To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
2014 IEEE JAVA NETWORK SECURITY PROJECT Authorization control for a semantic data repository through an inference policy engine
1. GLOBALSOFT TECHNOLOGIES
Authorization Control for a Semantic Data
Repository through an Inference Policy Engine
ABSTRACT:
Semantic models help in achieving semantic interoperability among sources of data and
applications. The necessity to efficiently manage these types of objects has increased the
number of specialized repositories, usually referred to as semantic databases. An increasing
number of project initiatives have been recorded that choose to formalize application
knowledge using ontologies and semantic data representation. Due to the various sensitivities
of data, suitable access control mechanisms pertaining to the semantic repository should be
put in place to ensure that only authorized users can obtain access to the information in its
entirety.In fact, deciding what can be made available to the user without revealing
confidential information is made even more difficult because the user may be able to apply
logic and reasoning to infer confidential information from the knowledge being provided. In
this paper, we design an authorization security model enforced on a semantic model’s entities
(concepts) and also propagate on their individuals in the OWL database through an inference
policy engine. We provide TBox access control for the construction of a TBox family and
propagate this based on the construction of concept taxonomies. We also provide ABox label-based
access control for facts in the domain knowledge and report experiments to evaluate
the effects of access control on reasoning and modularization.
EXISTING SYSTEM:
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
2. In this paper, we design an authorization security model enforced on a semantic model’s
entities (concepts) and also propagate on their individuals in the OWL database through an
inference policy engine. We provide TBox access control for the construction of a TBox
family and propagate this based on the construction of concept taxonomies. large amount of
data are available on the Internet, and managing it by means of traditional methods is
becoming very difficult. Novel tools and techniques are needed to effectively administer this
data, provide interoperability and warehousing between the numerous data supplies and
systems, and to obtain information from the databases and warehouses on the Internet.
.
PROPOSED SYSTEM:
We proposed a control model consisting of concept-level access that supports propagation
based on the relationships among concepts for the purpose of regulating the access to data by
individuals. Proposed policy languages similar to Rei based on Semantic Web languages like
RDF and DAML+OIL and developed a framework, Rein, based on Rei. Finin et al. proposed
the use of the OWL language as the formalization of the RBAC model. They provide two
ways to formalize an RBAC role, as a class or as an attribute. The proposed mechanism is
considered a highly structured multilayered authorization control for safeguarding semantic
data repositories, with mechanisms that fully support content-based access control, so that the
authorization requirements are established not only for concepts in TBox, but also for their
individuals in the ABox. we proposed a semantic reasoner authorization model conceived to
secure access to semantic repositories
CONCLUSION:
In this paper, we proposed a semantic reasoner authorization modelconceived to secure
access to semantic repositories. The model is able to restrict access to confidential knowledge
that is represented using ontologies and can regulate access to both the ontology’s concepts
and their individuals. Therefore, the model fully supports contentbasedaccess control. From a
functional perspective, the model consists of two main components: TBox access control for
the construction of the TBox family and ABox label-based access control for facts in the
domain knowledge. The model also supports a flexible mechanism for propagating
authorizations through a hierarchy concept tree.
3. SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
Processor - Pentium –IV
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
SOFTWARE CONFIGURATION:-
Operating System : Windows XP
Programming Language : JAVA
Java Version : JDK 1.6 & above.