An XML framework for agent-based E-commerce
Communications of the ACM
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Strategy hubs: next-generation domain portals with search procedures
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Internet Technology (TOIT)
Enhancing Decision and Negotiation Support in Enterprise Networks Through Semantic Web Technologies
XML Technologien für das Semantic Web - XSW 2002, Proceedings zum Workshop
A Three-Phase Model of Electronic Marketplaces for Software Components in Chemical Engineering
I3E '01 Proceedings of the IFIP Conference on Towards The E-Society: E-Commerce, E-Business, E-Government
Concept-level access control for the Semantic Web
Proceedings of the 2003 ACM workshop on XML security
Toward High-Precision Service Retrieval
IEEE Internet Computing
Secure XML querying with security views
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Certified reputation: how an agent can trust a stranger
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Security Ontologies: Improving Quantitative Risk Analysis
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Security ontology: simulating threats to corporate assets
ICISS'06 Proceedings of the Second international conference on Information Systems Security
A method for reasoning about complex services within geographic information systems
KES-AMSTA'10 Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part I
Hi-index | 0.00 |
As the ontologies are the pivotal element of the Semantic Web in E-Commerce, it is necessary to protect the ontology's integrity and availability. In addition, both suppliers and buyers will use an ontology to store confidential knowledge pertaining to their preferences or possible substitutions for certain products. Thus, parts of an ontology will need to be kept confidential.We propose to use well established standards of XML access control. E-commerce processes require the confidentiality of customer information, the integrity of product offers and the availability of the vendors' servers. Our main contribution-the introduction of a Security Ontology-helps to structure and simulate IT security risks of e-commerce players that depend on their IT infrastructure.