Enforcing Privacy on the Semantic Web

Enforcing Privacy on the Semantic Web

Abdelmounaam Rezgui (Virginia Tech, USA), Athman Rouguettaya (Virginia Tech, USA) and Zaki Malik (Virginia Tech, USA)
DOI: 10.4018/978-1-59140-186-5.ch005
OnDemand PDF Download:
$37.50

Abstract

Over the past few years there has been a huge influx of web accessible information. Information access and storage methods have grown considerably. Previously unknown or hard-to-get information is now readily available to us. The World Wide Web has played an important role in this information revolution. Often, sensitive information is exchanged among users, Web services, and software agents. This exchange of information has highlighted the problem of privacy. A large number of strategies employed to preserve people’s privacy require users to define their respective privacy requirements and make decisions about the disclosure of their information. Personal judgments are usually made based on the sensitivity of the information and the reputation of the party to which the information is to be disclosed. In the absence of a comprehensive privacy preserving mechanism, no guarantees about information disclosure can be made. The emerging Semantic Web is expected to make the challenge more acute in the sense that it would provide a whole infrastructure for the automation of information processing on the Web. On the privacy front, this means that privacy invasion would net more quality and sensitive personal information. In this chapter, we describe a reputation-based approach to automate privacy enforcement in a Semantic Web environment. We propose a reputation management system that monitors Web services and collects, evaluates, updates, and disseminates information related to their reputation for the purpose of privacy protection.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Maria Grazia Fugini, Carlo Bellettini
Chapter 1
Guido Bertoni, Jorge Guajardo, Christof Paar
In the last 20-30 years, the world of modern cryptography has been largely dominated by traditional systems such as the Data Encryption Standard and... Sample PDF
Architectures for Advanced Cryptographic Systems
$37.50
Chapter 2
Diana Berbecaru, Corrado Derenale, Antonio Lioy
The technical solutions and organizational procedures used to manage certificates are collectively named Public Key Infrastructure (PKI). The... Sample PDF
Digital Certificates and Public-Key Infrastructures
$37.50
Chapter 3
Gerald Maradan, Pierre Cotte, Thierry Fornas
Securing data is becoming of the utmost strategic importance in today’s digital environment. Open wide networks such as the Internet and... Sample PDF
Smart Card Applications and Systems: Market Trend and Impact on Other Technological Development
$37.50
Chapter 4
Duminda Wijesekera, Sushil Jajodia
Advances in application areas such as Internet-based transactions, cooperating coalitions, and workflow systems have brought new challenges to... Sample PDF
A Flexible Authorization Framework
$37.50
Chapter 5
Abdelmounaam Rezgui, Athman Rouguettaya, Zaki Malik
Over the past few years there has been a huge influx of web accessible information. Information access and storage methods have grown considerably.... Sample PDF
Enforcing Privacy on the Semantic Web
$37.50
Chapter 6
Secure Data Dissemination  (pages 198-229)
Elisa Berino, Barbara Carminati, Elena Ferrari
In this chapter, we present the main security issues related to the selective dissemination of information (SDI system). More precisely, after... Sample PDF
Secure Data Dissemination
$37.50
Chapter 7
Eduardo Fernandez-Medina, Sabrina De Capitani di Vimercati, Ernesto Damiani, Mario Piattini, Pierangela Samarati
Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the... Sample PDF
Multimedia Security and Digital Rights Management Technology
$37.50
Chapter 8
Ping Lin, K. Selçuk Candan
The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of... Sample PDF
Data and Application Secutiry for Distributed Application Hosting Services
$37.50
Chapter 9
Eduardo B. Fernandez, Michael Thomsen, Minjie H. Fernandez
Platforms for web services have been reduced to two basic approaches: Microsoft .NET and Sun ONE (J2EE). We compare here these two platforms with... Sample PDF
Comparing the Security Architectures of Sun ONE and Microsoft .NET
$37.50
About the Authors