Semantic Description and Verification of Security Policy Based on Ontology

被引:1
|
作者
TANG Chenghua [1 ]
WANG Lina [1 ]
TANG Shensheng [2 ]
QIANG Baohua [1 ,3 ]
TIAN Jilong [1 ]
机构
[1] Guangxi Experiment Center of Information Science, Guilin University of Electronic Technology
[2] Department of Engineering Technology, Missouri Western State University
[3] Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology
基金
中国国家自然科学基金;
关键词
security policy; ontology; semantic description of policy; the first-order predicate description logic;
D O I
暂无
中图分类号
TP391.1 [文字信息处理]; TP393.08 [];
学科分类号
081203 ; 0835 ; 0839 ; 1402 ;
摘要
To solve the shortage problem of the semantic description scope and verification capability existed in the security policy,a semantic description method for the security policy based on ontology is presented.By defining the basic elements of the security policy,the relationship model between the ontology and the concept of security policy based on the Web ontology language(OWL)is established,so as to construct the semantic description framework of the security policy.Through modeling and reasoning in the Protégé,the ontology model of authorization policy is proposed,and the first-order predicate description logic is introduced to the analysis and verification of the model.Results show that the ontology-based semantic description of security policy has better flexibility and practicality.
引用
收藏
页码:385 / 392
页数:8
相关论文
共 50 条
  • [21] An ontology-based time semantic specification and verification approach for web service
    Liu, Ru-Juan
    Chen, Jun-Jie
    Wang, Li-Jun
    Xie, Hong-Wei
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2009, 41 (06): : 158 - 164
  • [22] Verification of Semantic Web Service Annotations Using Ontology-Based Partitioning
    Belhajjame, Khalid
    Embury, Suzanne M.
    Paton, Norman W.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2014, 7 (03) : 515 - 528
  • [23] Parallelized and distributed task based ontology matching in clustering environment with semantic verification
    Tanni Mittra
    Muhammad Masroor Ali
    CSI Transactions on ICT, 2017, 5 (3) : 265 - 279
  • [24] Automatic Generation of a Simulated Robot from an Ontology-Based Semantic Description
    Rocha, Yuri Goncalves
    Joo, Sung-Hyeon
    Kim, Eun-Jin
    Kuc, Tae-Yong
    2019 19TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2019), 2019, : 1340 - 1343
  • [25] Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security
    Noor, Saba
    Ahmed, Mansoor
    Saqib, Malik Najmus
    Abdullah-Al-Wadud, M.
    Islam, Md Saiful
    Fazal-e-Amin
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (06) : 1309 - 1323
  • [26] Toward the Ontology-Based Security Verification and Validation Model for the Vehicular Domain
    Shaaban, Abdelkader Magdy
    Schmittner, Christoph
    Quirchmayr, Gerald
    Mohamed, A. Baith
    Gruber, Thomas
    Schikuta, Erich
    NEURAL INFORMATION PROCESSING (ICONIP 2019), PT IV, 2019, 1142 : 521 - 529
  • [27] Research of Secure Service Composition based on Semantic Security Policy
    He Zhengqiu
    Xue Fangxia
    Liu Wenfu
    He Rongmao
    Xu Zhongfu
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 246 - 251
  • [28] OntoUji-Ontology to Evaluate Domain Ontology for Semantic Web Services Description
    Mohd-Hamka, Nurhamizah
    Mohamad, Radziah
    JURNAL TEKNOLOGI, 2014, 69 (06):
  • [29] A distributed description of facts in a distributed semantic Web ontology
    Goczyla, Krzysztof
    Waloszek, Aleksander
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 39 - 42
  • [30] A Security Control Model of Semantic Neural Network Based on Concept Description
    Gu, Xiao Jun
    EMERGING RESEARCH IN ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, 2012, 315 : 440 - 447