The evolution of Protégé: an environment for knowledge-based systems development
International Journal of Human-Computer Studies
Filtering postures: local enforcement for global policies
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
The description logic handbook: theory, implementation, and applications
The description logic handbook: theory, implementation, and applications
A proposal for an owl rules language
Proceedings of the 13th international conference on World Wide Web
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
Agency and the Semantic Web
A tool for automated iptables firewall analysis
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
A Systematic Review and Comparison of Security Ontologies
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Semantic Web Services: Theory, Tools and Applications
Semantic Web Services: Theory, Tools and Applications
Semantic Web and firewall alignment
ICDEW '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering Workshop
Supporting rule system interoperability on the semantic web with SWRL
ISWC'05 Proceedings of the 4th international conference on The Semantic Web
Security ontology for annotating resources
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II
Conflict classification and analysis of distributed firewall policies
IEEE Journal on Selected Areas in Communications
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
User-configurable semantic home automation
Computer Standards & Interfaces
Hi-index | 0.00 |
Access controls for Semantic Web applications are commonly considered at the level of the application-domain and do not necessarily consider the security controls of the underlying infrastructure to any great extent. Low-level network access controls such as firewalls and proxies are considered part of providing a generic network infrastructure that hosts a variety of Semantic Web applications and is independent of the application-level access control services. For example, it is unusual to include firewall policy rules in an application policy that constrain the kinds of application information different principals may access. As a consequence, an improperly configured infrastructure may unintentionally hinder the normal operation of a Semantic Web application. Simply opening a firewall for HTTP and HTTPS services does not necessarily result in a proper configuration. Taking an ontology-based approach, this paper considers how a firewall configuration should be analyzed with respect to the Semantic Web application(s) that it hosts.