SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
30.6.2016 1
University of Turku, Finland
Åbo Akademi University, Finland
Semantic security framework and context-
aware role-based access control ontology
for Smart Spaces
Shohreh Hosseinzadeh, Natalia Díaz-Rodríguez, Seppo Virtanen, Johan Lilius
Semantic Big Data Workshop, ACM SIGMOD 2016 Conference 2016,
San Francisco, California, July 1st 2016
Introduction
• Smart Spaces
• Security, Privacy and Context Awareness
in Smart Spaces
30.6.2016 2
Contribution
Granular triple-level mechanisms for security and privacy
in Smart Spaces
1. Security framework for Smart-M3 platform [13]
2. Context-aware role-based access control
scheme
30.6.2016 3
Smart-M3
• Smart-M3 is a functional platform that provides a cross
domain search extent for triple based information. Smart-
M3 enables smart cross domain applications that rely on
information level interoperability.
• Multi Device, Multi Platform, Multi Part
• https://sourceforge.net/projects/smart-m3/
30.6.2016 4
1) Security framework architecture
30.6.2016 5
Security aspects supported:
Authentication,Authorization and Access control
Different steps:
(1) Access request from user
(2) Authentication engine assures authenticity
(3) If positive, request forwarded to Access Control Engine
(4) Execute access control rules: check if requester has rights to perform
the requested action
(5) If positive the request is forwarded to the repository and access log
(6) The access log keeps record of the recent accesses.
(7) The result (accessible triple) is retrieved from the repository
(8) The result is sent to the user
30.6.2016 6
2) Context Aware Role Based Access
Control (CARBAC) ontology
30.6.2016 7
Comparison of access control ontologiesand their
Smart Space domains
30.6.2016 8
Access Control Policies
• Expressed via rules
• At run-time, rules are executed, and decisions made on
permission/prohibition of performing an action.
• For writing the access control rules, we used C Language
Integrated Production System (CLIPS) v6.24
• 2 kinds of Access Control rules, defined by:
a) Admin
b) User for privacy protection purposes.
30.6.2016 9
Example 1: Rules defined by the admin
(triple (Jack, hasRole, Doctor))
(triple (Maria, hasRole, Patient))
(triple (Maria, hasMedicalHistory, ?h)))
è
(assert (triple (Jack, roleHasReadPermissionOverData, ?h)))
(assert (triple (Jack, roleHasWritePermissionOverData, ?h)))
(assert (triple (Jack, roleHasUpdatePermissionOverData, ?h)))
(assert (triple (Jack, roleHasDeletePermissionOverData, ?h)))
30.6.2016 10
Example 2: Rules defined by the user
(highest priority)
(assert (triple (Jack, userHasReadPermissionOverData, ?h)))
(assert (triple (Jack, userHasUpdatePermissioOverData, ?h)))
(assert (triple (Jack, userHasDeletePermissionOverData, ?h)))
(assert (triple (Jack, userHasWritePermissionOverData, ?h)))
(assert (triple (Jack, userHasUpdateProhibitionOverData, ?h)))
(assert (triple (Jack, userHasDeleteProhibitionOverData, ?h)))
(assert (triple (Jack, userHasWriteProhibitionOverData, ?h)))
è
(assert (triple (Jack, roleHasReadPermissionOverData, ?h)))
30.6.2016 11
Example 3:
Context aware access control rules
Doctor: restricted to only read the medical history of the patients outside
the hospital, but cannot update/delete/write:
(triple (Jack, hasRole, Doctor))
(triple (Maria, hasRole, Patient))
(triple (Maria, hasMedicalHistory, ?h)))
(triple (LocationJack, hasValue, TrainStation))
è
(assert (triple (Jack, roleHasReadPermissionOverData, ?h)))
(assert (triple (Jack, roleHasWriteProhibitionOverData, ?h)))
(assert (triple (Jack, roleHasUpdateProhibitionOverData, ?h)))
(assert (triple (Jack, roleHasDeleteProhibitionOverData, ?h)))
30.6.2016 12
30.6.2016 13
Avg exec. time for access control requests to
the semantic information broker (M3 SIB)
30.6.2016 14
Smart Space Application
Protocol (SSAP)
operations:
• Read
• Write
• Delete
• Update a triple
Conclusion
We proposed
• Flexible security framework
• fine and coarse grained information level
• Smart Space security and privacy ontology available:
https://github.com/NataliaDiaz/AccessControlOntology
• Access control scheme for Smart-M3 based spaces
• http://sourceforge.net/projects/smart-m3/
30.6.2016 15
Future Work
• Security alert implementationwith M3 pub/sub
mechanism,
• Large scale deployment
• Micro-managingof personal data
• Data as a currency
30.6.2016 16
Thank you for your attention!
Shohreh Hosseinzadeh
shohos@utu.fi University of Turku, Finland
Natalia Díaz-Rodríguez
ndiaz@decsai.ugr.es
https://about.me/NataliaDiazRodriguez
University of Granada, Spain and Åbo Akademi University, Finland
(currently data scientist intern at Stitch Fix)
30.6.2016 17
References
[1] OWL for Services: http://www.ai.sri.com/daml/services/owls/security.html.
[2] F. Abel, J. L. De Coi, N. Henze, A. W. Koesling, D. Krause, and D. Olmedilla. Enabling advanced and context-dependent access
