Font Size: a A A

Semantic Web Privacy On XACML And RBAC

Posted on:2014-10-29Degree:MasterType:Thesis
Country:ChinaCandidate:X M XiangFull Text:PDF
GTID:2268330401990142Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In2000, the World Wide Web founder Tim Berners-Lee at the XML2000meeting, in the current world wide web retrieval expression, deficiencies, proposedfor the next generation of the world wide web concept semantic network that is nowcalled WEB3.0. WEB3.0to micro unit (micro Application module, or unit),WEB3.0users can create their own information module, and according to their ownneeds, intelligent integration of the Internet information.In the WEB3.0to bring morepeople communicate at the same time, personal privacy information is also facingmore and more revealing and the risk of abuse. Therefore,our passage discuss thecombination method based on the WEB3.0privacy data protection and access controlto solve the security of the WEB3.0network privacy.On the basis of the existing means of protection, we made the followingachivements:1.The concept of privacy ontology provides a solution which resolve the privacyof data protectioning and reusing. Our privacy is defined as a collection of data andrules, the protection of privacy by means of privacy rules to protect the privacy ofdata, but in the case of large scale data, One rule implem each data is not so easy. Inthis paper, the appropriate solution to this problem, is to combine ontology and themode of technology, With the concept of privacy ontology, that is in order to betterdescribe the content within the privacy field.2.we also provide a Access control technology combined with the XACMLrequest response techniques and RBAC access control technology. Compared withtraditional methods, this method is based on the use of RDF features,and it can makea certain degree of self-derivation,which can be used to improve the privacy policy todevelop flexible shortcomings, and also it avoids the introduction of RDF isotropicloop and multi-path problem, the final experiment also proved that this the WEB3.0Privacy play a good control effect.3.We use the decentralization of access to protect privacy protection,comparedwith the traditional concern of policy control, to solve the problem of access to thesource, and ensure the safety of access to the source.
Keywords/Search Tags:WEB3.0, Privacy protection, Identity authentication, Access control
PDF Full Text Request
Related items