Skip to main content

Security and Privacy for Web Databases and Services

  • Conference paper
Advances in Database Technology - EDBT 2004 (EDBT 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2992))

Included in the following conference series:

Abstract

A semantic web can be thought of as a web that is highly intelligent and sophisticated and one needs little or no human intervention to carry out tasks such as scheduling appointments, coordinating activities, searching for complex documents as well as integrating disparate databases and information systems. While much progress has been made toward developing such an intelligent web, there is still a lot to be done. For example, there is little work on security and privacy for the semantic web. However, before we examine security for the semantic web we need to ensure that its key components, such as web databases and services, are secure. This paper will mainly focus on security and privacy issues for web databases and services. Finally, some directions toward developing a secure semantic web will be provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Agrawal, R., Srikant, R.: Privacy-preserving Data Mining. In: Proceedings of the ACM SIGMOD Conference (2000), Dallas, TX, USA (2000)

    Google Scholar 

  2. Berners Lee, T., et al.: The Semantic Web. Scientific American (2001)

    Google Scholar 

  3. Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B., Gupta, A.: Selective and Authentic Third-party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering (to appear)

    Google Scholar 

  4. Bertino, E., Carminati, B., Ferrari, E.: A Flexible Authentication Method for UDDI Registries. In: Proceedings of the ICWS Conference, Las Vegas, Nevada, USA (2003)

    Google Scholar 

  5. Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security 5(3), 290–331 (2002)

    Article  Google Scholar 

  6. Castano, S., Fugini, M.G., Martella, G., Samarati, P.: Database Security. Addison-Wesley, Reading (1995)

    MATH  Google Scholar 

  7. Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining Privacy for Data Mining. In: Proceedings of the Next Generation Data Mining Workshop (2002), Baltimore, MD, USA (2002)

    Google Scholar 

  8. Gehrke, J.: Research Problems in Data Stream Processing and Privacy-Preserving Data Mining. In: Proceedings of the Next Generation Data Mining Workshop (2002), Baltimore, MD, USA (2002)

    Google Scholar 

  9. IBM Corporation: Security in a Web Services World: A Proposed Architecture and Roadmap, White Paper, Version 1.0 (2002), Available at: http://www-106.ibm.com/developerworks/library/ws-secroad/

  10. Stallings, W.: Network Security Essentials: Applications and Standards. Prentice-Hall, Englewood Cliffs (2000)

    Google Scholar 

  11. Pollmann, C.G.: The XML Security Page, Available at: http://www.nue.et-inf.uni-siegen.de/~geuer-pollmann/xml_security.html

  12. Thuraisingham, B.: Web Data Mining: Technologies and Their Applications to Business Intelligence and Counter-terrorism. CRC Press, Boca Raton (2003)

    Book  Google Scholar 

  13. Thuraisingham, B.: Privacy Constraint Processing in a Privacy Enhanced Database System. Data and Knowledge Engineering (to appear)

    Google Scholar 

  14. Thuraisingham, B., Ford, W.: Security Constraint Processing in a Distributed Database Management System. IEEE Transactions on Knowledge and Data Engineering (1995)

    Google Scholar 

  15. World Wide Web Consortium: http://www.w3c.org

  16. Universal Description, Discovery and Integration (UDDI): UDDI Version 3.0, UDDI Spec Technical Committee Specification, July 19 (2002), Available at: http://uddi.org/pubs/uddi-v3.00-published-20020719.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ferrari, E., Thuraisingham, B. (2004). Security and Privacy for Web Databases and Services. In: Bertino, E., et al. Advances in Database Technology - EDBT 2004. EDBT 2004. Lecture Notes in Computer Science, vol 2992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24741-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24741-8_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21200-3

  • Online ISBN: 978-3-540-24741-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics