Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

Author: Bhavani Thuraisingham

Publisher: CRC Press

ISBN: 9781466569430

Category: Computers

Page: 482

View: 882

Download BOOK »

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques, the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes, products, tools, and standards for secure data management, secure Semantic Web, secure web services, and secure cloud computing.
Data Provenance and Data Management in eScience
Language: en
Pages: 184
Authors: Qing Liu, Quan Bai, Stephen Giugni, Darrell Williamson, John Taylor
Categories: Technology & Engineering
Type: BOOK - Published: 2012-08-04 - Publisher: Springer

This book covers important aspects of fundamental research in data provenance and data management(DPDM), including provenance representation and querying, as well as practical applications in such domains as clinical trials, bioinformatics and radio astronomy.
Secure Data Provenance and Inference Control with Semantic Web
Language: en
Pages: 478
Authors: Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
Categories: Computers
Type: BOOK - Published: 2014-08-01 - Publisher: CRC Press

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to
Provenance and Annotation of Data and Processes
Language: en
Pages: 298
Authors: Bertram Ludäscher, Beth Plale
Categories: Computers
Type: BOOK - Published: 2015-03-20 - Publisher: Springer

This book constitutes the revised selected papers of the 5th International Provenance and Annotation Workshop, IPAW 2014, held in Cologne, Germany in June 2014. The 14 long papers, 20 short papers and 4 extended abstracts presented were carefully reviewed and selected from 53 submissions. The papers include tools that enable
Provenance and Annotation of Data and Processes
Language: en
Pages: 339
Authors: Juliana Freire, David Koop, Luc Moreau
Categories: Business & Economics
Type: BOOK - Published: 2008-12-02 - Publisher: Springer Science & Business Media

workshop.
Open Problems in Network Security
Language: en
Pages: 169
Authors: Jan Camensich, Doğan Kesdoğan
Categories: Computers
Type: BOOK - Published: 2012-01-12 - Publisher: Springer Science & Business Media

This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised