Abstract
A semantic web can be thought of as a web that is highly intelligent and sophisticated and one needs little or no human intervention to carry out tasks such as scheduling appointments, coordinating activities, searching for complex documents as well as integrating disparate databases and information systems. While much progress has been made toward developing such an intelligent web, there is still a lot to be done. For example, there is little work on security and privacy for the semantic web. However, before we examine security for the semantic web we need to ensure that its key components, such as web databases and services, are secure. This paper will mainly focus on security and privacy issues for web databases and services. Finally, some directions toward developing a secure semantic web will be provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agrawal, R., Srikant, R.: Privacy-preserving Data Mining. In: Proceedings of the ACM SIGMOD Conference (2000), Dallas, TX, USA (2000)
Berners Lee, T., et al.: The Semantic Web. Scientific American (2001)
Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B., Gupta, A.: Selective and Authentic Third-party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering (to appear)
Bertino, E., Carminati, B., Ferrari, E.: A Flexible Authentication Method for UDDI Registries. In: Proceedings of the ICWS Conference, Las Vegas, Nevada, USA (2003)
Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security 5(3), 290–331 (2002)
Castano, S., Fugini, M.G., Martella, G., Samarati, P.: Database Security. Addison-Wesley, Reading (1995)
Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining Privacy for Data Mining. In: Proceedings of the Next Generation Data Mining Workshop (2002), Baltimore, MD, USA (2002)
Gehrke, J.: Research Problems in Data Stream Processing and Privacy-Preserving Data Mining. In: Proceedings of the Next Generation Data Mining Workshop (2002), Baltimore, MD, USA (2002)
IBM Corporation: Security in a Web Services World: A Proposed Architecture and Roadmap, White Paper, Version 1.0 (2002), Available at: http://www-106.ibm.com/developerworks/library/ws-secroad/
Stallings, W.: Network Security Essentials: Applications and Standards. Prentice-Hall, Englewood Cliffs (2000)
Pollmann, C.G.: The XML Security Page, Available at: http://www.nue.et-inf.uni-siegen.de/~geuer-pollmann/xml_security.html
Thuraisingham, B.: Web Data Mining: Technologies and Their Applications to Business Intelligence and Counter-terrorism. CRC Press, Boca Raton (2003)
Thuraisingham, B.: Privacy Constraint Processing in a Privacy Enhanced Database System. Data and Knowledge Engineering (to appear)
Thuraisingham, B., Ford, W.: Security Constraint Processing in a Distributed Database Management System. IEEE Transactions on Knowledge and Data Engineering (1995)
World Wide Web Consortium: http://www.w3c.org
Universal Description, Discovery and Integration (UDDI): UDDI Version 3.0, UDDI Spec Technical Committee Specification, July 19 (2002), Available at: http://uddi.org/pubs/uddi-v3.00-published-20020719.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ferrari, E., Thuraisingham, B. (2004). Security and Privacy for Web Databases and Services. In: Bertino, E., et al. Advances in Database Technology - EDBT 2004. EDBT 2004. Lecture Notes in Computer Science, vol 2992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24741-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-24741-8_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21200-3
Online ISBN: 978-3-540-24741-8
eBook Packages: Springer Book Archive