用户名: 密码: 验证码:
语义Web技术的本体安全性研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
语义Web是万维网创始人Tim Berners-Lee提出的下一代网络,其目的在于让机器理解Web页面内容并为人类提供智能化的服务。经过十来年的发展,语义Web的基础理论和技术得到了长足的发展。然而,随着语义Web应用系统的逐渐增多,它所面临的安全性挑战却日益突显。在开放的互联网环境中,未经授权的访问、恶意修改和使用不当都是网络攻击的主要方式,如何有效地保护数据已经成了当前的迫切所需。目前,语义Web安全方面的研究明显滞后于元数据描述和数据互操作的发展,业界一致认为,安全性是语义Web成为主流技术之前必须解决的一个关键问题。
     鉴于本体是构建语义Web的核心技术,本文的主要工作是针对本体安全存在的薄弱环节,对其中的一些关键领域及应用技术进行了深入研究。论文所研究的内容主要涉及本体的访问控制、完整性保护和可用性等方面的问题,取得了如下创新性成果:
     ·针对RBAC策略显示表达易受攻击的问题,将主动数字水印技术引入到本体的访问控制研究。在分析OWL文档语法结构的基础上,提出了多种基于OWL语言的文本信息隐藏的方法,构建了基于主动数字水印的本体角色授权访问控制模型WORBAC及相关实现算法。
     ·在开放、分布式的Internet中,基于身份授权的传统安全机制已经无法适合语义Web的应用。为此,在形式化ABAC模型的基础上,构建了本体ABAC安全模型,用易于用户理解和编程实现的N3Logic来描述模型中的规则,利用语义Web的推理能力提供了基于证明的本体访问控制,从而大大提高了系统的安全性。
     ·围绕本体中敏感数据被非法篡改后难以检测和发现的问题,将零水印思想及信息隐藏技术引入本体的完整性研究,设计了本体数据完整性校验模型及实现算法,用JAVA编程验证了该思路的正确性。
     ·本体异质的普遍存在已经成为本体互操作和语义通信的主要障碍,对本体的正常使用构成了严重的安全威胁。论文深入分析了本体异质中语义异质的本质原因,提出了基于模糊逻辑的语义异质消解方法,通过构造模糊公共本体来消解语义异质,为提高本体的可用性提供了新的思路。
     研究结果丰富了数字水印、N3Logic、零水印、模糊逻辑在语义Web安全领域的应用研究,取得了具有一定理论价值和实用价值的研究成果,为进一步解决语义Web在实际应用中所面临的安全问题作了相关的理论和方法铺垫。
     本文的研究结果对于本体在Internet环境下的访问控制、机密信息传递、完整性检验、信息系统集成、电子政务和电子商务等领域的应用具有一定的应用价值。
Semantic Web is the next generation network which was proposed by the founder of the World Wide Web Tim Berners-Lee, whose aim is to get the machine to understand Web page content and provide intelligent services for human being. After10years of development, the Semantic Web on basic theory and technology got rapid progress. However, with Semantic Web applications on the rise, it is increasingly highlighting the security challenges that it faces. In the open Internet environment, unauthorized access, malicious modification and improper use are the main method of network attacks, how to effectively protect data has become our urgent needs. At present, the Semantic Web security research has lagged far behind in the metadata descriptions and data interoperability development, the industry consensus agree that security is the key issue must be solved before Semantic Web becomes the mainstream technology.
     Since ontology is the core technology to construct Semantic Web, the dissertation mainly targets at the existing weak links of ontology security; some of the key areas and application technology are thoroughly studied. The content of the research work mainly involves access control, integrity protection, ontology availability and other aspects of the problem. The innovative results achieved are as follows:
     ●According to the fact that explicit expression of RBAC strategy is vulnerable, active digital watermarking technology is introduced into the research of access control to the ontology. On the basis of syntax analysis of OWL document structure, several text information hiding method based on the OWL language are proposed to build active watermark based authorization Ontology model using RBAC and related algorithms.
     ●In the open. distributed Internet environment, traditional identity-based security mechanisms cannot fit the application of Semantic Web. Therefore, on the basis of ABAC model formalization. ontology ABAC security model is constructed, programming with easier for users to understand and implement N3Logic to describe rules in the model, using the reasoning ability of Semantic Web to provide proof of access control based on ontology, which greatly improve the safety of the system.
     ●Concerning the problem that modification of sensitive data in ontologies is difficult to be detected and discovered after being illegal tampered, zero-watermarking and information hiding technology are brought into the research of ontology integrity. Ontology data integrity verification model and related algorithms are designed with JAVA programming to verify the soundness of the method.
     ●The universal existence of Ontology heterogeneous has become the major obstacles of ontology interoperability and semantic communication, causing a serious security threat to the normal usage of ontology. Paper thoroughly analyzed the essence of semantic heterogeneity in the ontology heterogeneity, and proposed semantic heterogeneity digestion method based on fuzzy logic. Digestion by constructing a fuzzy public ontology to solve the problem of semantic heterogeneity, which provides a new way of thinking to increase the availability of ontology.
     Research findings enrich the digital watermark, N3Logic, zero-watermark, fuzzy logic in the field of Semantic Web security application. A number of certain theoretical and practical values of research results are obtained which has laid the foundation of theory and methods to solve the security problems that the Semantic Web in practice faced.
     The results of this dissertation may have certain value in the applation area of Internet environment for ontology access control, confidential information transmission, integrity testing, information systems integration, e-government and e-commerce and other fields.
引文
[1]Tim Berners-Lee, JamesHendler, and OraLassila. The Semantic Web [J]. Scientic American,2001,285(5):pp.34-44.
    [2]Elena Ferrari, Bhavani Thuraisingham. Web and Information Security [M]. Hershey · London · Melbourne · Singapore:IRM Press,2006.
    [3]Daniel Olmedilla. Security and Privacy on the Semantic Web [A], in: M.Petkovic, W. Jonker (eds.), Security, Privacy and Trust in Modern Data Management, Data-Centric Systems and Applications [M], Springer,2007 pp.1-15.
    [4]Gigigoris Antonious and Frank van Harmelen. A Semantic Web Primer, second edition [M]. Massachusetts:The MIT Press,2008.
    [5]Aurona Gerber et al. Semantic Web Technologies [R]. Technical Report, UNISA-TR-2006-02, University of South Africa, November 2006.
    [6]Gerber, AJ, Barnard. A and Van der Merwe, AJ.2006. Semantic Web status model [C]. Ninth World Conference on Integrated Design and Process Technology, San Diego, USA,25-30 June,2006, pp.473-482.
    [7]Lalana Kagal, James Hendler, Tim Berners-Lee. The Semantic Web and Policy [J]. Web Semantics:Science, Services and Agents on the World Wide Web. Volume 7, Issue 1, January 2009, pp. vii-ix.
    [8]Berners-Lee:Semantic Web will have privacy built-in [EB/OL]. http://www.zdnet.co.uk/news/security-management/2009/03/12/berners-lee-sem antic-web-will-have-privacy-built-in-39626896/.2009-10-11.
    [9]Berners-Lee:Web security a'never-ending battle [EB/OL]. http://www.zdnet.co.uk/news/networking/2007/09/21/berners-lee-web-security-a-never-ending-battle-39289560/.2009-10-13.
    [10]Muhammad Reza Fatemi et al. A proposal for Ontology Security Standards [EB/OL]. http://cmpe.enui.edu.tr/bayram/Papers/A_Proposal_for_Ontology_ Security_ Standards_fatemi_elci_bayram.pdf,2009-10-14.
    [11]B. Thuraisingham. Security issues for the semantic Web [C]. Proceedings of COMPSAC 2003. pp.633-638.
    [12]Bhavani Thuraisingham. Security standards for the semantic web [J]. Computer Standards & Interfaces, Volume 27, Issue 3, March 2005, pp.257-268.
    [13]Bhavani Thuraisingham. Directions for Security and Privacy for Semantic E-business Applications [J]. Communications of ACM, Dec.2005, Vol.48. pp.71-73.
    [14]Harris D., et al. Standards for secure data sharing across organizations [J]. Computer Standards & Interfaces,2007, Vol.29, pp.86-96.
    [15]Thuraisingham B. Confidentiality. Privacy and Trust Policy Enforcement for the Semantic Web[C]. IEEE International Workshop on Policies for Distributed Systems and networks, POLICY07, Bologna, Italy, June 2007, pp.13-15.
    [16]B. Thuraisingham. Building Trustworthy Semantic Webs [M]. CRC Press,2007.
    [17]Thuraisingham, B. Parikh, P. Trustworthy Semantic Web Technologies for Secure Knowledge Management [C].2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Shanghai, Dec.2008, Volume:2, pp.186-193.
    [18]Ibrahim Rajab Mbaya. Towards a security framework for the Semantic Web [D]. Thesis for Master of Science, University of South Africa,2007.
    [19]Mbaya, IR, Gerber, AJ and Van Der Merwe, AJ.2009. Requirements of a security framework for the semantic web [C]. IASTED International Conference on Software Engineering, Innsbruck, Austria,16-18 February 2009, pp.106-113.
    [20]Lalana Kagal, Tim Finin, Anupan Joshi. A Policy Based Approach to Security for the Semantic Web [C]. Proceedings of ISWC2003, pp.402-418.
    [21]Qin. L. and V. Atluri. Concept-Level Access Control for the Semantic Web [C]. Proceedings of the 2003 ACM workshop on XML security, pp.94-103.
    [22]Arish. R.. T.Payne. D.Marvin, et al. Towards a Semantic Web Security Infrastructure [C]. AAAI Spring Symposium on Semantic Web services.2004. 1-8.
    [23]Tan, J. J. and S. Poslad. A profile based Security Model for the Semantic Web [M]. ECOWS, LNCS 3250,2004, pp.46-60.
    [24]Carminati, B., E. Ferrari, B. Thuraisingham. Using RDF for policy specification and enforcement [C]. Proceedings of the Database and Expert Systems Applications,15th International Workshop,2004, pp.163-167.
    [25]XML Signature WG [EB/OL]. http://www.w3.org/Signature,2009-10-14.
    [26]Sumino H, Ishikawa N, Murakami S, Tsuji H, Kato T. Applying XML Signature and XML Encryption to Peer-to-Peer Platform Security. Consumer Communications and Networking Conference 2007.Jan 2007, pp.29-33.
    [27]XML Encryption WG. [EB/OL]. http://www.w3.org/Encryption/2001/, 2009-10-15.
    [28]XML Key Management Specification (XKMS) [EB/OL]. http://www.w3.org /TR/xkms/,2009-10-15.
    [29]Namje Park, Kiyoung Moon, Sungwon Sohn. XML key management system for Web-based business application.Network Operations and Management Symposium[C]. IEEE/IFIP,2004, Volume 1, pp.903-904.
    [30]Andreas Ekelhart, et al. XML security-A comparative literature review [J]. The journal of Systems and software,2008,1751-1724.
    [31]E. Bertino et al. Selective and Authentic Third-party Distribution of XML Documents [J]. IEEE Transactions on Knowledge and Data, Vol.16, Issue 10, pp.1263-1278.
    [32]Elisa Bertino, Barbara Carminati, Elena Ferrari. Access Control for XML documents and data [R]. Information Security Technical Report. Vol.9, No.3. July-September 2004, pp.19-34.
    [33]E. Bertino, et al., Access Control for XML Documents, Data and Knowledge Engineering, North Holland,2002, pp.237-260.
    [34]Elisa Bertino, Barbara Carminati, Elena Ferrari. XML security [R]. Information Security Technical Report, Vol.6, No.2 (2001),44-58.
    [35]Tuanjie Tong, et al. Rules about XML in XML [J]. Expert Systems with Applications 30 (2006). pp.397-411.
    [36]W3C RDF Data Access Working Group. RDF Data Access Use Cases and Requirements [EB/OL]. http://www.w3.org/TR/2004/WD-rdf-dawg-uc-20041012/,2009-11-18.
    [37]Dongwon Jeong, Hyejin Jeong. Implementation Model for RDF Access Control Using Oracle VPD Security Model:Practical Approach [C]. Third International Conference on Convergence and Hybrid Information Technology,2008, pp.1101-1106.
    [38]Pavan Reddivari, Tim Finin, Anupan Joshi. Policy based access control for an RDF store [C]. In Proceedings of the Policy Management for the Web Workshop, A WWW 2005 Workshop,2005, pp.78-83.
    [39]'C. Farkas, V. Gowadia, A. Jain, and D. Roy. From XML to RDF:Syntax, Semantics, Security, and Integrity [C]. IFIP International Federation for Information, Springer Boston,2006, pp.41-55.
    [40]Donovan Artz, Yolanda Gil. A survey of trust in computer science and the Semantic Web. Web Semantics:Science, Services and Agents on the World Wide Web 5 (2007), pp.58-71.
    [41]T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham. ROWLBAC:representing role based access control in owl [C]. in Proceedings of the 13th ACM symposium on Access control models and technologies,2008, pp.73-82.
    [42]Eun-ser Lee, Sun-myoung Hwang. Design and Implementation of Web Security Access Control System for Semantic Web Ontology [C]. Proceedings of 2006 International Conference on Intelligent Computing (ICIC2006), pp.1090-1095.
    [43]D.E. Bell, L.J. LaPadula. Secure computer system:unified exposition and MULTICS [R]. Technical Report ESD-TR-75-306. The MITRE Corporation, Bedford, MA,1976.
    [44]B. Lampson. Protection [C]. Proc of the 5th Symposium on Information Sciences and Systems.1974. pp.437-443.
    [45]R. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Younman. Role-based access control models. IEEE Computer 29(2).1996. pp.38-47.
    [46]K. Sohr el al. Analyzing and managing role-based access control policies [C]. IEEE Transactions on Knowledge and Data Engineering 20 (7) (2008), pp.924-939.
    [47]黄益民,平玲娣,潘雪增.一种基于角色的访问控制扩展模型及其实现[J].算机研究与发展,Vol.40,No.10,Oct,2003,1521-1528.
    [48]沈海波.面向语义Web的基于语义和上下文的访问控制模型[J].计算机应用,Vol.29,No.5,May 2009,1289-1292.
    [49]沈海波.基于语义的访问控制模型及其推理机制[J].计算机工程,Vol.36,No.3, February 2010,162-163,166.
    [50]S.godik, T. Moses. OASIS eXtensible Access Control Markup Language (XACML), OASIS Committee Specification cs-xacml-specification-1.0 [S]. November,2002.
    [51]SAML [EB/OL]. http://www.oasis-open.org/committees/security,2009-11-18.
    [52]林莉,怀进鹏,李先贤.基于属性的访问控制策略合成代数[J].软件学报,Vol.20, No.2, February 2009,403-414.
    [53]李晓峰,冯登国,陈朝武,房子河.基于属性的访问控制模型[J].通信学报,Vol.29 No.4, April 2008,90-98.
    [54]Ye Chunxiao, Zhong Jiang, Feng Yong. Attribute-based access control policy specification language [J]. Journal of southeast University (English Edition), Vol. 24, No.3, pp.260-263.
    [55]沈海波,洪帆.基于语义Web技术的属性访问控制模型[J].计算机应用研究,Vol.24 No.10,Oct.2007,148-151.
    [56]Haibo Shen. A Semantic-Aware Attribute-Based Access Control Model for Web Services [C]. Proc of the 9th International Conference on Algorithms and Architectures for Parallel Processing.2009. pp.693-703.
    [57]沈海波,洪帆.基于策略的Web服务访问控制研究[J].计算机科学,2007,Vol.34.No.5.107-110.
    [58]Priebe. T. et al. Supporting attribute-based access control with ontologies [C]. Proceedings of the first International Conference on Availability, Reliability and Security.2006. pp.465-472.
    [59]W3C. Privacy Preferences 1.0 (P3P 1.0) Specification[EB/OL] http://www.w3.org/TR/P3P/.2009-10-18.
    [60]V. Kolovski, J.Hendler, B.Parsia. Analyzing web access control policies [C]. Proceedings of thel6tinternational conference on World Wide Web, ACM, New York, NY, SA,2007, pp.677-686.
    [61]Lalana Kagal and Tim Finin and Anupam Joshi. A Policy Language for a Pervasive Computing Environment [C]. Proceedings of IEEE Fourth International Workshop on Policy (Policy2003), pp.63-76.
    [62]于海波.基于规则和本体的应用安全策略研究[D].博士学位论文,吉林大学,2006.
    [63]I. Horrocks et al. SWRL:A Semantic Web Rule Language Combining OWL and Rule ML [EB/OL]. http://www.w3.org/Submission/SWRL/,2004.2009-11-01.
    [64]Martin O'Connor el al. Supporting Rule System Interoperability on the Semantic Web with SWRL [C]. Proc of ISWC 2005 (2005), pp.974-986.
    [65]A. Garcia-Crespo, et al. SecurOntology:A semantic web access control framework [J]. Computer Standards & Interfaces (2009), Doi: 10.1016/j.csi.2009.10.003
    [66]郭文英.基于SWRL推理的语义关联发现及其在本体映射与集成中的应用[D].博士学位论文,浙江大学,2006.
    [67]RIF W3C Working Group. Rules Interchange Format (RIF) [EB/OL], http://www.w3.org/2005/rules/wiki/RIF.2009-11-18.
    [68]Tim Berners-Lee and Dan Connolly and Lalana Kagal and Jim Hendler and Yosi Scaraf. N3Logic:A Logical Framework for the World Wide Web. Journal of Theory and Practice of Logic Programming (TPLP), Special Issue on Logic Programming and Web,2008, pp.1-21.
    [69]Berners-Lee,. T.1998. Notation 3 (N3) A readable RDF Syntax [EB/OL]. http://www.w3.org/designIssues/Notation3.html,2009-11-18.
    [70]Eun-ser Lee, Sun-myoung Hwang. Design and Implementation of Web Security Access Control System for Semantic Web Ontology [C]. Proceedings of 2006 International Conference on Intelligent Computing (ICIC2006). pp.1090-1095.
    [71]Andreas Ekelhart et al. Security Issues for the Use of Semantic Web in E-commerce [C]. Proceedings of Business Information Systems, Springer, LNCS 4439 (2007), pp.1-13.
    [72]John Davies, Rudi Studer, Paul Warren. Semantic Web Technologies:Trends and research in ontology-based systems [M]. John Wiley & Sons, UK,2006.
    [73]钱鹏飞.基于模糊相似度的异构本体映射、合并及校验方法的研究[D].博士学位论文,上海交通大学,2008.
    [74]Simon Schenk, Steffen Staab. Netwarked Graphs:A SPARQL Views and RDF Data Integration on the Web [C]. WWW 2008, April 21-25,2008, Beijing, China. pp.585-594.
    [75]Artem Katasonov. Reasoning and Rules [EB/OL]. http://users.jyu.fi/-akataso/ itks544/Lecture2.pdf,2009-11-20.
    [76]胡军,王柏昀.政策描述规范的研究综述[J].计算机应用研究,vol.26,No.4,Arp.2009.
    [77]Rei:A Policy Specification Language [EB/OL]. http://rei.umbc.edu/,2009-11-23.
    [78]Lotfi A. Zadeh. Is There a Need for Fuzzy Logic? [J]. Information Sciences, Volume 178, Issue 13,1 July 2008, pp.2751-2779.
    [79]Edited By Elie Sanchez el al. Fuzzy Logic and the Semantic Web [M]. Marseille. France:Elsevier Science,2006.
    [80]Kang Dazhou, Xu Baowen, Lu Jianjiang, Li Yanhui. Description logics for fuzzy ontologies on semantic web [J]. Journal of Southeast University (English Edition),, Sept.2006, Vol.22. No.3, pp.343-347.
    [81]Silvia Calegari, Davide Ciucci. Fuzzy Ontology, Fuzzy Description Logics and Fuzzy-OWL [C]. Proceedings of WILF 2007, volume 4578 of LNCS,2007, pp.118-126.
    [82]G. Stoilos. G. Stamou, V. Tzouvaras, J.Z. Pan, and I. Horrocks. Fuzzy OWL Uncertainty and the semantic web [C]. Proceeding of the International Workshop on OWL:Experiences and Directions,2005. pp.80-89.
    [83]Boris Motik, lan Horrocks, and Ulrike Sattler. Adding Integrity Constraints to OWL. In Christine Golbreich. Aditya Kalyanpur. and Bijan Parsia. editors. OWL: Experiences and Directions 2007(OWLED 2007),Innsbruck,Austria,June 6-7 2007.
    [84]李善平等.本体论研究综述[J].计算机研究与发展,Vol.41,No.7,July 2004.
    [85]陆阳,肖军模,刘晶.基于角色的对OWL本体的访问控制模型[J].2008,44(30),pp.121-124.
    [86]王治纲.分布式环境中基于本体的RBAC策略研究[D].博士学位论文,华中科技大学,2006.
    [87]张子凯.基于XML的访问控制模型的研究及应用[D].硕士学位论文,江南大学,2008.
    [88]Eric Yuan,Jin Tong.Attribute Based Access Control(ABAC)for Web Services [C].Proceedings of the IEEE International Conference on Web Services (ICWS'05),pp.1-7.
    [89]W3C.RIF Overview[EB/OL].http://www.w3.org/TR/rif-overyiew/,2009-11-11.
    [90]王松.语义网服务中基于SWRL推理机制的研究[D].硕士学位论文,大连海事大学,2008.
    [91]The Rule Markup Initiative[EB/OL].http://www,ruleml.org,2009-11-19.
    [92]杭园园,钱雪忠.Web服务中基于SAML和XACML的RBAC模型[J].计算机工程与设计,Vol.28,No.2,328-329,421.
    [93]燕辉.ERP系统中数据完整性检测系统[D].硕士学位论文,合肥工业大学,2002年.
    [94]Rodolfo Ferrini,Elisa bertino.Suppprting RBAC with XACML+OWL[C]. Proceedings of the 14th ACM symposium on Access control models and techniques.2009,pp.145-154.
    [95]陆阳,肖军模,刘晶.基于角色的对OWL本体的访问控制模型[J].2008,44(30),121-124.
    [96]郑吉平,秦小麟,崔新春.基于数字水印的数据库角色访问控制模型[J].电子学报,Oct.2006,Vol.34,No.10,1906-1910.
    [97]Sanjeev Khanna,Francis Zane.Watermarking maps:hiding information in structured data[C].Proceedillgs of the eleventh annual ACM-SIAM sylnposium on Discrete algorithms.2000.pp.596-605.
    [98]S. Katzenbeisser, A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking [M]. Boston, Artech House,2000.
    [99]Guo-Rui Feng, Lingge Jiang and Chen He, Orthogonal transformation to enhance the security of the still image watermarking system [J]. IEICE Transactions on Fundamentals, April 2004, vol.E87-A, no.4, pp.949-951.
    [100]刘旻昊,孙堡垒,郭云彪,周琳娜,张茹,钮心忻.文本数字水印技术研究综述[J].东南大学学报(自然科学版),Vol.37,Sup(1),Sept 2007,225-230.
    [101]石麟,贾传荧,刘瑞祯.基于数字水印的访问控制模型[J].中国图象图形学报,Vol.8(A)+spec. spec.2003.780-783.
    [102]石磷.数字水印在数字影院版权管理中的应用[D].硕士论文,大连海事大学,2004.
    [103]蒋伟德,丁友东.基于Web-Service的电子票据数字水印主动控制模型[J].计算机应用与软件,Vol.23,No.10,Oct.2006,62-64.
    [104]Bloom J A, Cox I J, Kalker T et al. Copy Protection for DVD Video [C]. Procedings of the IEEE,1999,87(7):1267-1276.
    [105]Web Ontology Language Reference, W3C Recommendation 10 February 2004 [EB/OL]. http://www.w3.org/TR/owl-ref/,2009-08-16.
    [106]Inoue S, et al. A Proposal on Information Hiding Methods Using XML [C]. Proceedings of the Sixth Natural Language Processing Pacific Rim Symposium, Tokyo, Japan, Nov.2001,55-62.
    [107]Hongbin Kong, Gang Xue, Kebin Tian, Shaowen Yao. Techniques for OWL-based ontology watermarking [C]. Proceedings of the 2009 WRI Global Congress on Intelligent Systems. May,2009, Xiamen, China. Volume IV, pp.582-586.
    [108]Hongbin Kong. Zhengquan Zeng. Lijun Yan, Jicheng Yang, Shaowen Yao, Nuoya Sheng. Combine Elliptic Curve Cryptography with Digital Watermark for OWL-Based Ontology Encryption [C], Proceedings of 2009 International Conference on Computational Intelligence and Security, December.2009. Beijing, vol.1, pp.511-515.
    [109]Protege homepage [EB/OL]. http://protege.stanford.edu/.2009-11-11.
    [110]RDF/XML Syntax Specification (Revised) W3C Recommendation 10 February 2004 [EB/OL]. http://www.w3.org/TR/2004/REC-rdf-syntax-grammar-20040210/.2009-09-09.
    [111]D. Kahn. The Codebreakers [M]. Macmillan, New York,1967.
    [112]The SNOW Home Page [EB/OL]. http://www.darkside.com.au/snow/. 2008-09-11.
    [113]N.F. Maxemchuk. Electronic Document Distribution [J]. AT&T Technical Journal,1994,73(5):73-80.
    [114]刘东.新型文本数字水印技术及其典型应用研究[D].电子科技大学博士学位论文,2007,12.
    [115]S. Lin and D. Costello. Error Control Coding:Fundamentals and Applications. Prentice-Hall [M], Englewood Cliffs, NJ,2004.
    [116]杨白云,孔鸿滨.基于BCH纠错码的本体版权保护模型及实现[J].计算机科学,Vol.37,No.7A,July 2010,pp.45-47.
    [117]胡晶晶.文本数字水印综述[J].微处理机,No.6,Dec,2005,38—41.
    [118]沈海波,洪帆.基于属性的授权和访问控制研究[J].计算机应用,Vol.27,No.1,Jan.2007,114-117.
    [119]葛琨,郎波.基于属性访问控制方法中的策略定义研究[J].微计算机信息,Vol.24,2008,7-9.
    [120]Bo Lang, Ian Foster et al. Attribute Based Access Control for Grid Computing [EB/OL]. ftp://info.mcs.anl.gov/pub/tech_reports/reports/P 1367.pdf,2009-9-18,
    [121]Information Technology-Open Systems Interconnection-Security Frameworks for Open Systems:Access Control Framework [S], ISO/IEC 10181-3:1996.
    [122]Mohammad A. Al-Kahtani and Ravi Sandhu. Induced role hierarchies with attribute-based RBAC [C]. Proceedings of the eighth ACM symposium on access control models and technologies,2003. pp.142-148.
    [123]W3 Group. Simple Object Access Protocol (SOAP) 1.2 [EB/OL]. http://www.w3.org/TR/soap12-partl/.2009-9-20.
    [124]W3C. Rules and Formulae [EB/OL]. http://www.w3.org/2000/10/swap/ doc/Rules,2009-12-11.
    [125]W3C. Notation 3 Logic [EB/OL]. http://www.w3.org/DesignIssues/N3Logic, 2010-01-19.
    [126]W3C. Cwm [EB/OL]. http://www.w3.org/2000/10/swap/doc/cwm.html, 2010-01-11.
    [127]Joseph Scharf. Reasoning Strategies for Semantic Web Rule Language [D]. Master thesis, Massachusetts Institute of Technology,2008.
    [128]温泉,孙锬锋,王树勋.零水印的概念与应用[J].电子学报,2003,31(2)214-216.
    [129]Ibrahim Kamel. A schema for protecting the integrity of databases [J]. Computers & Security, Volume 28, Issue 7, October 2009, pp.698-709.
    [130]蒙应杰,吴超,张文,张秀娟.关系数据库零水印注册方案的研究[J].计算机工程,Vol.33, No.2, January 2007,133-135.
    [131]蒙应杰,吴超,是垚,郭喜平.关系数据库零水印的构造算法[J].兰州大学学报(自然科学版),Vol.43,No.6,Dec.2007,51-55.
    [132]Lu He, el al. A Part-of-speech Tag Sequence Text Zero-Watermarking [C]. Proceedings of the Second Symposium International Computer Science and Computational Technology (ISCSCT'09) Huangshan, P.R. China,26-28. Dec. 2009, pp.187-190.
    [133]Hongbin Kong, Zhengquan Zeng. Chunjie Zhang, Cheng Lu, Shaowen Yao. A Fragile Watermark Scheme for OWL-based Integrity Protection[C]. Procedings of 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, December,2009, Xi'an. China. Volume 3. pp.363-366.
    [134]潘丽,邹建成.一种基于英文文本内容的零水印新算法[C].2007通信理论与技术新发展——第十二届全国青年通信学术会议论文集(上册),707—711.
    [135]程玉柱,孙星明,黄华军.一种新的基于混沌映射的文本零水印算法[J].计算机应用,2005.25(12):2753~2754,2758.
    [136]杨晓辉,戴紫彬.基于FPGA的SHA-256算法实现[J].微计算机信息,2006 年第22卷第4—2期,146-148.
    [137]武金梅.对缩短步数的HASH算法SHA-256、SHA-512的分析[D].硕士学位论文,山东大学,2008.
    [138]王张宜,李波,张焕国Hash函数的安全性研究[J].计算机工程与应用,2005,41(12),18-19,197.
    [139]Bouquet P, Ehrig M, Euzenat J, et al. Specification of a common framework for characterizing alignment [EB/OL]. Knowledge Web deliverable D2.21 v2,2004. http://www.aifb.uni-karlsruhe.de/WBS/phi/pub/kweb-221.pdf,2010-02-11.
    [140]杨白云,孔鸿滨.用模糊OWL处理不一致本体[J].计算机科学,Vo1.36,No.4A,Apr.2009.pp.270-272.
    [141]Jie Tang, Juanzi Li, Bangyong Liang, Xiaotong Huang, Yi Li, Kehong Wang. Using Bayesian decision for ontology mapping [J]. Web Semantics:Science, Services and Agents on the World Wide Web 4 (2006), pp.243-262.
    [142]唐杰,梁邦勇,李涓子,王克宏.语义Web中的本体自动映射[J].计算机学报,Vol.29,No.11,Nov.2006,1956-1976.
    [143]Hongbin Kong, Gang Xue, Shaowen Yao. Essence of inconsistent ontology and counter measures [C]. Proceedings of the 2009 First International Workshop on Database Technology and Applications, April 2009, Wuhan, Hubei China, pp. 570-573.
    [144]Schlobach S., Cornet R. Non-standard reasoning services for the debugging of description logic terminologies [C]. Proceedings of IJCAI,2003, pp.355-362.
    [145]Hameed A, Preece A. Sleeman D.. Ontology reconciliation[C], Handbook on Ontologies in Information System, Springer,2003, pp.231-250.
    [146]于娟,党延忠.本体集成研究综述[J].计算机科学,2008,Vol.35,No.7,9-13.18.
    [147]卢汉.本体解决信息集成中的语义冲突问题[D].山东大学硕士学位论文,2005.
    [148]Ram. S. Jinsoo Park. Semantic conflict resolution ontology (SCROL):an ontology for detecting and resolving data and schema-level semantic conflicts [J]. Knowledge and Data Engineering. IEEE Transactions,2004,16(2). pp.189-202.
    [149]Jinsoo Park. Facilitating Interoperability Among Heterogeneous Geographic Database Systems:A Theoretical Framework, A Prototype System, And Evaluation [D]. Arizona,1999.
