By Topic

Making agents secure on the semantic Web

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Farkas, C. ; South Carolina Univ., Columbia, SC, USA ; Huhns, M.N.

Agents were designed to collaborate and share information. While highly desirable for interoperability, this feature is scary from the security perspective. Illegal inferences, supported by semantic Web technology and ontologies, might enable users to access unauthorized information. In addition to semantic associations and replicated data with different sensitivity, malicious agents could also exploit statistical inferences. Although each agent in a system might behave in a desired and secure way, their combined knowledge could be used to disclose sensitive data. The research community must therefore develop and implement techniques that allow control over released data. To answer the questions related to information availability (scalability), data correctness (integrity), and access control in the presence of illegal inferences and undesired collaborations (confidentiality), researchers in semantic Web technologies (XML, RDF, DAML, and multiagent systems) and information system security need to collaborate. Indeed, given the Web's openness, dynamic nature, and diverse user population, developing secure Web services will require the collaboration of experts in different fields from both industry and academia. In turn, the intelligent Web of the future will facilitate unheard of support for collaborations and information management.

Published in:

Internet Computing, IEEE  (Volume:6 ,  Issue: 6 )