control in RDF stores. volume 4825 of Lecture Notes in Computer Science, pages 1-14. Springer, 2007.
[3] S. Al-Rabiaah and J. Al-Muhtadi. ConSec: Context-Aware Security Frameworkfor Smart Spaces. In Innovative Mobile and Internet
Services in Ubiquitous Computing (IMIS), Sixth InternationalConference on, pages580-584, Palermo, 2012. IEEE.
[4] C. A. Ardagna, S. De Capitani di Vimercati, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, and M. Verdicchio. Enabling privacy-
preserving credential-based access control with XACML and SAML. In Computer and Information Technology (CIT), 2010 IEEE 10th
InternationalConference on, pages 1090-1095, Bradford, United Kingdom, 2010.
[5] M. Baldauf, S. Dustdar, and F. Rosenberg. Asurvey on context-aware systems. InternationalJournal of Ad Hoc and Ubiquitous
Computing, 2(4):263-277, 2007.
[6] T. Berners-Lee, J. Hendler, O. Lassila, et al. The semantic web. Scientific American, 284(5):28-37, 2001.
[7] H. Chen, T. Finin, and A. Joshi. An ontology for context-aware pervasive computing environments. The Knowledge Engineering
Review, 18(03):197-207, 2003.
[8] N. D íaz Rodríguez, M. Cuellar, J. Lilius, and M. Delgado Calvo-Flores. Asurvey on ontologies for human behavior recognition. ACM
Computing Surveys (CSUR), 46(4):43, 2014.
[9] N. Díaz-Rodríguez, R. Wikstr om, J. Lilius, M. P. Cuellar, and M. D. C. Flores. Understanding Movement and Interaction: An Ontology
for Kinect-Based 3D Depth Sensors. In Ubiquitous Computing and Ambient Intelligence. Context Awareness and Context-Driven
Interaction, pages 254-261. Springer InternationalPublishing, 2013.
[10] T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham. Rowlbac: Representing role based access
control in owl. In Proceedings of the 13th ACM Symposium on Access ControlModels and Technologies, SACMAT '08, pages 73-82, New
York, NY, USA, 2008. ACM.
[11] S. Haibo and H. Fan. Acontext-aware role-based access control model for web services. In IEEE ICEBE, pages220-223, 2005.
[12] J. Hebeler, M. Fisher, R. Blace, and A. Perez-Lopez. Semantic web programming. Wiley, J. & Sons, Indianapolis, Indiana, 2011.
30.6.2016 18
[13] A. Kashevnik and N. Teslya. Context-Aware Access ControlModel for Smart-M3 Platform. 2013.
[14] A. Khan and I. McKillop. Privacy-centric access control for distributed heterogeneousmedical information systems. In Healthcare
Informatics (ICHI), 2013 IEEE InternationalConference on, pages297-306, Philadelphia, PA, 2013. IEEE.
[15] D. G. Korzun, S. I. Balandin, and A. V. Gurtov. Deployment of Smart Spaces in Internet of Things: Overview of the Design Challenges.
In Lecture Notes in Computer Science 8121: 48-59, 2013.
[16] A. Mhamed, M. Zerkouk, A. Husseini, B. Messabih, and B. Hassan. Towardsa context aware modeling of trust and access control
based on the user behavior and capabilities. In J. Biswas, H. Kobayashi, L. Wong, B. Abdulrazak, and M. Mokhtari, editors, Inclusive
Society: Health and Wellbeing in the Community, and Care at Home, volume 7910 of Lecture Notes in Computer Science, pages 69-76.
Springer Berlin Heidelberg, 2013.
[17] S. P. Miller, B. C. Neuman, J. I. Schiller, and S. J. H. Kerberosauthentication and authorization system. In Project Athena Technical
Plan, Cambridge, USA, 1987. Massachusetts Institute of Technology (MIT).
[18] M. Mohsin Saleemi, N. Daz Rodrguez, J. Lilius, and I. Porres. AFrameworkfor Context-Aware Applications for Smart Spaces. In
Applications and the Internet (SAINT), 2011 IEEE/IPSJ 11th InternationalSymposium on, Munich, Bavaria.
[19] M. Peleg, D. Beimel, D. Dori, and Y. Denekamp. Situation-based access control: Privacy management via modeling of patient data
access scenarios. Journal of Biomedical Informatics, 41(6):1028-1040, 2008.
[20] O. Sacco and A. Passant. Aprivacy preference ontology for linked data. In Linked Data on the Web Workshop at the World Wide Web
Conference, 2011.
[21] J. Suomalainen. Flexible security deployment in smart spaces. In Lecture Notes in Computer Science, volume 7096, pages34-43.
Springer, 2012.
[22] A. Toninelli, R. Montanari, L. Kagal, and O. Lassila. Asemantic context-aware access control frameworkfor secure collaborations in
pervasive computing environments. In I. Cruz, S. Decker, D. Allemang,
C. Preist, D. Schwabe, P. Mika, M. Uschold, and L. Aroyo, editors, The Semantic Web - ISWC 2006, volume 4273 of Lecture Notesin
Computer Science, pages473-486. Springer Berlin Heidelberg, 2006.
[23] A. Toninelli, R. Montanari, L. Kagal, and O. Lassila. Proteus: A semantic context-aware adaptive policy model. In Policies for
Distributed Systems and Networks. POLICY '07. Eighth IEEE International Workshop on, pages 129{140, Bologna, Italy, 2007.
[24] C. D. Wang, T. Li, and L. C. Feng. Context-aware environment-role-based access controlmodel for web services. In Multimedia and
Ubiquitous Engineering. InternationalConference on, pages 288-293, 2008.
30.6.2016 19

