Loading...
Search for: semantic-technologies
0.011 seconds

    A Semantic-Aware Authorization Model Based on Deontic Logic

    , Ph.D. Dissertation Sharif University of Technology Amini, Morteza (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    Semantic technology provides an abstraction layer above existing computational environments, especially the Web, to give information a well-defined meaning. Moving toward semantic-aware environments imposes new security requirements. One of the most important requirement is the authorization and security policy inference based on the existing semantic relationships in the abstract (conceptual) layer. Most of the authorization models proposed for these environments so far are incomplete and their inference rules are not guaranteed to be consistent, sound, and complete. To have a sound and complete system for policy specification and inference, in this thesis, a family of modal logics, called... 

    Failure recovery of composite semantic web services using subgraph replacement

    , Article International Conference on Computer and Communication Engineering 2008, ICCCE08: Global Links for Human Development, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 489-493 ; 9781424416929 (ISBN) Saboohi, H ; Amini, A ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    Web services foster functionality of current web to service oriented architecture. Nascent semantic web is capable of automating activities by annotating shared ontological semantics to documents and services. Although, a zillion web services with diversity have been made since the inception of its diffusion, it is not a panacea for software development and it is still in its infancy. A middle agent (broker) simplifies the interaction of service providers and service requester, especially in the case that an atomic web service cannot fulfill user's need. The broker composes a desired value-added service and orchestrates the execution of bundled sub-processes. It is inevitable that several... 

    A temporal semantic-based access control model

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 559-568 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Noorollahi Ravari, A ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    With the advent of semantic technology, access control cannot be done in a safe way unless the access decision takes into account the semantic relationships between entities in a semantic-aware environment. SBAC model considers this issue in the decision making process. However, time plays a crucial role in new computing environments which is not supported in this model. In this paper we introduce temporal semantic based access control model (TSBAC), as an extension of SBAC model, which enhances the specification of user-defined authorization rules by constraining time interval and temporal expression over users' history of accesses. A formal semantics for temporal authorizations is provided... 

    A semantic aware access control model with real time constraints on history of accesses

    , Article Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2008, 20 October 2008 through 22 October 2008, Wisla ; Volume 3 , 2008 , Pages 827-836 ; 9788360810149 (ISBN); 9788360810149 (ISBN) Noorollahi Ravari, A ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    With the advent of semantic technology, access control cannot be done in a safe way unless the access decision takes into account the semantic relationships among the entities in a semantic-aware environment. SBAC model considers this issue in its decision making process. However, time plays a crucial role in new computing environments which is not supported in the model. In this paper we introduce the Temporal Semantic Based Access Control model (TSBAC), as an extension of SBAC, which enhances the specification of user-defined authorization rules by constraining time interval and temporal expression over users' history of accesses. A formal semantics for temporal authorizations is provided... 

    A history based semantic aware access control model using logical time

    , Article Proceedings of 11th International Conference on Computer and Information Technology, ICCIT 2008, 25 December 2008 through 27 December 2008, Khulna ; 2008 , Pages 43-50 ; 9781424421367 (ISBN) Noorollahi Ravari, A ; Amini, M ; Jalili, R ; Jafarian, J. H ; Sharif University of Technology
    2008
    Abstract
    With the advent of semantic technology' access control cannot be done in a safe way unless the access decision takes into account the semantic relationships among the entities in a semantic-aware environment. The SBAC model (Semantic Based Access Control model) considers this issue in its decision making process. However' time plays a crucial role in new computing environments'which is not supported in SBAC. In this paper' we propose the Temporal Semantic Based Access Control (TSBAC) model' as an extension of SBAC' which enhances the specification of user-defined authorization rules by constraining time interval and temporal expression over users' history of accesses. TSBAC uses logical... 

    Semantic log based replication model for optimizing heterogeneous DBMS interaction

    , Article 2009 1st International Conference on Advances in Databases, Knowledge, and Data Applications, DBKDA 2009, Gosier, 1 March 2009 through 6 March 2009 ; 2009 , Pages 138-142 ; 9780769535500 (ISBN) Farahmand Nejad, A ; Kharazmi, S ; Bayati, S ; Golmohammadi, S. K ; Abolhassani, H ; IARIA ; Sharif University of Technology
    2009
    Abstract
    The growth of database application usage requires DataBase Management Systems (DBMS) that are accessible, reliable, and dependable. One approach to handle these requirements is replication mechanism. Replication mechanism can be divided into various categories. Some related works consider two categories for replication mechanisms: heterogeneous and homogenous however majority of them classify them in three groups: physical, trigger-based and log based schema. Log-based replication mechanisms are the most widely used category among DBMS vendors. Adapting such approach for heterogeneous systems is a complex task, because of lack of log understanding in the other end. Semantic technologies... 

    A semantic-based access control mechanism using semantic technologies

    , Article SIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks, 6 October 2009 through 10 October 2009, Famagusta ; 2009 , Pages 258-267 ; 9781605584126 (ISBN) Ehsan, M. A ; Amini, M ; Jalili, R ; Taganrog Inst. Technol. South. Fed. Univ.; Russian Foundation for Basic Research; Int. Counc. Electron. Commer. Consult. (EC-Counc.); Kordon Ltd.; World Scientific Publishing (UK) Ltd ; Sharif University of Technology
    2009
    Abstract
    In order to overcome the shortcomings of the recent frameworks and mechanisms for semantic-based access control, this paper presents a semantic-based, context-aware, and multi-domain enabled framework implementing a semantic-based access control mechanism for Semantic Web. The access control framework is based on the MA(DL)2 model, which takes the semantic relationships among different entities into account. The framework handles the Semantic Web context by classifying and representing it through an ontology. Considering the MA(DL)2 model, the framework assumes SemanticWeb having some overlapped domains, which each contains an authority and a security agent. As a domain authority... 

    Multi-level authorisation model and framework for distributed semantic-aware environments

    , Article IET Information Security ; Volume 4, Issue 4 , 2010 , Pages 301-321 ; 17518709 (ISSN) Amini, M ; Jalili, R ; Sharif University of Technology
    Abstract
    Semantic technology is widely used in distributed computational environments to increase interoperability and machine readability of information through giving semantics to the underlying information and resources. Semantic-awareness, distribution and interoperability of new generation of distributed systems demand an authorisation model and framework that satisfies essential authorisation requirements of such environments. In this study, the authors propose an authorisation model and framework based on multi-security-domain architecture for distributed semantic-aware environments. The proposed framework is founded based on the MA(DL)2 logic, which enables policy specification and inference... 

    Ontology-based modelling and information extracting of physical entities in semantic sensor networks

    , Article IETE Journal of Research ; 2018 , Pages 1-17 ; 03772063 (ISSN) Ahmadinia, M ; Movaghar, A ; Rahmani, A. M ; Sharif University of Technology
    Taylor and Francis Ltd  2018
    Abstract
    The semantic sensor web adds semantic web technologies such as ontology to sensor network. Semantic technologies can help the better management of query and data aggregation of the sensor network. So far, several ontologies have been presented for the semantic presentation of sensor networks concepts. However, applications and end-users require physical entities information rather than technical details and information regarding sensors and sensor network. This paper semantically models physical entities whose information is collected by sensor networks at a level higher than sensors and their observations. Hence, first, an ontology is presented for semantically modelling physical entities... 

    Ontology-Based modelling and information extracting of physical entities in semantic sensor networks

    , Article IETE Journal of Research ; Volume 65, Issue 4 , 2019 , Pages 540-556 ; 03772063 (ISSN) Ahmadinia, M ; Movaghar, A ; Rahmani, A. M ; Sharif University of Technology
    Taylor and Francis Ltd  2019
    Abstract
    The semantic sensor web adds semantic web technologies such as ontology to sensor network. Semantic technologies can help the better management of query and data aggregation of the sensor network. So far, several ontologies have been presented for the semantic presentation of sensor networks concepts. However, applications and end-users require physical entities information rather than technical details and information regarding sensors and sensor network. This paper semantically models physical entities whose information is collected by sensor networks at a level higher than sensors and their observations. Hence, first, an ontology is presented for semantically modelling physical entities...