Navigational plans for data integration
AAAI '99/IAAI '99 Proceedings of the sixteenth national conference on Artificial intelligence and the eleventh Innovative applications of artificial intelligence conference innovative applications of artificial intelligence
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Data integration: a theoretical perspective
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
What You Always Wanted to Know About Datalog (And Never Dared to Ask)
IEEE Transactions on Knowledge and Data Engineering
Answering queries using views: A survey
The VLDB Journal — The International Journal on Very Large Data Bases
The Piazza Peer Data Management System
IEEE Transactions on Knowledge and Data Engineering
Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Answering queries using views: A KRDB perspective for the semantic Web
ACM Transactions on Internet Technology (TOIT)
Privacy and Contextual Integrity: Framework and Applications
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Countering Terrorism through Information and Privacy Protection Technologies
IEEE Security and Privacy
Code: Version 2.0
Ontology Matching
Rules and Ontologies for the Semantic Web
Reasoning Web
Legal Theory, Sources of Law and the Semantic Web: Frontiers in Artificial Intelligence and Applications; Dissertations in Artificial Intelligence
Towards automated security policy enforcement in multi-tenant virtual data centers
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Querying a super-peer in a schema-based super-peer network
DBISP2P'05/06 Proceedings of the 2005/2006 international conference on Databases, information systems, and peer-to-peer computing
SemPIF: A Semantic Meta-policy Interchange Format for Multiple Web Policies
WI-IAT '10 Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Semantic technologies for enterprise cloud management
ISWC'10 Proceedings of the 9th international semantic web conference on The semantic web - Volume Part II
Preserving Privacy in Data Outsourcing
Preserving Privacy in Data Outsourcing
A semantic privacy-preserving model for data sharing and integration
Proceedings of the International Conference on Web Intelligence, Mining and Semantics
Semantics-enabled policies for information sharing and protection in the cloud
SocInfo'11 Proceedings of the Third international conference on Social informatics
Privacy in GLAV information integration
ICDT'07 Proceedings of the 11th international conference on Database Theory
Understanding and protecting privacy: formal semantics and principled audit mechanisms
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Datalog for security, privacy and trust
Datalog'10 Proceedings of the First international conference on Datalog Reloaded
An ontology based privacy protection model for third-party platform
AMT'12 Proceedings of the 8th international conference on Active Media Technology
Crafting a balance between big data utility and protection in the semantic data cloud
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics
Hi-index | 0.00 |
The main issues related to cloud computing implementation are security, privacy, and law-awareness. We consider data protection with law-awareness as the major concern for cloud service providers (CSPs) and their customers. Therefore, we provide Law-as-a-Service (LaaS) for CSPs on our law-aware semantic cloud policy infrastructure. The semantic legal policies in compliance with the laws are enforced automatically at the super-peer to enable LaaS. This allows CSPs to deploy their cloud resources and services without worrying about law violations. Afterward, users could query data from the law-aware super-peer within a super-peer domain. Each query is also compliant with the laws. Policies are shown as a combination of OWL-DL ontologies and stratified Datalog rules with negation for a policy's exceptions handling through defeasible (or non-monotonic) reasoning. Finally, the proof-of-concepts prototype systems have been implemented for an H1N1 pandemic investigation scenario in the semantic cloud to justify our approach.