SlideShare a Scribd company logo
1 of 3
GLOBALSOFT TECHNOLOGIES 
Authorization Control for a Semantic Data 
Repository through an Inference Policy Engine 
ABSTRACT: 
Semantic models help in achieving semantic interoperability among sources of data and 
applications. The necessity to efficiently manage these types of objects has increased the 
number of specialized repositories, usually referred to as semantic databases. An increasing 
number of project initiatives have been recorded that choose to formalize application 
knowledge using ontologies and semantic data representation. Due to the various sensitivities 
of data, suitable access control mechanisms pertaining to the semantic repository should be 
put in place to ensure that only authorized users can obtain access to the information in its 
entirety.In fact, deciding what can be made available to the user without revealing 
confidential information is made even more difficult because the user may be able to apply 
logic and reasoning to infer confidential information from the knowledge being provided. In 
this paper, we design an authorization security model enforced on a semantic model’s entities 
(concepts) and also propagate on their individuals in the OWL database through an inference 
policy engine. We provide TBox access control for the construction of a TBox family and 
propagate this based on the construction of concept taxonomies. We also provide ABox label-based 
access control for facts in the domain knowledge and report experiments to evaluate 
the effects of access control on reasoning and modularization. 
EXISTING SYSTEM: 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
In this paper, we design an authorization security model enforced on a semantic model’s 
entities (concepts) and also propagate on their individuals in the OWL database through an 
inference policy engine. We provide TBox access control for the construction of a TBox 
family and propagate this based on the construction of concept taxonomies. large amount of 
data are available on the Internet, and managing it by means of traditional methods is 
becoming very difficult. Novel tools and techniques are needed to effectively administer this 
data, provide interoperability and warehousing between the numerous data supplies and 
systems, and to obtain information from the databases and warehouses on the Internet. 
. 
PROPOSED SYSTEM: 
We proposed a control model consisting of concept-level access that supports propagation 
based on the relationships among concepts for the purpose of regulating the access to data by 
individuals. Proposed policy languages similar to Rei based on Semantic Web languages like 
RDF and DAML+OIL and developed a framework, Rein, based on Rei. Finin et al. proposed 
the use of the OWL language as the formalization of the RBAC model. They provide two 
ways to formalize an RBAC role, as a class or as an attribute. The proposed mechanism is 
considered a highly structured multilayered authorization control for safeguarding semantic 
data repositories, with mechanisms that fully support content-based access control, so that the 
authorization requirements are established not only for concepts in TBox, but also for their 
individuals in the ABox. we proposed a semantic reasoner authorization model conceived to 
secure access to semantic repositories 
CONCLUSION: 
In this paper, we proposed a semantic reasoner authorization modelconceived to secure 
access to semantic repositories. The model is able to restrict access to confidential knowledge 
that is represented using ontologies and can regulate access to both the ontology’s concepts 
and their individuals. Therefore, the model fully supports contentbasedaccess control. From a 
functional perspective, the model consists of two main components: TBox access control for 
the construction of the TBox family and ABox label-based access control for facts in the 
domain knowledge. The model also supports a flexible mechanism for propagating 
authorizations through a hierarchy concept tree.
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.

More Related Content

Viewers also liked

Problemas de razonamiento con una incognita
Problemas de razonamiento con una incognitaProblemas de razonamiento con una incognita
Problemas de razonamiento con una incognita
Sofía Escarcega
 
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
Lãng Quên
 
De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
 De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv... De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
Dr Lendy Spires
 
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣΚόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
OTS SA
 

Viewers also liked (12)

Problemas de razonamiento con una incognita
Problemas de razonamiento con una incognitaProblemas de razonamiento con una incognita
Problemas de razonamiento con una incognita
 
Amra
AmraAmra
Amra
 
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
Bang gia mcb_mccb_contactor_acb_hyundai_10-11-2012
 
Top 10 Signs of the Textpocalypse
Top 10 Signs of the TextpocalypseTop 10 Signs of the Textpocalypse
Top 10 Signs of the Textpocalypse
 
여행 TIP과 여행 "앱"
여행 TIP과  여행 "앱"여행 TIP과  여행 "앱"
여행 TIP과 여행 "앱"
 
Manka Restaurant in Machu Picchu
Manka Restaurant in Machu PicchuManka Restaurant in Machu Picchu
Manka Restaurant in Machu Picchu
 
Museo Cristobal Balenciaga, Getaria (GUIPUZCOA)
Museo Cristobal Balenciaga, Getaria (GUIPUZCOA)Museo Cristobal Balenciaga, Getaria (GUIPUZCOA)
Museo Cristobal Balenciaga, Getaria (GUIPUZCOA)
 
Mirada tactil 1
Mirada tactil 1Mirada tactil 1
Mirada tactil 1
 
Ferrara 02 maggio 2013 Modulo 1 Pianificazione
Ferrara 02 maggio 2013  Modulo 1 PianificazioneFerrara 02 maggio 2013  Modulo 1 Pianificazione
Ferrara 02 maggio 2013 Modulo 1 Pianificazione
 
De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
 De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv... De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
De-Fragmenting Africa Deepening Regional Trade Integration in Goods and Serv...
 
Ivan aparell respiratori
Ivan aparell respiratoriIvan aparell respiratori
Ivan aparell respiratori
 
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣΚόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
Κόμβος Διαλειτουργικότητας- Μαραγκός Στ.- ΥΠΕΣ
 

More from IEEEBEBTECHSTUDENTSPROJECTS

More from IEEEBEBTECHSTUDENTSPROJECTS (20)

2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
 
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
 

Recently uploaded

Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Lovely Professional University
 
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
MohammadAliNayeem
 
Teachers record management system project report..pdf
Teachers record management system project report..pdfTeachers record management system project report..pdf
Teachers record management system project report..pdf
Kamal Acharya
 

Recently uploaded (20)

RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor bank
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdf
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoning
 
ROAD CONSTRUCTION PRESENTATION.PPTX.pptx
ROAD CONSTRUCTION PRESENTATION.PPTX.pptxROAD CONSTRUCTION PRESENTATION.PPTX.pptx
ROAD CONSTRUCTION PRESENTATION.PPTX.pptx
 
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfBURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
solid state electronics ktu module 5 slides
solid state electronics ktu module 5 slidessolid state electronics ktu module 5 slides
solid state electronics ktu module 5 slides
 
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
 
Teachers record management system project report..pdf
Teachers record management system project report..pdfTeachers record management system project report..pdf
Teachers record management system project report..pdf
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdf
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent Acts
 

2014 IEEE JAVA NETWORK SECURITY PROJECT Authorization control for a semantic data repository through an inference policy engine

  • 1. GLOBALSOFT TECHNOLOGIES Authorization Control for a Semantic Data Repository through an Inference Policy Engine ABSTRACT: Semantic models help in achieving semantic interoperability among sources of data and applications. The necessity to efficiently manage these types of objects has increased the number of specialized repositories, usually referred to as semantic databases. An increasing number of project initiatives have been recorded that choose to formalize application knowledge using ontologies and semantic data representation. Due to the various sensitivities of data, suitable access control mechanisms pertaining to the semantic repository should be put in place to ensure that only authorized users can obtain access to the information in its entirety.In fact, deciding what can be made available to the user without revealing confidential information is made even more difficult because the user may be able to apply logic and reasoning to infer confidential information from the knowledge being provided. In this paper, we design an authorization security model enforced on a semantic model’s entities (concepts) and also propagate on their individuals in the OWL database through an inference policy engine. We provide TBox access control for the construction of a TBox family and propagate this based on the construction of concept taxonomies. We also provide ABox label-based access control for facts in the domain knowledge and report experiments to evaluate the effects of access control on reasoning and modularization. EXISTING SYSTEM: IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. In this paper, we design an authorization security model enforced on a semantic model’s entities (concepts) and also propagate on their individuals in the OWL database through an inference policy engine. We provide TBox access control for the construction of a TBox family and propagate this based on the construction of concept taxonomies. large amount of data are available on the Internet, and managing it by means of traditional methods is becoming very difficult. Novel tools and techniques are needed to effectively administer this data, provide interoperability and warehousing between the numerous data supplies and systems, and to obtain information from the databases and warehouses on the Internet. . PROPOSED SYSTEM: We proposed a control model consisting of concept-level access that supports propagation based on the relationships among concepts for the purpose of regulating the access to data by individuals. Proposed policy languages similar to Rei based on Semantic Web languages like RDF and DAML+OIL and developed a framework, Rein, based on Rei. Finin et al. proposed the use of the OWL language as the formalization of the RBAC model. They provide two ways to formalize an RBAC role, as a class or as an attribute. The proposed mechanism is considered a highly structured multilayered authorization control for safeguarding semantic data repositories, with mechanisms that fully support content-based access control, so that the authorization requirements are established not only for concepts in TBox, but also for their individuals in the ABox. we proposed a semantic reasoner authorization model conceived to secure access to semantic repositories CONCLUSION: In this paper, we proposed a semantic reasoner authorization modelconceived to secure access to semantic repositories. The model is able to restrict access to confidential knowledge that is represented using ontologies and can regulate access to both the ontology’s concepts and their individuals. Therefore, the model fully supports contentbasedaccess control. From a functional perspective, the model consists of two main components: TBox access control for the construction of the TBox family and ABox label-based access control for facts in the domain knowledge. The model also supports a flexible mechanism for propagating authorizations through a hierarchy concept tree.
  • 3. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.