    [150]刘惟一,李维华,岳昆.智能数据分析[M].科学出版社,北京,2007年9月.
    [151]王季方,卢正鼎.模糊控制中隶属度函数的确定方法[J].河南科学,Vol.18,No.4,Dec.2000,348-351.
    [152]韩金舫,桑琳,储毅.模糊控制中隶属度函数的构造策略[J].交通与计算机,2001年第6期,11-13.
    [153]G. Stoilos, G. Stamou, V. Tzouvaras, J.Z. Pan, and I. Horrocks. Fuzzy OWL: Uncertainty and the semantic web [C]. Proceeding of the International Workshop on OWL:Experiences and Directions,2005, pp.80-89.
    [154]Silvia Calegari, Davide Ciucci. Fuzzy Ontology, Fuzzy Description Logics and Fuzzy-OWL [C]. Proceedings of WILF 2007, volume 4578 of LNCS,2007, pp.118-126.
    [155]翟军,陈燕,沈立新.基于模糊本体的智能交通系统知识建模[J].大连海事大学学报,Vol.34,No.2,May,2008,91-94.
    [156]Jun Zhai, Lixin Shen, Zhou Zhou, Yan Liang. Fuzzy Ontology for Knowledge Management [EB/OL]. http://www.atlantis-press.com/php/download_paper. php?id=1230 2009-12-12.
    [157]D. Parry, Fuzzification of a standard ontology to encourage reuse [C]. IEEE International Conference on Information Reuse and Integration (IEEE IRI-2004),2004, pp.582-587.
    [158]Hanene GHORBEL, Afef BAHRI. Rafik BOUAZIZ. Fuzzy Protege for Fuzzy Ontology Models. [EB/OL] http://protege.stanford.edu/conference/2009/ abstracts/SIOP2Ghorbel.pdf,2009-9-11.
    [159]Hongbin Kong. Gang Xue, Xianglin He. Shaowen Yao. A proposal to handle inconsistent ontology with fuzzy OWL [C]. Proceedings of 2009 World Congress on Computer Science and Information Engineering. March 31-April 2, 2009. Los Angeles. California USA. Volume I. pp.599-603.
    [160]Giorgos Stoilos, Giorgos Stamou. Extending Fuzzy Description Logics for the Semantic Web [EB/OL]. Available at:http://www.webont.org/owled/20-007/ PapersPDF/submission_12.pdf.2009-12-28.
    [161]Tessaris, S. Questions and answers:reasoning and querying in Description Logic [D]. PhD dissertation, University of Manchester,2001.
    [162]David Tudor Parry. Fuzzy Ontology and Intelligent Systems for Discovery of Useful Medical Information [D]. PhD dissertation, Auckland University of Technology,2005.
    [163]F. Bobillo, M. Delgado, J. Gomez-Romero. DeLorean:A Reasoner for Fuzzy OWL 1.1 [C]. In Proceedings of the 4th International Workshop on Uncertainty Reasoning for the Semantic Web (URSW 2008). Karlsruhe (Germany), October 2008, pp.1-12.
    [164]王海龙,马宗民,殷俊夫,程经纬FRESG:一种模糊描述逻辑推理机[J].计算机研究与发展,46(9):1488-1497,2009.
    [165]刘惟一,田雯.数据模型[M],科学出版社,北京,2001年6月.
    [166]Bo Liu,Jianqiang Li,Yu Zhao. Repairing and reasoning with inconsistent and uncertain ontologies. Advances in Engineering Software 45 (2012) 380-390.
    [167]Tsoumas B, Gritzalis D. Towards an Ontology-based Security Management [A]. Proceeding of 20th International Conference on Advanced Information Newtorking and Applications [C]. Washington, DC: IEEE Press,2006: 985-992.
    [168]徐慧,肖敏,肖德宝.基于安全本体的协同报警分析研究[J].计算机科学,Vol.36,No.5,May 2009,pp.104-107.
    [169]Bonatti P A, Duma C, Fuchs N, et al. Semantic Web Policies—A Disscussion of Requirements and Research Issues [C]. Proc. of the European Semantic Web Conference. Springer,2006, pp.712-724.
    [170]G. Tonti, J.M. Bradshaw, R. Jeffers, etal. Semantic Web Languages for Policy Representation and Reasoning:A comparison of KaoS, Rei. and Ponder. Sanibel Island. Florida:the Second International Semantic Web Conference, 2003, Springer Verlag LNCS 2870. pp.419-437.
    [171]Ghorbel, H., Bahri, A., Bouaziz, R.,2009. Fuzzy Protege for fuzzy ontology models. In:Proc. of 1 lth International Protege Conference IPC'2009.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700