Weitere ähnliche Inhalte

Was ist angesagt?

english_cv_final.doc
english_cv_final.docenglish_cv_final.doc
english_cv_final.docbutest
 
Read Between The Lines: an Annotation Tool for Multimodal Data
Read Between The Lines: an Annotation Tool for Multimodal DataRead Between The Lines: an Annotation Tool for Multimodal Data
Read Between The Lines: an Annotation Tool for Multimodal DataDaniele Di Mitri
 
Application of VLSI In Artificial Intelligence
Application of VLSI In Artificial IntelligenceApplication of VLSI In Artificial Intelligence
Application of VLSI In Artificial IntelligenceIOSR Journals
 
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEY
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEYUSING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEY
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEYcseij
 
Information technology - Wikipedia, the free encyclopedia
Information technology - Wikipedia, the free encyclopediaInformation technology - Wikipedia, the free encyclopedia
Information technology - Wikipedia, the free encyclopediagracefulpoet3163
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - gerogepatton
 
ICMLDA_poster.doc
ICMLDA_poster.docICMLDA_poster.doc
ICMLDA_poster.docbutest
 
AIR: Architecture for Interoperable Retrieval on Distributed and Heterogeneou...
AIR: Architecture for Interoperable Retrieval on Distributed and Heterogeneou...AIR: Architecture for Interoperable Retrieval on Distributed and Heterogeneou...
AIR: Architecture for Interoperable Retrieval on Distributed and Heterogeneou...Florian Stegmaier
 
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...sipij
 
An Extensive Review on Generative Adversarial Networks GAN’s
An Extensive Review on Generative Adversarial Networks GAN’sAn Extensive Review on Generative Adversarial Networks GAN’s
An Extensive Review on Generative Adversarial Networks GAN’sijtsrd
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
 
Slima paper smartcities and ehealth for cmu ver 1 july 2018
Slima paper smartcities and ehealth for  cmu ver 1 july 2018Slima paper smartcities and ehealth for  cmu ver 1 july 2018
Slima paper smartcities and ehealth for cmu ver 1 july 2018Servio Fernando Lima Reina
 
LTCI Information Communications Lab
LTCI Information Communications LabLTCI Information Communications Lab
LTCI Information Communications LabTélécom Paris
 

Was ist angesagt? (19)

english_cv_final.doc
english_cv_final.docenglish_cv_final.doc
english_cv_final.doc
 
Read Between The Lines: an Annotation Tool for Multimodal Data
Read Between The Lines: an Annotation Tool for Multimodal DataRead Between The Lines: an Annotation Tool for Multimodal Data
Read Between The Lines: an Annotation Tool for Multimodal Data
 
Ijetcas14 465
Ijetcas14 465Ijetcas14 465
Ijetcas14 465
 
Application of VLSI In Artificial Intelligence
Application of VLSI In Artificial IntelligenceApplication of VLSI In Artificial Intelligence
Application of VLSI In Artificial Intelligence
 
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEY
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEYUSING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEY
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEY
 
Information technology - Wikipedia, the free encyclopedia
Information technology - Wikipedia, the free encyclopediaInformation technology - Wikipedia, the free encyclopedia
Information technology - Wikipedia, the free encyclopedia
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 -
 
ICMLDA_poster.doc
ICMLDA_poster.docICMLDA_poster.doc
ICMLDA_poster.doc
 
List of publication may 2017
List of publication may 2017List of publication may 2017
List of publication may 2017
 
AIR: Architecture for Interoperable Retrieval on Distributed and Heterogeneou...
AIR: Architecture for Interoperable Retrieval on Distributed and Heterogeneou...AIR: Architecture for Interoperable Retrieval on Distributed and Heterogeneou...
AIR: Architecture for Interoperable Retrieval on Distributed and Heterogeneou...
 
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
 
linkedin resume
linkedin resumelinkedin resume
linkedin resume
 
An Extensive Review on Generative Adversarial Networks GAN’s
An Extensive Review on Generative Adversarial Networks GAN’sAn Extensive Review on Generative Adversarial Networks GAN’s
An Extensive Review on Generative Adversarial Networks GAN’s
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
 
Cognitive systems
Cognitive  systemsCognitive  systems
Cognitive systems
 
Slima paper smartcities and ehealth for cmu ver 1 july 2018
Slima paper smartcities and ehealth for  cmu ver 1 july 2018Slima paper smartcities and ehealth for  cmu ver 1 july 2018
Slima paper smartcities and ehealth for cmu ver 1 july 2018
 
LTCI Information Communications Lab
LTCI Information Communications LabLTCI Information Communications Lab
LTCI Information Communications Lab
 
Investigation the Effect of Users’ Tagging Motivation on the Digital Educatio...
Investigation the Effect of Users’ Tagging Motivation on the Digital Educatio...Investigation the Effect of Users’ Tagging Motivation on the Digital Educatio...
Investigation the Effect of Users’ Tagging Motivation on the Digital Educatio...
 

Andere mochten auch

SeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentSeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentUS-Ignite
 
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...Giuseppe La Torre
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Matthias Braunhofer
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsSteph Cliche
 
Ontological approach for improving semantic web search results
Ontological approach for improving semantic web search resultsOntological approach for improving semantic web search results
Ontological approach for improving semantic web search resultseSAT Journals
 
TwitIE: An Open-Source Information Extraction Pipeline for Microblog Text
TwitIE: An Open-Source Information Extraction Pipeline for Microblog TextTwitIE: An Open-Source Information Extraction Pipeline for Microblog Text
TwitIE: An Open-Source Information Extraction Pipeline for Microblog TextLeon Derczynski
 
Intriduction to Ontotext's KIM platform
Intriduction to Ontotext's KIM platformIntriduction to Ontotext's KIM platform
Intriduction to Ontotext's KIM platformtoncho11
 
Semantic Search Engines
Semantic Search EnginesSemantic Search Engines
Semantic Search EnginesAtul Shridhar
 
Adding Semantic Edge to Your Content – From Authoring to Delivery
Adding Semantic Edge to Your Content – From Authoring to DeliveryAdding Semantic Edge to Your Content – From Authoring to Delivery
Adding Semantic Edge to Your Content – From Authoring to DeliveryOntotext
 
In Search of a Semantic Book Search Engine: Are We There Yet?
In Search of a Semantic Book Search Engine: Are We There Yet?In Search of a Semantic Book Search Engine: Are We There Yet?
In Search of a Semantic Book Search Engine: Are We There Yet?Irfan Ullah
 
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information RetrievalKeystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information RetrievalMauro Dragoni
 
Semantics And Search
Semantics And SearchSemantics And Search
Semantics And SearchVestforsk.no
 
Ontology Tutorial: Semantic Technology for Intelligence, Defense and Security
Ontology Tutorial: Semantic Technology for Intelligence, Defense and SecurityOntology Tutorial: Semantic Technology for Intelligence, Defense and Security
Ontology Tutorial: Semantic Technology for Intelligence, Defense and SecurityBarry Smith
 
Semantic data mining: an ontology based approach
Semantic data mining: an ontology based approachSemantic data mining: an ontology based approach
Semantic data mining: an ontology based approachAgnieszka Ławrynowicz
 
Text Analysis and Semantic Search with GATE
Text Analysis and Semantic Search with GATEText Analysis and Semantic Search with GATE
Text Analysis and Semantic Search with GATEDiana Maynard
 

Andere mochten auch (20)

Access control
Access controlAccess control
Access control
 
Context-aware mobile messages
Context-aware mobile messagesContext-aware mobile messages
Context-aware mobile messages
 
SeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentSeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application Containment
 
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systems
 
Ontological approach for improving semantic web search results
Ontological approach for improving semantic web search resultsOntological approach for improving semantic web search results
Ontological approach for improving semantic web search results
 
TwitIE: An Open-Source Information Extraction Pipeline for Microblog Text
TwitIE: An Open-Source Information Extraction Pipeline for Microblog TextTwitIE: An Open-Source Information Extraction Pipeline for Microblog Text
TwitIE: An Open-Source Information Extraction Pipeline for Microblog Text
 
Intriduction to Ontotext's KIM platform
Intriduction to Ontotext's KIM platformIntriduction to Ontotext's KIM platform
Intriduction to Ontotext's KIM platform
 
Semantic Search Engines
Semantic Search EnginesSemantic Search Engines
Semantic Search Engines
 
Adding Semantic Edge to Your Content – From Authoring to Delivery
Adding Semantic Edge to Your Content – From Authoring to DeliveryAdding Semantic Edge to Your Content – From Authoring to Delivery
Adding Semantic Edge to Your Content – From Authoring to Delivery
 
A Taxonomy of Semantic Web data Retrieval Techniques
A Taxonomy of Semantic Web data Retrieval TechniquesA Taxonomy of Semantic Web data Retrieval Techniques
A Taxonomy of Semantic Web data Retrieval Techniques
 
In Search of a Semantic Book Search Engine: Are We There Yet?
In Search of a Semantic Book Search Engine: Are We There Yet?In Search of a Semantic Book Search Engine: Are We There Yet?
In Search of a Semantic Book Search Engine: Are We There Yet?
 
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information RetrievalKeystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
 
Semantics And Search
Semantics And SearchSemantics And Search
Semantics And Search
 
Ontology Tutorial: Semantic Technology for Intelligence, Defense and Security
Ontology Tutorial: Semantic Technology for Intelligence, Defense and SecurityOntology Tutorial: Semantic Technology for Intelligence, Defense and Security
Ontology Tutorial: Semantic Technology for Intelligence, Defense and Security
 
Semantic data mining: an ontology based approach
Semantic data mining: an ontology based approachSemantic data mining: an ontology based approach
Semantic data mining: an ontology based approach
 
Text Analysis and Semantic Search with GATE
Text Analysis and Semantic Search with GATEText Analysis and Semantic Search with GATE
Text Analysis and Semantic Search with GATE
 
Efecto multiplicador bancario y encajes
Efecto multiplicador bancario y encajesEfecto multiplicador bancario y encajes
Efecto multiplicador bancario y encajes
 
Chapter17
Chapter17Chapter17
Chapter17
 

Ähnlich wie Semantic security framework and context-aware role-based access control ontology for Smart Spaces

Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 New Research Articles - 2018 November Issue- Advanced Computing: An Internat... New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...acijjournal
 
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...IJNSA Journal
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research AIRCC Publishing Corporation
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...IJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Ähnlich wie Semantic security framework and context-aware role-based access control ontology for Smart Spaces (20)

Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 New Research Articles - 2018 November Issue- Advanced Computing: An Internat... New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 

Mehr von Natalia Díaz Rodríguez

State representation learning for control: an overview
State representation learning for control: an overview State representation learning for control: an overview
State representation learning for control: an overview Natalia Díaz Rodríguez
 
PAISS (PRAIRIE AI Summer School) Digest July 2018
PAISS (PRAIRIE AI Summer School) Digest July 2018 PAISS (PRAIRIE AI Summer School) Digest July 2018
PAISS (PRAIRIE AI Summer School) Digest July 2018 Natalia Díaz Rodríguez
 
State Representation Learning for control: an overview
State Representation Learning for control: an overviewState Representation Learning for control: an overview
State Representation Learning for control: an overviewNatalia Díaz Rodríguez
 
A Folksonomy of styles, aka: other stylists also said and Subjective Influenc...
A Folksonomy of styles, aka: other stylists also said and Subjective Influenc...A Folksonomy of styles, aka: other stylists also said and Subjective Influenc...
A Folksonomy of styles, aka: other stylists also said and Subjective Influenc...Natalia Díaz Rodríguez
 
How to write systematic literature reviews (ideally, your first PhD paper)
How to write systematic literature reviews (ideally, your first PhD paper)How to write systematic literature reviews (ideally, your first PhD paper)
How to write systematic literature reviews (ideally, your first PhD paper)Natalia Díaz Rodríguez
 
An Ontology for Wearables Data Interoperability and Ambient Assisted Living A...
An Ontology for Wearables Data Interoperability and Ambient Assisted Living A...An Ontology for Wearables Data Interoperability and Ambient Assisted Living A...
An Ontology for Wearables Data Interoperability and Ambient Assisted Living A...Natalia Díaz Rodríguez
 
Smart Dosing: A mobile application for tracking the medication tray-filling a...
Smart Dosing: A mobile application for tracking the medication tray-filling a...Smart Dosing: A mobile application for tracking the medication tray-filling a...
Smart Dosing: A mobile application for tracking the medication tray-filling a...Natalia Díaz Rodríguez
 
UCAmI Presentation Dec.2013, Guanacaste, Costa Rica
UCAmI Presentation Dec.2013, Guanacaste, Costa RicaUCAmI Presentation Dec.2013, Guanacaste, Costa Rica
UCAmI Presentation Dec.2013, Guanacaste, Costa RicaNatalia Díaz Rodríguez
 
IFSA World Congress -NAFIPS 2013 Edmonton, Alberta. Natalia Díaz
IFSA World Congress -NAFIPS 2013 Edmonton, Alberta. Natalia DíazIFSA World Congress -NAFIPS 2013 Edmonton, Alberta. Natalia Díaz
IFSA World Congress -NAFIPS 2013 Edmonton, Alberta. Natalia DíazNatalia Díaz Rodríguez
 
Extending Semantic Web Tools for Improving Smart Spaces Interoperability and ...
Extending Semantic Web Tools for Improving Smart Spaces Interoperability and ...Extending Semantic Web Tools for Improving Smart Spaces Interoperability and ...
Extending Semantic Web Tools for Improving Smart Spaces Interoperability and ...Natalia Díaz Rodríguez
 
A Framework for Context-aware applications for Smart Spaces. ruSmart 2011 St ...
A Framework for Context-aware applications for Smart Spaces. ruSmart 2011 St ...A Framework for Context-aware applications for Smart Spaces. ruSmart 2011 St ...
A Framework for Context-aware applications for Smart Spaces. ruSmart 2011 St ...Natalia Díaz Rodríguez
 

Mehr von Natalia Díaz Rodríguez (14)

State representation learning for control: an overview
State representation learning for control: an overview State representation learning for control: an overview
State representation learning for control: an overview
 
Continual learning and robotics
Continual learning and robotics   Continual learning and robotics
Continual learning and robotics
 
PAISS (PRAIRIE AI Summer School) Digest July 2018
PAISS (PRAIRIE AI Summer School) Digest July 2018 PAISS (PRAIRIE AI Summer School) Digest July 2018
PAISS (PRAIRIE AI Summer School) Digest July 2018
 
State Representation Learning for control: an overview
State Representation Learning for control: an overviewState Representation Learning for control: an overview
State Representation Learning for control: an overview
 
MILA DL & RL summer school highlights
MILA DL & RL summer school highlights MILA DL & RL summer school highlights
MILA DL & RL summer school highlights
 
A Folksonomy of styles, aka: other stylists also said and Subjective Influenc...
A Folksonomy of styles, aka: other stylists also said and Subjective Influenc...A Folksonomy of styles, aka: other stylists also said and Subjective Influenc...
A Folksonomy of styles, aka: other stylists also said and Subjective Influenc...
 
How to write systematic literature reviews (ideally, your first PhD paper)
How to write systematic literature reviews (ideally, your first PhD paper)How to write systematic literature reviews (ideally, your first PhD paper)
How to write systematic literature reviews (ideally, your first PhD paper)
 
An Ontology for Wearables Data Interoperability and Ambient Assisted Living A...
An Ontology for Wearables Data Interoperability and Ambient Assisted Living A...An Ontology for Wearables Data Interoperability and Ambient Assisted Living A...
An Ontology for Wearables Data Interoperability and Ambient Assisted Living A...
 
Guest lecture @Stanford Aug 4th 2015
Guest lecture @Stanford Aug 4th 2015 Guest lecture @Stanford Aug 4th 2015
Guest lecture @Stanford Aug 4th 2015
 
Smart Dosing: A mobile application for tracking the medication tray-filling a...
Smart Dosing: A mobile application for tracking the medication tray-filling a...Smart Dosing: A mobile application for tracking the medication tray-filling a...
Smart Dosing: A mobile application for tracking the medication tray-filling a...
 
UCAmI Presentation Dec.2013, Guanacaste, Costa Rica
UCAmI Presentation Dec.2013, Guanacaste, Costa RicaUCAmI Presentation Dec.2013, Guanacaste, Costa Rica
UCAmI Presentation Dec.2013, Guanacaste, Costa Rica
 
IFSA World Congress -NAFIPS 2013 Edmonton, Alberta. Natalia Díaz
IFSA World Congress -NAFIPS 2013 Edmonton, Alberta. Natalia DíazIFSA World Congress -NAFIPS 2013 Edmonton, Alberta. Natalia Díaz
IFSA World Congress -NAFIPS 2013 Edmonton, Alberta. Natalia Díaz
 
Extending Semantic Web Tools for Improving Smart Spaces Interoperability and ...
Extending Semantic Web Tools for Improving Smart Spaces Interoperability and ...Extending Semantic Web Tools for Improving Smart Spaces Interoperability and ...
Extending Semantic Web Tools for Improving Smart Spaces Interoperability and ...
 
A Framework for Context-aware applications for Smart Spaces. ruSmart 2011 St ...
A Framework for Context-aware applications for Smart Spaces. ruSmart 2011 St ...A Framework for Context-aware applications for Smart Spaces. ruSmart 2011 St ...
A Framework for Context-aware applications for Smart Spaces. ruSmart 2011 St ...
 

Kürzlich hochgeladen

BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...amitlee9823
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...amitlee9823
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 

Kürzlich hochgeladen (20)

Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 

Semantic security framework and context-aware role-based access control ontology for Smart Spaces

