Skip to main content

Secure Semantic Web Services

  • Chapter
Handbook of Database Security

Summary

Web Services refer to the technologies that allow for making connections. Semantic web consists of technologies that enable machine understandable web pages. Web services make use of semantic web technologies to understand the web pages, conduct reasoning and take actions. Such web services are semantic web services. For many applications the semantic web services have to be secure. In this chapter we discuss secure web services, secure semantic web technologies and finally discuss the integration of secure web services with secure semantic web technologies to develop secure semantic web services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. OASIS, http://www.oasis-open.org/home/index.php

    Google Scholar 

  2. T. Berners Lee and J. Hendler: The Semantic Web, Scientific American, May 2001.

    Google Scholar 

  3. B. Thuraisingham: Building Trustworthy Semantic Web, CRC Press, 2007.

    Google Scholar 

  4. Shibboleth, http://middleware.internet2.edu/pki05/proceedings/chadwick-distributed-shibboleth.pdf

    Google Scholar 

  5. http://en.wikipedia.org/wiki/Serviceoriented_architecture

    Google Scholar 

  6. http://www.omg.org

    Google Scholar 

  7. E. Bertino, L. Martino: Security in SOA and Web Services. IEEE SCC 2006.

    Google Scholar 

  8. SUN XACML Documentation, http://sunxacml.sourceforge.net/guide.html

    Google Scholar 

  9. OpenSAML, http://www.opensaml.org

    Google Scholar 

  10. R. Bhatti, E. Bertino, and A. Ghafoor: Trust-based Context aware Access Control Models in Web Services, Proceedings of the Web Services Conference, San Diego, July 2004.

    Google Scholar 

  11. http://www.terena.nl/activities/tf-aace/workshop/presentations/Distributed_trust_model1.ppt

    Google Scholar 

  12. http://www.w3c.org

    Google Scholar 

  13. G. Antoniou and F. van Harmelan: A Semantic Web Primer, MIT Press, 2003.

    Google Scholar 

  14. B. Thuraisingham: Security Standards for the Semantic Web, Computer Standards and Interface Journal, vol. 27, no. 3, 257–268, Mar. 2005.

    Google Scholar 

  15. B. Thuraisingham: Database and Applications Security: Integrating Data Management and Information Security, CRC Press, FL, 2005.

    Google Scholar 

  16. C. Farkas, et al.: Inference Problem for the Semantic Web, Proceedings of the IFIP Conference on Data and Applications Security, Colorado, August 2003 (formal proceedings published by Kluwer, 2004)

    Google Scholar 

  17. B. Thuraisingham et al.: Administering the Semantic Web, Confidentiality, Privacy and Trust, Journal of Information Security and Privacy, 2006.

    Google Scholar 

  18. E. Bertino, et al.: Access Control for XML Documents, Data and Knowledge Engineering, Volume 43, No. 3, 2002.

    Google Scholar 

  19. E. Bertino, B. Carminati, E. Ferrari, B. Thuraisingham, A. Gupta: Selective and Authentic Third-Party Distribution of XML Documents. IEEE Trans. on Knowledge and Data Engineering. 16(10): 1263-1278, 2004.

    Google Scholar 

  20. http://xml.apache.org/security

    Google Scholar 

  21. http://www.w3.org/Signature

    Google Scholar 

  22. http://www.w3.org/Encryption/2001

    Google Scholar 

  23. B. Carminati, E. Ferrari, B. Thuraisingham: Using RDF for Policy Specification and Enforcement, Proceedings of the DEXA Conference Workshop on Web Semantics, Zaragoza, Spain, 2004.

    Google Scholar 

  24. B. Thuraisingham, W. Ford, M. Collins, J. O’Keeffe: Design and Implementation of a Database Inference Controller, Data and Knowledge Engineering Journal, Volume 11, No.3, 1993.

    Google Scholar 

  25. B. Thuraisingham: Data Mining, National Security, Privacy and Civil Liberties, ACM SIGKDD 2002.

    Google Scholar 

  26. G. Denker, et al.: Security for DAML Web Services: Annotation and Matchmaking. International Semantic Web Conference, 2003.

    Google Scholar 

  27. L. Kagal, T. W. Finin, A. Joshi: A Policy Based Approach to Security for the Semantic Web. International Semantic Web Conference 2003, 402–418.

    Google Scholar 

  28. T. Yu, M. Winslett: A Unified Scheme for Resource Protection in Automated Trust Negotiation, IEEE Symposium on Security and Privacy, Oakland, CA., May 2003.

    Google Scholar 

  29. M. Burstein, Ch. Bussler, M. Zaremba, T. Finin, M.N. Huhns, M. Paolucci, A.P. Sheth, St. Williams: A Semantic Web Services Architecture, IEEE Internet Computing, September-October, 2005

    Google Scholar 

  30. A. Sheth, J. Larson: Federated Database Systems, ACM Computing Surveys, Volume 22, No.3, 1990.

    Google Scholar 

  31. B. Thuraisingham: Security Issues for Federated Database Systems, Computers and Security, Volume 13, No.6, 1994.

    Google Scholar 

  32. B. Thuraisingham: Data Management Systems Evolution and Interoperation, CRC Press, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC.

About this chapter

Cite this chapter

Thuraisingham, B. (2008). Secure Semantic Web Services. In: Gertz, M., Jajodia, S. (eds) Handbook of Database Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-48533-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-48533-1_10

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-48532-4

  • Online ISBN: 978-0-387-48533-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics