F., Meredith G. and Weerawarana S., 2001, Web Services Description Language (WSDL) 1.1, W3C Note, http://www.w3.org/TR/wsdl.

    Google Scholar 

  • M. Damashek. Gauging similarity with n-grams: language independent categorization of text,Science, 267(5199) pp 843–848, 1995

    Google Scholar 

  • Dogac A., Cingil I., Laleci G., Kabak Y.,Improving the Functionality of UDDI Registries through Web Service Semantics, 3rd VLDB Workshop on Technologies for Eservices (TES-02), Hong Kong, China, August 23-24, 2002

    Google Scholar 

  • X.L. Dong, A. Halevy and J. Madhavan (2005)Reference reconciliation in complex information space, In Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, ACM Press: Baltimore, MD. Pp. 85-96

    Google Scholar 

  • FaCT (2005) FaCT++,http://owl.man.ac.uk/factplusplus/. Fensel D. and Bussler C., The Web Service Modeling Framework WSMF, http://informatik.uibk.ac.at/users/c70385/wese/wsmf.paper.pdf

    Google Scholar 

  • S. Gavrila, D. Kuhn, R. Chandramouli; Proposed NIST Standard for Role-Based Access Control;http://csrc.nist.gov/rbac/rbacSTD-ACM.pdf

    Google Scholar 

  • Gandon, F. L. and N. M. Sadeh, OWL inference engine using XSLT and JESS, underline http://www 2.cs.cmu.edu/∼sadeh/MyCampusMirror/OWLEngine.html, 2003.

    Google Scholar 

  • HL7http://www.hl7.org

    Google Scholar 

  • HL7 Security Technical Committee, Role Based Access Control (RBAC) Healthcare Scenarios Version 1.0, 2005.

    Google Scholar 

  • HL7 Security Technical Committee, Role Based Access Control (RBAC) Healthcare Permissions Catalog Version 2.0, 2005

    Google Scholar 

  • Hull and East Yorkshire Hospitals NHS Trust, 2006.

    Google Scholar 

  • IBM Corporation and Microsoft Corporation, Security in a Web Services World: A Proposed Architecture and Roadmap Version 1.0, 2002. Hewlett-Packard Development Company, LP., 2006.http://jena.sourceforge.net/

    Google Scholar 

  • L. Kagal, M. Paolucci, N. Srinivasan, G. Denker, T. Finin, K. Sycara; Authorization and Privacy for Semantic Web Services;IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004.

    Google Scholar 

  • Leymann F, Roller D, Schmidt MT, Web services and business process management,IBM Systems Journal, 2002

    Google Scholar 

  • G. López, Ó. Cánovas, A. Gómez-Skarmeta, S. Otenko, D. Chadwick; A Heterogeneous Network Access Service based on PERMIS and SAML; In Proceedings of 2nd EuroPKI Workshop, University of Kent, July 2005.

    Google Scholar 

  • National Institute of Standards and Technology (NIST) FIPS Publication 180: underline Secure Hash Standard (SHS). May 1993.

    Google Scholar 

  • National Institute of Standards and Technology (NIST)Role Based Access Control Standard (RBACS). April 2004.

    Google Scholar 

  • Deborah L. McGuinness, Frank van Harmelen, W3C Recommendation 10 February 2004 Minswap, http://www.mindswap.org/2003/pellet/ , 2003 Cary Pennington, "Policy Based Optimal Composition of Web Services,"Masters Thesis (M.S. in CS Degree) July 2006. Jothy Rosenberg and David Remy, Securing Web Services Security with WS-Security,Sams, 2004.

    Google Scholar 

  • SAML 2.0 profile of XACML v2.0 OASIS Standard, 1 February 2005, http://docs.oasisopen.org/xacml/2.0/access_control-xacml-2.0-saml-profile-spec-os.pdf

    Google Scholar 

  • Joel Farrell, IBM Semantic Annotations for WSDL,Editors Copy

    Google Scholar 

  • Holger Lausen, DERI Innsbruck, August 08, 2006. http://www.w3.org/2002/ws/sawsdl/spec/SAWSDL.html

    Google Scholar 

  • Evren Sirin, Bijan Parsia, Bernardo Cuenca Grau, Aditya Kalyanpur, and Yarden Katz. Pellet: A practical owl-dl reasoner. Submitted for publication to Journal of Web Semantics.

    Google Scholar 

  • Sivashanmugam, K., Verma, K., Sheth, A., Miller, J.,Adding Semantics to Web Services Standards, Proceedings of the 1st International Conference on Web Services (ICWS’03), Las Vegas, Nevada (June 2003).

    Google Scholar 

  • A. Toninelli, J. Bradshaw, L. Kagal, R. Montanari;Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments; Proceedings of the Semantic Web and Policy Workshop, International Semantic Web Conference, 7 November, 2005.

    Google Scholar 

  • UDDI Spec Technical Committee Specification, 2002. http://uddi.org/pubs/uddiv3.00published-20020719.htm

    Google Scholar 

  • Verma K, Sivashanmugam K, Sheth A, Abhijit Patil, Oundhakar S and Miller J, METEOR-S WSDI: A Scalable Infrastructure of Registries for Semantic Publication and Discovery of Web Services,Journal of Information Technology and Management, Special Issue on Universal Global Integration, Vol. 6, No. 1 (2005) pp. 17-39. Kluwer Academic Publishers.

    Google Scholar 

  • Kunal Verma,"Configuration and Adaptation of Semantic Web Processes” Doctoral Dissertation (Ph.D. in CS Degree) June 2006

    Google Scholar 

  • K. Verma, R. Akkiraju, R Goodwin;Semantic Matching of Web Service Policies; Second International Workshop on Semantic and Dynamic Web Processes (SDWP 2005), Third International Conference on Web Services (ICWS’05), July, 2005.

    Google Scholar 

  • Verma K, Aggarwal R, Miller J and Milnor W,"Constraint Driven Web Service Composition in METEOR-S” Proceedings of the 2004 IEEE International Conference on Services Computing (SCC’04), Shanghai, China (September 2004) pp. 23-32

    Google Scholar 

  • Wielemaker, J., SWI-Prolog Semantic Web Library,underline http://www.swiprolog.org/packages/semweb.html, 2005.

    Google Scholar 

  • D. Booth, H. Haas, F. McCabe, E. Newcomer, M. Champion, C. Ferris, D. Orchard,Web Services Architecture (WS Architecture), http://www.w3.org/TR/ws-arch/#security Feb. 2004

    Google Scholar 

  • Siddharth Bajaj, Don Box;Web Services Policy Framework (WS-Policy), ftp://www6.software.ibm.com/software/developer/library/ws-policy.pdf

    Google Scholar 

  • Web Services Security (WS-Security) Version 1.0 05, 2002 et al Bob Atkinson, Giovanni Della-Libera; Specification: Web Services Security, ftp://www6.software.ibm.com/software/developer/library/ws-secure.pdf; April 2002

    Google Scholar 

  • S. Wu, A. Sheth, J. Miller, Z Luo; Authorization and Access Control of Application Data in Workflow Systems;Journal of Intelligent Information Systems: Integrating Artificial Intelligence and Database Technologies (JIIS), Vol. 18, No. 1 (January 2002) pp. 71-94. Kluwer Academic Publishers.

    Google Scholar 

  • eXtensible Access Control Markup Language, (XACML) Version 2.0 OASIS Standard, 1 Feb 2005, http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf

    Google Scholar 

  • XML Signature Syntax and Processing (XML-Signature) W3C Recommendation 2002 http://www.w3.org/TR/xmldsig-core/

    Google Scholar 

  • XML Encryption Syntax and Processing (XML-Encryption) W3CRecommendation 2002 http://www.w3.org/TR/xmlenc-core/

    Google Scholar 

  • M. Yague, A. Mana, J. Lopez, J. Troya; Applying the Semantic Web Layers to Access Control ; 14th International Workshop on Database and Expert Systems Applications (DEXA'03)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Patterson, R.S., Miller, J.A., Cardoso, J., Davis, M. (2007). Bringing Semantic Security To Semantic Web Services. In: Cardoso, J., Hepp, M., Lytras, M.D. (eds) The Semantic Web. Semantic Web And Beyond Computing for Human Experience, vol 6. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-48531-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-48531-7_12

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-48530-0

  • Online ISBN: 978-0-387-48531-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics