Loading...
Search for: description-logic
0.006 seconds

    A Security Model based on Modal Description Logic for Semantic Web

    , M.Sc. Thesis Sharif University of Technology Faghihekhorasani, Fathiyeh (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    With the growth of semantic-aware environments, such as semantic web, new security requirements are imposed in access control procedures. An access control model for semantic web should take the semantic relationships (in three scopes of subject, object and action) into account in its access decisions. Considering the advantages of logic based models and description logic foundation of semantic web, we use the description logic as a basis to propose access control models in this environment. On the other hand, in some applications, such as e-banking environments, policy definition with the constraint(s) based on previous users’ accesses might be crucial. To consider this aspect, in this... 

    Description Logic and Its Application in Model Checking

    , M.Sc. Thesis Sharif University of Technology Sakhaee, Negar (Author) ; Ardeshir, Mohammad (Supervisor)
    Abstract
    Description logic is a family of knowledge representive languages which represents knowledge via propositional logic (first order logic) propositions and constructors and applies its services for reasoning and consistency checking. Nowadays description logic and its popular reasoner FaCT++ which applies tablue reasoning technique are widely used in applications such as semantic web and onthologies. Model checking is a technique for systems and models verification and to guarantee the accuracy of design. Given a model description and a specification formula, the model checker verifies the model against the specification and decides if the model satisfies the description or not. Main model... 

    Access Control in Semantic Social Network

    , M.Sc. Thesis Sharif University of Technology Alizadeh, Mahdi (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    Growth of tools that ease sharing information and resources in social networks can cause privacy issues for the users. Protecting user’s personal information against unauthorized access is a crucial task, and it is considered as a first step for preserving user’s privacy in such networks. Policies, access control rules, and the way rules are applied to online social networks are issues that are less investigated and most existing frameworks have used simple models. Growth of users joining social networks and significant volume of resources shared in these networks make such environments suitable for using semantic technology. Semantic technology is used for modeling various resources, users,... 

    A temporal description logic based access control model for expressing history constrained policies in semantic web

    , Article Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009, 20 July 2009 through 22 July 2009, London ; 2009 , Pages 142-149 ; 9780769537429 (ISBN) Faghih, F ; Amini, M ; Jalili, R ; Sharif University of Technology
    2009
    Abstract
    An access control model for Semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontologies) into account. Considering the benefits of logic-based models and the description logic foundation of Semantic Web, in this paper, we propose an access control model based on a temporal variant of description logics (TL-ALCF). This logical schema enables us to express history constrained policies to enrich the policy-base with dynamic properties based on previous accesses. The specification of each component of the model as well as the approach to define history... 

    Using description logics for network vulnerability analysis

    , Article International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06, Morne, 23 April 2006 through 29 April 2006 ; Volume 2006 , 2006 ; 0769525520 (ISBN); 9780769525525 (ISBN) Zakeri, R ; Jalili, R ; Abolhassani, H ; Shahriari, H. R ; Sharif University of Technology
    2006
    Abstract
    The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model which could be used to analyze TCP/IP networks against attacks.... 

    A Semantic-Aware Authorization Model Based on Deontic Logic

    , Ph.D. Dissertation Sharif University of Technology Amini, Morteza (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    Semantic technology provides an abstraction layer above existing computational environments, especially the Web, to give information a well-defined meaning. Moving toward semantic-aware environments imposes new security requirements. One of the most important requirement is the authorization and security policy inference based on the existing semantic relationships in the abstract (conceptual) layer. Most of the authorization models proposed for these environments so far are incomplete and their inference rules are not guaranteed to be consistent, sound, and complete. To have a sound and complete system for policy specification and inference, in this thesis, a family of modal logics, called... 

    Specification of history based constraints for access control in conceptual level

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 17 December 2010 through 19 December 2010, Gandhinagar ; Volume 6503 LNCS , 2010 , Pages 186-200 ; 03029743 (ISSN) ; 9783642177132 (ISBN) Faghih, F ; Amini, M ; Jalili, R ; Sharif University of Technology
    2010
    Abstract
    An access control model for Semantic Web should take the semantic relationships among the entities, defined in the abstract conceptual level (i.e., ontology level), into account. Authorization and policy specification based on a logical model let us infer implicit security policies from the explicit ones based on the defined semantic relationships in the domains of subjects, objects, and actions. In this paper, we propose a logic based access control model for specification and inference of history-constrained access policies in conceptual level of Semantic Web. The proposed model (named TDLBAC-2) enables authorities to state policy rules based on the history of users' accesses using a... 

    An approach for semantic web query approximation based on domain knowledge and user preferences

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 443-452 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Iranmanesh, Z ; Piri, R ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    One of the most important services in the Semantic Web is the Reasoning Service. According to the Semantic Web requirements, reasoning under time pressure or other restrictions is needed; and, reasoning which is not 'perfect' but instead 'good enough' for given tasks is acceptable. One of the approaches for the improvement of reasoning performance is approximation; of course, there is an effort for raising more precise approximations. One of the fields in which approximation seems to be useful is query. So far, all of the approximation strategies introduced for conjunctive queries just consider the query's structure. In this paper, a semantic approach for conjunctive query approximation... 

    Policy specification and enforcement in online social networks using MKNF+

    , Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012, 13 September 2012 through 14 September 2012 ; 2012 , Pages 48-53 ; 9781467323864 (ISBN) Alizadeh, M ; Javadi, S. A ; Amini, M ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    Emerging tools that ease sharing information in online social networks (OSNs) can cause various privacy issues for users. Access control is the main security mechanism in OSNs which is used to tackle such issues. In this paper, a prioritized ontology based access control model for protecting users' information in OSNs is proposed. In the proposed model, description logic (DL) is used for modeling social networks and MKNF+ rules are used for specification of users' access control policies. Using MKNF+, we can have nonmonotonic inference (i.e., closed-world reasoning) in the access control procedure. Conflict among access rules defined by a user in an OSN, is another problem, which is resolved... 

    Non-monotonocity in OrBAC through default and exception policy rules

    , Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012 ; 2012 , Pages 87-94 ; 9781467323864 (ISBN) Javadi, S. A ; Amini, M ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    Context-awareness is an essential requirement of modern access control models. Organization-Based Access Control (OrBAC) model is a powerful context-aware access control model defined by first-order logic. However, due to the monotonicity nature of the first-order logic, OrBAC suffers from the incapability of making decision based on incomplete context information as well as the definition of default and exception policy rules. This paper proposes augmenting non-monotonicity features to OrBAC using MKNF+ logic, which is a combination of Description Logic (DL) and Answer Set Programming (ASP). Along with the use of DL to define ontology for main entities and context information in OrBAC;...