SlideShare a Scribd company logo
SECURITY IN
SEMANTIC WEB
THE PRESENTATION INCLUDE THE FOLLOWING :
▪ Introduction
▪ Security standards for the semantic web
▪ Categorization of models of trust
▪ Trust strategies for the Semantic Web
▪ Conclusion
SECURITY STANDARDS FOR THE
SEMANTIC WEB
LAYERS FOR THE SECURE SEMANTIC WEB
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Logic,Proof,Trust
Secure Ontologies, Secure Semantic Interoperability
RDF Security
XML Security, Secure XML Schemas
Secure TCP/IP, Secure Sockets, Secure HTML , Secure Agents
SECURITY STANDARDS FOR THE SEMANTIC WEB
XML security
RDF security
Secure information interoperability
Trust for the semantic web
CATEGORIZATION OF MODELS OF TRUST
CATEGORIZATION OF MODELS OF TRUST
▪ Centralized model
A centralized node acts as a system manager.
▪ Distributed model
Nodes are responsible for obtaining mutual trust based on their direct interactions.
Distributed models can be divided into :
▪ Global model
▪ Local model
CENTRALIZED MODEL
▪ Manager acquires knowledge such as the ratings of
reputation and the precedents of nodes
▪ The manager is responsible for collecting information
from both sides involved in interactions
▪ An agent (a node) only communicates with the
centralized node to collect information about other
node’s reputations
▪ Each node asks the manager to receive trust rating
DISTRIBUTED MODEL
▪ In this model there is no centralized system to
govern the reputation The manager is responsible
for collecting information from both sides involved
in interactions
▪ If node A wants to know node B’s reputation, it
has to ask other nodes to evaluate B
▪ Getting trust information about trustee from
network
GLOBAL MODEL
▪ This model is based on the degree of popularity of a node in the society
▪ Neighbors of the trustees know them due to their relationships in the past
▪ A node may have had interactions with its neighbors in the past and neighbors have
profiles of their precedents
▪ Voting (aggregating the opinions of neighbors or users)is an example of evaluating
trust ratings
▪ www.eBay.com and www.Amazon.com auctions have a special trust mechanism
▪ Both of these are implemented as a centralized rating system that manages reputation of each user
▪ But on the other hand the calculation of reputation is based on a global method which depends on
the user’s rating
LOCAL MODEL
▪ In this model trust is personal and beliefs vary between two people, personalization
should improve the accuracy of the results
▪ Most research reports on trust mechanisms in the semantic web discuss those
algorithms that calculate trust from the personal view
▪ The main idea here is that everybody trusts his/her friend’s belief more than a
stranger’s belief
▪ According to small world hypothesis, any pair of nodes in a random network will be
connected by a relatively short chain of random acquaintances
TRUST STRATEGIES FOR THE SEMANTIC
WEB
TRUST STRATEGIES FOR THE SEMANTIC WEB
Optimistic Systems
Pessimistic Systems
Centralised Trust Systems
Trust Investigation Systems
Transitive Trust Systems
OPTIMISTIC SYSTEMS
▪ Optimistic systems accept others unless there is
reason not to trust
▪ If the benefits of cooperation are relatively large or
the costs of betrayal are relatively small, risk is low,
and the gains from trust massively outweigh the
gains from distrust
OPTIMISTIC SYSTEMS IDEA
▪ Optimism is a very simple strategy
▪ Basically it is the idea that an agent will trust another
agent even if its performance is uncertain, unless
there are positive reasons for not trusting it
▪ The basic idea is that trust is the default attitude
PESSIMISTIC SYSTEMS
▪ Given a quantity of such information, agents can be ranked
in terms of their reliability
▪ Such systems in effect take a high rank as evidence of
reason for trust; hence in such a system many trustworthy
agents may fail to be trusted
PESSIMISTIC SYSTEMS IDEA
▪ Pessimistic strategies restrict interactions with
agents unless there is a reason to trust them
▪ Note that the pessimism corresponds to trust via
personal acquaintance in the offline world, which is
the basic model of trust
▪ Such a model of trust is not often capable of
supporting and underlying very complex societies
CENTRALISED TRUST SYSTEMS
▪ It provides them with a formalism for expressing
agreement/disagreement, and the argumentative
stance of the source
▪ This is then used to measure a context-sensitive
evaluation of the source
▪ Relying on centralised institutions to measure trust
takes the burden off the interactive agents when
deciding which agents to trust
▪ One observation made in with respect to eBay is that
users feedback is almost always positive. The authors
note that most people do not like giving negative
feedback, unless revenge is a motivation
CENTRALISED TRUST SYSTEMS IDEA
▪ Centeralising trust involves laying off the costs of
interacting with and investigating agents to a central
institution or authority
▪ If the agent bears a certificate, then it could be
trusted
▪ However, this does not obviate the need for trust,
but the trust requirements are reduced
TRUST INVESTIGATION SYSTEMS
▪ On P2P network, peers make recommendations to
each other about where suitable files might be found
▪ The agents perform an investigation of the others in
order to determine how likely it is that their
recommendations will be useful
▪ Another example of this sort of approach is provided
by systems that negotiate automatically to extract
trust credentials from other parties
TRUST INVESTIGATION SYSTEMS IDEA
▪ Trust is a response to uncertainty
▪ But trust imposes risks
▪ Hence, to avoid some risk, one strategy is to reduce
uncertainty by investigating or evaluating other
agents to determine some salient details of
operation
▪ It is not passive; it actively tries to discover aspects
of the environment that are relevant to reduce
uncertainty
TRANSITIVE TRUST SYSTEMS
▪ They use the small world theory , which hypothesises
that any pair of objects in a random network will be
connected by a relatively short chain of random
acquaintances
▪ Social network analysis techniques are used in to
measure trust over a Friend of a Friend (FOAF)
network, extended with trust relations
▪ If A trusts B, and B trusts (and maybe recommends) C,
nothing follows about whether A trusts C
TRANSITIVE TRUST SYSTEMS IDEA
▪ The idea of this strategy is that an agent sends a
message out about whether a potential agent is
trustworthy
▪ he network of acquaintances of that agent will then
either send back an opinion based on experience, or
pass the message onto its acquaintances, many of
which will be unknown to the first agent
COSTS ESTIMATES FOR FIVE TRUST STRATEGIES
Conclusion
References :
▪ Kieron O’Hara, Harith Alani, Yannis Kalfoglou, and Nigel Shadbolt . 2010. Trust Strategies for the Semantic Web
▪ Saeedeh Shekarpour , S.D. Katebi . 2010. Modeling and evaluation of trust with an extension in semantic web
▪ Bhavani Thuraisingham, 2005. Security standards for the semantic web
▪ D. Artz, Y. Gil, 2007.A survey of trust in computer science and the Semantic Web
▪ J. Golbeck, B. Parsia, J. Hendler. 2003. Trust Networks on the Semantic Web
THANK YOU FOR
LISTENING

More Related Content

What's hot

K-Means Clustering.ppt
K-Means Clustering.pptK-Means Clustering.ppt
K-Means Clustering.ppt
Adam Superman
 
Genetic algorithms
Genetic algorithmsGenetic algorithms
Genetic algorithms
Mehmet Ozgur Unal
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
amiable_indian
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
ssuserec53e73
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
Alamgir Hossain
 
Project Charter
Project CharterProject Charter
Project Charter
Ananda Ricky
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Shashank Shetty
 
Web_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_HabibWeb_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_Habib
El Habib NFAOUI
 
Web content mining
Web content miningWeb content mining
Web content mining
Akanksha Dombe
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
Monodip Singha Roy
 
Service oriented architecture
Service oriented architectureService oriented architecture
Service oriented architecture
Ainul Yaqin
 
Computer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdfComputer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdf
ShanthalaKV
 
Network traffic analysis course
Network traffic analysis courseNetwork traffic analysis course
Network traffic analysis course
TECHNOLOGY CONTROL CO.
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
Arpana shree
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
Deduplication
DeduplicationDeduplication
Deduplication
Lars Marius Garshol
 
Text Classification, Sentiment Analysis, and Opinion Mining
Text Classification, Sentiment Analysis, and Opinion MiningText Classification, Sentiment Analysis, and Opinion Mining
Text Classification, Sentiment Analysis, and Opinion Mining
Fabrizio Sebastiani
 
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentationUNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
TELKOMNIKA JOURNAL
 
PageRank_algorithm_Nfaoui_El_Habib
PageRank_algorithm_Nfaoui_El_HabibPageRank_algorithm_Nfaoui_El_Habib
PageRank_algorithm_Nfaoui_El_Habib
El Habib NFAOUI
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
xlyle
 

What's hot (20)

K-Means Clustering.ppt
K-Means Clustering.pptK-Means Clustering.ppt
K-Means Clustering.ppt
 
Genetic algorithms
Genetic algorithmsGenetic algorithms
Genetic algorithms
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
 
Project Charter
Project CharterProject Charter
Project Charter
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Web_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_HabibWeb_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_Habib
 
Web content mining
Web content miningWeb content mining
Web content mining
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
 
Service oriented architecture
Service oriented architectureService oriented architecture
Service oriented architecture
 
Computer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdfComputer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdf
 
Network traffic analysis course
Network traffic analysis courseNetwork traffic analysis course
Network traffic analysis course
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Deduplication
DeduplicationDeduplication
Deduplication
 
Text Classification, Sentiment Analysis, and Opinion Mining
Text Classification, Sentiment Analysis, and Opinion MiningText Classification, Sentiment Analysis, and Opinion Mining
Text Classification, Sentiment Analysis, and Opinion Mining
 
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentationUNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
 
PageRank_algorithm_Nfaoui_El_Habib
PageRank_algorithm_Nfaoui_El_HabibPageRank_algorithm_Nfaoui_El_Habib
PageRank_algorithm_Nfaoui_El_Habib
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 

Similar to Security and trust in semantic web

JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
IEEEGLOBALSOFTTECHNOLOGIES
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
IEEEFINALYEARPROJECTS
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
i_scienceEU
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systems
JPINFOTECH JAYAPRAKASH
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systems
JPINFOTECH JAYAPRAKASH
 
A computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationA computational dynamic trust model for user authorization
A computational dynamic trust model for user authorization
Kamal Spring
 
CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Web-co...
CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Web-co...CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Web-co...
CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Web-co...
MD. ABU TALHA
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peer
Snehith
 
Survey on deception in osn
Survey on deception in osnSurvey on deception in osn
Survey on deception in osn
Mecheko Sha
 
GRC Dynamics in Securing Cloud
GRC Dynamics in Securing CloudGRC Dynamics in Securing Cloud
GRC Dynamics in Securing Cloud
Noman Bari PMP,CISSP,CCSP,AWSx4,CISM,CISA
 
Metzler 2010 - reputation systems
Metzler   2010 - reputation systemsMetzler   2010 - reputation systems
Metzler 2010 - reputation systems
Richard Metzler
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
Nexgen Technology
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
nexgentech15
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONA COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
nexgentechnology
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
Nexgen Technology
 
An efficient distributed trust model for wireless
An efficient distributed trust model for wirelessAn efficient distributed trust model for wireless
An efficient distributed trust model for wireless
jpstudcorner
 
A Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User AuthorizationA Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User Authorization
1crore projects
 
Trust_Recommendation_System
Trust_Recommendation_SystemTrust_Recommendation_System
Trust_Recommendation_System
chettykulkarni
 
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd Iaetsd
 
BIA 658 Final Presentation.pptx
BIA 658 Final Presentation.pptxBIA 658 Final Presentation.pptx
BIA 658 Final Presentation.pptx
Daniel938043
 

Similar to Security and trust in semantic web (20)

JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systems
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systems
 
A computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationA computational dynamic trust model for user authorization
A computational dynamic trust model for user authorization
 
CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Web-co...
CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Web-co...CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Web-co...
CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Web-co...
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peer
 
Survey on deception in osn
Survey on deception in osnSurvey on deception in osn
Survey on deception in osn
 
GRC Dynamics in Securing Cloud
GRC Dynamics in Securing CloudGRC Dynamics in Securing Cloud
GRC Dynamics in Securing Cloud
 
Metzler 2010 - reputation systems
Metzler   2010 - reputation systemsMetzler   2010 - reputation systems
Metzler 2010 - reputation systems
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONA COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
 
An efficient distributed trust model for wireless
An efficient distributed trust model for wirelessAn efficient distributed trust model for wireless
An efficient distributed trust model for wireless
 
A Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User AuthorizationA Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User Authorization
 
Trust_Recommendation_System
Trust_Recommendation_SystemTrust_Recommendation_System
Trust_Recommendation_System
 
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system using
 
BIA 658 Final Presentation.pptx
BIA 658 Final Presentation.pptxBIA 658 Final Presentation.pptx
BIA 658 Final Presentation.pptx
 

More from Mostafa Arjmand

امنیت سایبر فیزیکی زیرساخت شبکه برق هوشمند
امنیت سایبر فیزیکی زیرساخت شبکه برق هوشمندامنیت سایبر فیزیکی زیرساخت شبکه برق هوشمند
امنیت سایبر فیزیکی زیرساخت شبکه برق هوشمند
Mostafa Arjmand
 
Monomi: Practical Analytical Query Processing over Encrypted Data
Monomi: Practical Analytical Query Processing over Encrypted DataMonomi: Practical Analytical Query Processing over Encrypted Data
Monomi: Practical Analytical Query Processing over Encrypted Data
Mostafa Arjmand
 
Foreaign Exchange Data Crawling and Analysis for Knowledge Discovery Leading ...
Foreaign Exchange Data Crawling and Analysis for Knowledge Discovery Leading ...Foreaign Exchange Data Crawling and Analysis for Knowledge Discovery Leading ...
Foreaign Exchange Data Crawling and Analysis for Knowledge Discovery Leading ...
Mostafa Arjmand
 
Commitment scheme
Commitment schemeCommitment scheme
Commitment scheme
Mostafa Arjmand
 
Smart city dynamic road lane management a smart city application
Smart city  dynamic road lane management a smart city applicationSmart city  dynamic road lane management a smart city application
Smart city dynamic road lane management a smart city application
Mostafa Arjmand
 
Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions
Mostafa Arjmand
 

More from Mostafa Arjmand (6)

امنیت سایبر فیزیکی زیرساخت شبکه برق هوشمند
امنیت سایبر فیزیکی زیرساخت شبکه برق هوشمندامنیت سایبر فیزیکی زیرساخت شبکه برق هوشمند
امنیت سایبر فیزیکی زیرساخت شبکه برق هوشمند
 
Monomi: Practical Analytical Query Processing over Encrypted Data
Monomi: Practical Analytical Query Processing over Encrypted DataMonomi: Practical Analytical Query Processing over Encrypted Data
Monomi: Practical Analytical Query Processing over Encrypted Data
 
Foreaign Exchange Data Crawling and Analysis for Knowledge Discovery Leading ...
Foreaign Exchange Data Crawling and Analysis for Knowledge Discovery Leading ...Foreaign Exchange Data Crawling and Analysis for Knowledge Discovery Leading ...
Foreaign Exchange Data Crawling and Analysis for Knowledge Discovery Leading ...
 
Commitment scheme
Commitment schemeCommitment scheme
Commitment scheme
 
Smart city dynamic road lane management a smart city application
Smart city  dynamic road lane management a smart city applicationSmart city  dynamic road lane management a smart city application
Smart city dynamic road lane management a smart city application
 
Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions
 

Recently uploaded

办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 

Recently uploaded (19)

办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 

Security and trust in semantic web

  • 2. THE PRESENTATION INCLUDE THE FOLLOWING : ▪ Introduction ▪ Security standards for the semantic web ▪ Categorization of models of trust ▪ Trust strategies for the Semantic Web ▪ Conclusion
  • 3. SECURITY STANDARDS FOR THE SEMANTIC WEB
  • 4. LAYERS FOR THE SECURE SEMANTIC WEB Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Logic,Proof,Trust Secure Ontologies, Secure Semantic Interoperability RDF Security XML Security, Secure XML Schemas Secure TCP/IP, Secure Sockets, Secure HTML , Secure Agents
  • 5. SECURITY STANDARDS FOR THE SEMANTIC WEB XML security RDF security Secure information interoperability Trust for the semantic web
  • 7. CATEGORIZATION OF MODELS OF TRUST ▪ Centralized model A centralized node acts as a system manager. ▪ Distributed model Nodes are responsible for obtaining mutual trust based on their direct interactions. Distributed models can be divided into : ▪ Global model ▪ Local model
  • 8. CENTRALIZED MODEL ▪ Manager acquires knowledge such as the ratings of reputation and the precedents of nodes ▪ The manager is responsible for collecting information from both sides involved in interactions ▪ An agent (a node) only communicates with the centralized node to collect information about other node’s reputations ▪ Each node asks the manager to receive trust rating
  • 9. DISTRIBUTED MODEL ▪ In this model there is no centralized system to govern the reputation The manager is responsible for collecting information from both sides involved in interactions ▪ If node A wants to know node B’s reputation, it has to ask other nodes to evaluate B ▪ Getting trust information about trustee from network
  • 10. GLOBAL MODEL ▪ This model is based on the degree of popularity of a node in the society ▪ Neighbors of the trustees know them due to their relationships in the past ▪ A node may have had interactions with its neighbors in the past and neighbors have profiles of their precedents ▪ Voting (aggregating the opinions of neighbors or users)is an example of evaluating trust ratings ▪ www.eBay.com and www.Amazon.com auctions have a special trust mechanism ▪ Both of these are implemented as a centralized rating system that manages reputation of each user ▪ But on the other hand the calculation of reputation is based on a global method which depends on the user’s rating
  • 11. LOCAL MODEL ▪ In this model trust is personal and beliefs vary between two people, personalization should improve the accuracy of the results ▪ Most research reports on trust mechanisms in the semantic web discuss those algorithms that calculate trust from the personal view ▪ The main idea here is that everybody trusts his/her friend’s belief more than a stranger’s belief ▪ According to small world hypothesis, any pair of nodes in a random network will be connected by a relatively short chain of random acquaintances
  • 12. TRUST STRATEGIES FOR THE SEMANTIC WEB
  • 13. TRUST STRATEGIES FOR THE SEMANTIC WEB Optimistic Systems Pessimistic Systems Centralised Trust Systems Trust Investigation Systems Transitive Trust Systems
  • 14. OPTIMISTIC SYSTEMS ▪ Optimistic systems accept others unless there is reason not to trust ▪ If the benefits of cooperation are relatively large or the costs of betrayal are relatively small, risk is low, and the gains from trust massively outweigh the gains from distrust
  • 15. OPTIMISTIC SYSTEMS IDEA ▪ Optimism is a very simple strategy ▪ Basically it is the idea that an agent will trust another agent even if its performance is uncertain, unless there are positive reasons for not trusting it ▪ The basic idea is that trust is the default attitude
  • 16. PESSIMISTIC SYSTEMS ▪ Given a quantity of such information, agents can be ranked in terms of their reliability ▪ Such systems in effect take a high rank as evidence of reason for trust; hence in such a system many trustworthy agents may fail to be trusted
  • 17. PESSIMISTIC SYSTEMS IDEA ▪ Pessimistic strategies restrict interactions with agents unless there is a reason to trust them ▪ Note that the pessimism corresponds to trust via personal acquaintance in the offline world, which is the basic model of trust ▪ Such a model of trust is not often capable of supporting and underlying very complex societies
  • 18. CENTRALISED TRUST SYSTEMS ▪ It provides them with a formalism for expressing agreement/disagreement, and the argumentative stance of the source ▪ This is then used to measure a context-sensitive evaluation of the source ▪ Relying on centralised institutions to measure trust takes the burden off the interactive agents when deciding which agents to trust ▪ One observation made in with respect to eBay is that users feedback is almost always positive. The authors note that most people do not like giving negative feedback, unless revenge is a motivation
  • 19. CENTRALISED TRUST SYSTEMS IDEA ▪ Centeralising trust involves laying off the costs of interacting with and investigating agents to a central institution or authority ▪ If the agent bears a certificate, then it could be trusted ▪ However, this does not obviate the need for trust, but the trust requirements are reduced
  • 20. TRUST INVESTIGATION SYSTEMS ▪ On P2P network, peers make recommendations to each other about where suitable files might be found ▪ The agents perform an investigation of the others in order to determine how likely it is that their recommendations will be useful ▪ Another example of this sort of approach is provided by systems that negotiate automatically to extract trust credentials from other parties
  • 21. TRUST INVESTIGATION SYSTEMS IDEA ▪ Trust is a response to uncertainty ▪ But trust imposes risks ▪ Hence, to avoid some risk, one strategy is to reduce uncertainty by investigating or evaluating other agents to determine some salient details of operation ▪ It is not passive; it actively tries to discover aspects of the environment that are relevant to reduce uncertainty
  • 22. TRANSITIVE TRUST SYSTEMS ▪ They use the small world theory , which hypothesises that any pair of objects in a random network will be connected by a relatively short chain of random acquaintances ▪ Social network analysis techniques are used in to measure trust over a Friend of a Friend (FOAF) network, extended with trust relations ▪ If A trusts B, and B trusts (and maybe recommends) C, nothing follows about whether A trusts C
  • 23. TRANSITIVE TRUST SYSTEMS IDEA ▪ The idea of this strategy is that an agent sends a message out about whether a potential agent is trustworthy ▪ he network of acquaintances of that agent will then either send back an opinion based on experience, or pass the message onto its acquaintances, many of which will be unknown to the first agent
  • 24. COSTS ESTIMATES FOR FIVE TRUST STRATEGIES
  • 26. References : ▪ Kieron O’Hara, Harith Alani, Yannis Kalfoglou, and Nigel Shadbolt . 2010. Trust Strategies for the Semantic Web ▪ Saeedeh Shekarpour , S.D. Katebi . 2010. Modeling and evaluation of trust with an extension in semantic web ▪ Bhavani Thuraisingham, 2005. Security standards for the semantic web ▪ D. Artz, Y. Gil, 2007.A survey of trust in computer science and the Semantic Web ▪ J. Golbeck, B. Parsia, J. Hendler. 2003. Trust Networks on the Semantic Web