메뉴 건너뛰기




Volumn 4011 LNCS, Issue , 2006, Pages 712-724

Semantic web policies - A discussion of requirements and research issues

Author keywords

Cooperative policy enforcement; Explanation mechanisms; Integrated heterogeneous policies; Lightweight trust; Natural language interfaces; Trust management

Indexed keywords

DATA PRIVACY; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION SERVICES; INTERFACES (COMPUTER); NATURAL LANGUAGE PROCESSING SYSTEMS; PUBLIC POLICY; SECURITY OF DATA; WORLD WIDE WEB;

EID: 33746056431     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11762256_51     Document Type: Conference Paper
Times cited : (39)

References (27)
  • 2
    • 0001071507 scopus 로고    scopus 로고
    • Compliance checking in the policy-maker trust management system
    • British West Indies, February
    • M. Blaze, J. Feigenbaum, and M. Strauss. Compliance Checking in the Policy-Maker Trust Management System. In Financial Cryptography, British West Indies, February 1998.
    • (1998) Financial Cryptography
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 4
    • 33746103325 scopus 로고    scopus 로고
    • Advanced policy queries
    • Working Group 12, EU NoE REWERSE, Aug
    • P.A. Bonatti, D. Olmedilla, and J. Peer. Advanced policy queries. Technical Report I2-D4, Working Group 12, EU NoE REWERSE, Aug 2005. http://www.rewerse.net.
    • (2005) Technical Report , vol.I2-D4
    • Bonatti, P.A.1    Olmedilla, D.2    Peer, J.3
  • 5
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the web
    • P.A. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the web. Journal of Computer Security, 10(3):241-272, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.A.1    Samarati, P.2
  • 10
    • 34547260252 scopus 로고    scopus 로고
    • No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
    • 1st European Semantic Web Symposium (ESWS 2004), Heraklion, Crete, Greece, may Springer
    • Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, and Marianne Winslett. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In 1st European Semantic Web Symposium (ESWS 2004), volume 3053 of Lecture Notes in Computer Science, pages 342-356, Heraklion, Crete, Greece, may 2004. Springer.
    • (2004) Lecture Notes in Computer Science , vol.3053 , pp. 342-356
    • Gavriloaie, R.1    Nejdl, W.2    Olmedilla, D.3    Seamons, K.E.4    Winslett, M.5
  • 13
    • 9344223389 scopus 로고    scopus 로고
    • Explaining answers from the semantic web: The inference web approach
    • Deborah L. McGuinness and Paulo Pinheiro da Silva. Explaining answers from the semantic web: The inference web approach. Journal of Web Semantics, 1(4):397-413, 2004.
    • (2004) Journal of Web Semantics , vol.1 , Issue.4 , pp. 397-413
    • McGuinness, D.L.1    Da Silva, P.P.2
  • 21
    • 0026168818 scopus 로고
    • Explanations in knowledge systems: The roles of the task structure and domain functional models
    • Michael C. Tanner and Anne M. Keuneke. Explanations in knowledge systems: The roles of the task structure and domain functional models. IEEE Expert: Intelligent Systems and Their Applications, 6(3):50-57, 1991.
    • (1991) IEEE Expert: Intelligent Systems and Their Applications , vol.6 , Issue.3 , pp. 50-57
    • Tanner, M.C.1    Keuneke, A.M.2
  • 22
    • 9344228137 scopus 로고
    • Second generation expert system explanation
    • J.-M. David, J.-P. Krivine, and R. Simmons, editors, Springer Verlag
    • M. R. Wick. Second generation expert system explanation. In J.-M. David, J.-P. Krivine, and R. Simmons, editors, Second Generation Expert Systems, pages 614-640. Springer Verlag, 1993.
    • (1993) Second Generation Expert Systems , pp. 614-640
    • Wick, M.R.1
  • 26
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur., 6(1):1-42, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.