  • 1. 30.6.2016 1 University of Turku, Finland Åbo Akademi University, Finland Semantic security framework and context- aware role-based access control ontology for Smart Spaces Shohreh Hosseinzadeh, Natalia Díaz-Rodríguez, Seppo Virtanen, Johan Lilius Semantic Big Data Workshop, ACM SIGMOD 2016 Conference 2016, San Francisco, California, July 1st 2016
  • 2. Introduction • Smart Spaces • Security, Privacy and Context Awareness in Smart Spaces 30.6.2016 2
  • 3. Contribution Granular triple-level mechanisms for security and privacy in Smart Spaces 1. Security framework for Smart-M3 platform [13] 2. Context-aware role-based access control scheme 30.6.2016 3
  • 4. Smart-M3 • Smart-M3 is a functional platform that provides a cross domain search extent for triple based information. Smart- M3 enables smart cross domain applications that rely on information level interoperability. • Multi Device, Multi Platform, Multi Part • https://sourceforge.net/projects/smart-m3/ 30.6.2016 4
  • 5. 1) Security framework architecture 30.6.2016 5
  • 6. Security aspects supported: Authentication,Authorization and Access control Different steps: (1) Access request from user (2) Authentication engine assures authenticity (3) If positive, request forwarded to Access Control Engine (4) Execute access control rules: check if requester has rights to perform the requested action (5) If positive the request is forwarded to the repository and access log (6) The access log keeps record of the recent accesses. (7) The result (accessible triple) is retrieved from the repository (8) The result is sent to the user 30.6.2016 6
  • 7. 2) Context Aware Role Based Access Control (CARBAC) ontology 30.6.2016 7
  • 8. Comparison of access control ontologiesand their Smart Space domains 30.6.2016 8
  • 9. Access Control Policies • Expressed via rules • At run-time, rules are executed, and decisions made on permission/prohibition of performing an action. • For writing the access control rules, we used C Language Integrated Production System (CLIPS) v6.24 • 2 kinds of Access Control rules, defined by: a) Admin b) User for privacy protection purposes. 30.6.2016 9
  • 10. Example 1: Rules defined by the admin (triple (Jack, hasRole, Doctor)) (triple (Maria, hasRole, Patient)) (triple (Maria, hasMedicalHistory, ?h))) è (assert (triple (Jack, roleHasReadPermissionOverData, ?h))) (assert (triple (Jack, roleHasWritePermissionOverData, ?h))) (assert (triple (Jack, roleHasUpdatePermissionOverData, ?h))) (assert (triple (Jack, roleHasDeletePermissionOverData, ?h))) 30.6.2016 10
  • 11. Example 2: Rules defined by the user (highest priority) (assert (triple (Jack, userHasReadPermissionOverData, ?h))) (assert (triple (Jack, userHasUpdatePermissioOverData, ?h))) (assert (triple (Jack, userHasDeletePermissionOverData, ?h))) (assert (triple (Jack, userHasWritePermissionOverData, ?h))) (assert (triple (Jack, userHasUpdateProhibitionOverData, ?h))) (assert (triple (Jack, userHasDeleteProhibitionOverData, ?h))) (assert (triple (Jack, userHasWriteProhibitionOverData, ?h))) è (assert (triple (Jack, roleHasReadPermissionOverData, ?h))) 30.6.2016 11
  • 12. Example 3: Context aware access control rules Doctor: restricted to only read the medical history of the patients outside the hospital, but cannot update/delete/write: (triple (Jack, hasRole, Doctor)) (triple (Maria, hasRole, Patient)) (triple (Maria, hasMedicalHistory, ?h))) (triple (LocationJack, hasValue, TrainStation)) è (assert (triple (Jack, roleHasReadPermissionOverData, ?h))) (assert (triple (Jack, roleHasWriteProhibitionOverData, ?h))) (assert (triple (Jack, roleHasUpdateProhibitionOverData, ?h))) (assert (triple (Jack, roleHasDeleteProhibitionOverData, ?h))) 30.6.2016 12
  • 14. Avg exec. time for access control requests to the semantic information broker (M3 SIB) 30.6.2016 14 Smart Space Application Protocol (SSAP) operations: • Read • Write • Delete • Update a triple
  • 15. Conclusion We proposed • Flexible security framework • fine and coarse grained information level • Smart Space security and privacy ontology available: https://github.com/NataliaDiaz/AccessControlOntology • Access control scheme for Smart-M3 based spaces • http://sourceforge.net/projects/smart-m3/ 30.6.2016 15
  • 16. Future Work • Security alert implementationwith M3 pub/sub mechanism, • Large scale deployment • Micro-managingof personal data • Data as a currency 30.6.2016 16
  • 17. Thank you for your attention! Shohreh Hosseinzadeh shohos@utu.fi University of Turku, Finland Natalia Díaz-Rodríguez ndiaz@decsai.ugr.es https://about.me/NataliaDiazRodriguez University of Granada, Spain and Åbo Akademi University, Finland (currently data scientist intern at Stitch Fix) 30.6.2016 17
  • 18. References [1] OWL for Services: http://www.ai.sri.com/daml/services/owls/security.html. [2] F. Abel, J. L. De Coi, N. Henze, A. W. Koesling, D. Krause, and D. Olmedilla. Enabling advanced and context-dependent access control in RDF stores. volume 4825 of Lecture Notes in Computer Science, pages 1-14. Springer, 2007. [3] S. Al-Rabiaah and J. Al-Muhtadi. ConSec: Context-Aware Security Frameworkfor Smart Spaces. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Sixth InternationalConference on, pages580-584, Palermo, 2012. IEEE. [4] C. A. Ardagna, S. De Capitani di Vimercati, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, and M. Verdicchio. Enabling privacy- preserving credential-based access control with XACML and SAML. In Computer and Information Technology (CIT), 2010 IEEE 10th InternationalConference on, pages 1090-1095, Bradford, United Kingdom, 2010. [5] M. Baldauf, S. Dustdar, and F. Rosenberg. Asurvey on context-aware systems. InternationalJournal of Ad Hoc and Ubiquitous Computing, 2(4):263-277, 2007. [6] T. Berners-Lee, J. Hendler, O. Lassila, et al. The semantic web. Scientific American, 284(5):28-37, 2001. [7] H. Chen, T. Finin, and A. Joshi. An ontology for context-aware pervasive computing environments. The Knowledge Engineering Review, 18(03):197-207, 2003. [8] N. D íaz Rodríguez, M. Cuellar, J. Lilius, and M. Delgado Calvo-Flores. Asurvey on ontologies for human behavior recognition. ACM Computing Surveys (CSUR), 46(4):43, 2014. [9] N. Díaz-Rodríguez, R. Wikstr om, J. Lilius, M. P. Cuellar, and M. D. C. Flores. Understanding Movement and Interaction: An Ontology for Kinect-Based 3D Depth Sensors. In Ubiquitous Computing and Ambient Intelligence. Context Awareness and Context-Driven Interaction, pages 254-261. Springer InternationalPublishing, 2013. [10] T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham. Rowlbac: Representing role based access control in owl. In Proceedings of the 13th ACM Symposium on Access ControlModels and Technologies, SACMAT '08, pages 73-82, New York, NY, USA, 2008. ACM. [11] S. Haibo and H. Fan. Acontext-aware role-based access control model for web services. In IEEE ICEBE, pages220-223, 2005. [12] J. Hebeler, M. Fisher, R. Blace, and A. Perez-Lopez. Semantic web programming. Wiley, J. & Sons, Indianapolis, Indiana, 2011. 30.6.2016 18
  • 19. [13] A. Kashevnik and N. Teslya. Context-Aware Access ControlModel for Smart-M3 Platform. 2013. [14] A. Khan and I. McKillop. Privacy-centric access control for distributed heterogeneousmedical information systems. In Healthcare Informatics (ICHI), 2013 IEEE InternationalConference on, pages297-306, Philadelphia, PA, 2013. IEEE. [15] D. G. Korzun, S. I. Balandin, and A. V. Gurtov. Deployment of Smart Spaces in Internet of Things: Overview of the Design Challenges. In Lecture Notes in Computer Science 8121: 48-59, 2013. [16] A. Mhamed, M. Zerkouk, A. Husseini, B. Messabih, and B. Hassan. Towardsa context aware modeling of trust and access control based on the user behavior and capabilities. In J. Biswas, H. Kobayashi, L. Wong, B. Abdulrazak, and M. Mokhtari, editors, Inclusive Society: Health and Wellbeing in the Community, and Care at Home, volume 7910 of Lecture Notes in Computer Science, pages 69-76. Springer Berlin Heidelberg, 2013. [17] S. P. Miller, B. C. Neuman, J. I. Schiller, and S. J. H. Kerberosauthentication and authorization system. In Project Athena Technical Plan, Cambridge, USA, 1987. Massachusetts Institute of Technology (MIT). [18] M. Mohsin Saleemi, N. Daz Rodrguez, J. Lilius, and I. Porres. AFrameworkfor Context-Aware Applications for Smart Spaces. In Applications and the Internet (SAINT), 2011 IEEE/IPSJ 11th InternationalSymposium on, Munich, Bavaria. [19] M. Peleg, D. Beimel, D. Dori, and Y. Denekamp. Situation-based access control: Privacy management via modeling of patient data access scenarios. Journal of Biomedical Informatics, 41(6):1028-1040, 2008. [20] O. Sacco and A. Passant. Aprivacy preference ontology for linked data. In Linked Data on the Web Workshop at the World Wide Web Conference, 2011. [21] J. Suomalainen. Flexible security deployment in smart spaces. In Lecture Notes in Computer Science, volume 7096, pages34-43. Springer, 2012. [22] A. Toninelli, R. Montanari, L. Kagal, and O. Lassila. Asemantic context-aware access control frameworkfor secure collaborations in pervasive computing environments. In I. Cruz, S. Decker, D. Allemang, C. Preist, D. Schwabe, P. Mika, M. Uschold, and L. Aroyo, editors, The Semantic Web - ISWC 2006, volume 4273 of Lecture Notesin Computer Science, pages473-486. Springer Berlin Heidelberg, 2006. [23] A. Toninelli, R. Montanari, L. Kagal, and O. Lassila. Proteus: A semantic context-aware adaptive policy model. In Policies for Distributed Systems and Networks. POLICY '07. Eighth IEEE International Workshop on, pages 129{140, Bologna, Italy, 2007. [24] C. D. Wang, T. Li, and L. C. Feng. Context-aware environment-role-based access controlmodel for web services. In Multimedia and Ubiquitous Engineering. InternationalConference on, pages 288-293, 2008. 30.6.2016 19