Skip to main content

SemanticLIFE Collaboration: Security Requirements and Solutions – Security Aspects of Semantic Knowledge Management

  • Conference paper
Practical Aspects of Knowledge Management (PAKM 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3336))

Included in the following conference series:

Abstract

SemanticLIFE is a project that stores all information an individual works with in a semantically enriched form. Ontologies are used to improve the search process and to express queries in the way humans think – e.g. “Find the draft I’ve been working on when traveling home from the conference in Chicago”. When people cooperate on projects they obviously need to share information without spending time on entering keywords and thinking about who should be able to access which data; the issue is to correctly configure access controls so that only required information is shared with the appropriate people. Using a combination of the Chinese Wall and the Bell LaPadula model we show how access controls can be configured correctly with little effort by the users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahmed, M., Hoang, H.H., Karim, M.S., Khusro, S., Lanzenberger, M., Latif, K., Michlmayr, E., Mustofa, K., Nguyen, H.T., Rauber, A., Schatten, A., Tho, M.N., Tjoa, A.M.: SemanticLIFE’ - A Framework for Managing Information of A Human Lifetime. In: The Sixth International Conference Information Integration and Web-based Applications and Services, Jakarta-Indonesia, September 27-29 (2004)

    Google Scholar 

  2. Adar, E., Karger, D., Stein, L.A.: Haystack: Per-user information environments. In: Conference on Information and Knowledge Management (1999)

    Google Scholar 

  3. Bishop, M.: Computer Security: Art and Science. Addison-Wesley-Longman (2002)

    Google Scholar 

  4. Brewer, D., Nash, M.: The Chinese Wall Security Policy. In: Proc. Of the 1989 IEEE Symposium on Security and Privacy, May, pp. 206–214 (1989)

    Google Scholar 

  5. Dave, B., Steve, C., Ian, D., Dave, R.: The ePerson snippet manager: a semantic web application, Tech. report, HP Laboratories Bristol, HPL-2002-328

    Google Scholar 

  6. Eric, F., David, G.: Lifestreams: A storage model for personal data. ACM SIGMOD Record, Bulletin 25(1), 80–86 (1996)

    Article  Google Scholar 

  7. Gemmel, J., Bell, G., Lueder, R.: Mylifebits: Living with a lifetime store. In: ATR Workshop on Ubiquitous Experience Media, September 9-10 (2003)

    Google Scholar 

  8. Gemmel, J., Bell, G., Lueder, R., Drucker, S., Wong, C.: Mylifebits: Fulfilling the Memex vision. In: ACM Multimedia 2002, December 2002, pp. 235–238 (2002)

    Google Scholar 

  9. Huynh, D., Karger, D., Quan, D.: Haystack: A platform for creating, organizing and visualizing information using RDF. In: Semantic Web Workshop (2002)

    Google Scholar 

  10. Jennifer, H., Abigail, S.: Gathering and sharing web-based information: Implications for.ePerson. concepts, Tech. report, HP Laboratories Bristol, HPL-2003-19

    Google Scholar 

  11. Nejdl, W., Wolf, B., Qu, C., Decker, S., Sintek, M., Naeve, A., Nilsson, M., Palmer, M., Risch, T.: Edutella: A P2P networking infrastructure based on RDF. In: WWW, May 2002. ACM, New York (2002)

    Google Scholar 

  12. Povey, D.: Enforcing Well-formed and Partially-formed Transactions for Unix. In: Proceedings of the 8th USENIX Security Symposium, Washington, D.C, August 23-36, pp. 47–62 (1999)

    Google Scholar 

  13. Quan, D., Karger, D.: How to make a semantic web browser. In: Proceedings of the 13th Conference on World Wide Web, May 17-20 (2004)

    Google Scholar 

  14. Sheth, A., Avant, D.: Semantic visualization: Interfaces for exploring and exploiting ontology, knowledgebases, heterogeneous content and complex relationships. In: NASA Virtual Iron Bird Workshop, CA (2003)

    Google Scholar 

  15. Sheth, A., Ramakrishnan, C.: Semantic (web) technology in action: Ontology driven information systems for search, integration and analysis. IEEE Data Engineering Bulletin, Special issue on Making the Semantic Web Real (2003)

    Google Scholar 

  16. Weippl, E., Ibrahim, I.K., Winiwarter, W.: Content-based management of document access control. In: The Proceedings of the 14th International Conference on Applications of Prolog, November 2001, pp. 78–86. Prolog Association of Japan (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weippl, E.R., Schatten, A., Karim, S., Tjoa, A.M. (2004). SemanticLIFE Collaboration: Security Requirements and Solutions – Security Aspects of Semantic Knowledge Management. In: Karagiannis, D., Reimer, U. (eds) Practical Aspects of Knowledge Management. PAKM 2004. Lecture Notes in Computer Science(), vol 3336. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30545-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30545-3_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24088-4

  • Online ISBN: 978-3-540-30545-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics