Trust and Privacy on the Social and Semantic Web (SPOT 2009)

The QUATRO Plus project, a follow on from the original QUATRO Project, aims to balance the wisdom of the crowds with the knowledge of the experts. It uses a mixture of authenticated data sources and the opinions of end users expressed through social networking software to build a dataset that is authoritative and trustworthy. The dataset describes online resources using RDF with the upcoming W3C Recommendation, POWDER, as the underlying transport and storage mechanism. Data can be added to or queried through a variety of tools provided by the project, some of which are described in detail in this paper.

[1]  Dan Brickley,et al.  FOAF Vocabulary Specification , 2004 .

[2]  Rael Dornfest,et al.  Google hacks - 100 industrial-strength tips and tools , 2002 .

[3]  Juri Luca De Coi,et al.  A Review of Trust Management, Security and Privacy Policy Languages , 2016, SECRYPT.

[4]  Piero A. Bonatti,et al.  Protune: A Framework for Semantic Web Policies , 2008, International Semantic Web Conference.

[5]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[6]  John Riedl,et al.  tagging, communities, vocabulary, evolution , 2006, CSCW '06.

[7]  James A. Hendler,et al.  Trust Networks on the Semantic Web , 2003, WWW.

[8]  Jeffrey M. Bradshaw,et al.  Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder , 2003, SEMWEB.

[9]  Fausto Giunchiglia,et al.  Semantic Matching: Algorithms and Implementation , 2007, J. Data Semant..

[10]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[11]  Gediminas Adomavicius,et al.  Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.

[12]  Fausto Giunchiglia,et al.  Towards a Theory of Formal Classification , 2005 .

[13]  Ben Laurie,et al.  Under)mining Privacy in Social Networks , 2008 .

[14]  Wolfgang Nejdl,et al.  Social Software for Lifelong Competence Development: Challenges and Infrastructure , 2008, Int. J. Emerg. Technol. Learn..

[15]  James A. Hendler,et al.  Information accountability , 2008, CACM.

[16]  Lalana Kagal,et al.  Using Semantic Web Technologies for Policy Management on the Web , 2006, AAAI.

[17]  Sanjeev Khanna,et al.  Why and Where: A Characterization of Data Provenance , 2001, ICDT.

[18]  Paul Resnick,et al.  PICS: Internet access controls without censorship , 1996, CACM.

[19]  David R. Karger,et al.  Piggy Bank: Experience the Semantic Web inside your web browser , 2005, J. Web Semant..

[20]  Alec Wolman,et al.  Lockr: social access control for web 2.0 , 2008, WOSN '08.

[21]  Timothy W. Finin,et al.  A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.

[22]  Arne Wolf Koesling,et al.  Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning , 2008, IEEE Transactions on Learning Technologies.

[23]  Nathan R. Yergler,et al.  ccREL : The Creative Commons Rights Expression Language , 2008 .

[24]  Alexandre Passant,et al.  Towards an Interlinked Semantic Wiki Farm , 2008, SemWiki.

[25]  David R. Karger,et al.  What would it mean to blog on the semantic web? , 2005, J. Web Semant..

[26]  Simon Schenk On the Semantics of Trust and Caching in the Semantic Web , 2008, International Semantic Web Conference.

[27]  Barbara Carminati,et al.  Privacy-Aware Collaborative Access Control in Web-Based Social Networks , 2008, DBSec.

[28]  Marianne Winslett,et al.  No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web , 2004, ESWS.

[29]  Axel Polleres,et al.  Trust Negotiation for Semantic Web Services , 2004, SWSWPC.

[30]  Barbara Carminati,et al.  Combining Social Networks and Semantic Web Technologies for Personalizing Web Access , 2008, CollaborateCom.

[31]  Jennifer Golbeck,et al.  Generating Predictive Movie Recommendations from Trust in Social Networks , 2006, iTrust.

[32]  Indrajit Ray,et al.  VTrust: A Trust Management System Based on a Vector Model of Trust , 2005, ICISS.

[33]  Marianne Winslett An Introduction to Trust Negotiation , 2003, iTrust.

[34]  Marianne Winslett,et al.  Ontology-Based Policy Specification and Management , 2005, ESWC.

[35]  Enrico Motta,et al.  Personalizing relevance on the Semantic Web through trusted recommendations from a social network , 2006 .

[36]  Steve Cayzer,et al.  How to build a Snippet Manager , 2005, Semantic Desktop Workshop.

[37]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[38]  D. Fensel,et al.  Architecture of the World Wide Web , Volume One , 2004 .

[39]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[40]  Deborah L. McGuinness,et al.  A proof markup language for Semantic Web services , 2006, Inf. Syst..

[41]  Paolo Avesani,et al.  A trust-enhanced recommender system application: Moleskiing , 2005, SAC '05.

[42]  Piero A. Bonatti,et al.  Advanced Policy Explanations on the Web , 2006, ECAI.

[43]  Steve Cayzer,et al.  Semantic blogging and decentralized knowledge management , 2004, CACM.

[44]  James A. Hendler,et al.  N3Logic: A logical framework for the World Wide Web , 2007, Theory and Practice of Logic Programming.

[45]  Fausto Giunchiglia,et al.  RelBAC: Relation Based Access Control , 2008, 2008 Fourth International Conference on Semantics, Knowledge and Grid.

[46]  Hideaki Takeda,et al.  SOCIOBIBLOG: A DECENTRALIZED PLATFORM FOR SHARING BIBLIOGRAPHIC INFORMATION , 2007 .

[47]  Jeremy J. Carroll,et al.  Named graphs , 2005, J. Web Semant..

[48]  Phokion G. Kolaitis,et al.  Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , 2002 .

[49]  Lalana Kagal Rei : A Policy Language for the Me-Centric Project , 2002 .

[50]  Nikos Mavrogiannopoulos,et al.  Using OpenPGP Keys for Transport Layer Security (TLS) Authentication , 2007, RFC.

[51]  Hideaki Takeda,et al.  Semblog : Personal Knowledge Publishing Suite , 2003 .

[52]  Luc Moreau,et al.  The Open Provenance Model , 2007 .

[53]  James Cheney,et al.  Provenance management in curated databases , 2006, SIGMOD Conference.

[54]  John G. Breslin,et al.  Weaving SIOC into the Web of Linked Data , 2008, LDOW.

[55]  Rohit Khare,et al.  Microformats: the next (small) thing on the semantic Web? , 2006, IEEE Internet Computing.

[56]  Peter Sewell,et al.  Cassandra: distributed access control policies with tunable expressiveness , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[57]  Timothy W. Finin,et al.  Authorization and privacy for semantic Web services , 2004, IEEE Intelligent Systems.

[58]  John G. Breslin,et al.  Social Network and Data Portability using Semantic Web Technologies , 2008, BIS.

[59]  Axel Polleres,et al.  Enabling Trust and Privacy on the Social Web , 2009 .

[60]  Norbert E. Fuchs,et al.  Semantic Web Policies - A Discussion of Requirements and Research Issues , 2006, ESWC.

[61]  Kaarel Kaljurand,et al.  Attempto Controlled English for Knowledge Representation , 2008, Reasoning Web.

[62]  Christian Bizer,et al.  Quality-driven information filtering using the WIQA policy framework , 2009, J. Web Semant..

[63]  María-del-Mar Gallardo,et al.  Semantic Access Control Model: A Formal Specification , 2005, ESORICS.

[64]  Diego Calvanese,et al.  The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.

[65]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[66]  Yogesh L. Simmhan,et al.  The Open Provenance Model (v1.01) , 2008 .

[67]  Marianne Winslett,et al.  How to Exploit Ontologies for Trust Negotiation , 2004, Trust@ISWC.

[68]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[69]  Chitta Baral,et al.  Knowledge Representation, Reasoning and Declarative Problem Solving , 2003 .

[70]  Jeffrey M. Bradshaw,et al.  KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[71]  Jaideep Srivastava,et al.  Building a web of trust without explicit trust ratings , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.

[72]  Pierangela Samarati,et al.  Regulating service access and information release on the Web , 2000, CCS.

[73]  Vassilis Christophides,et al.  On Explicit Provenance Management in RDF/S Graphs , 2009, Workshop on the Theory and Practice of Provenance.

[74]  John G. Breslin,et al.  Using Semantics to Enhance the Blogging Experience , 2006, ESWC.

[75]  Orri Erling,et al.  Linked Data Spaces & Data Portability , 2008, LDOW.

[76]  Deborah L. McGuinness,et al.  Tracking RDF Graph Provenance using RDF Molecules , 2005 .

[77]  Roy Fielding,et al.  Architectural Styles and the Design of Network-based Software Architectures"; Doctoral dissertation , 2000 .

[78]  Andy Seaborne,et al.  SPARQL/Update: A language for updating RDF graphs , 2007 .

[79]  James A. Hendler,et al.  Metcalfe's law, Web 2.0, and the Semantic Web , 2008, J. Web Semant..

[80]  Gerald Reif,et al.  SemClip - Overcoming the Semantic Gap Between Desktop Applications , 2007, Semantic Web Challenge.

[81]  John G. Breslin,et al.  semiBlog — Semantic Publishing of Desktop Data , 2006 .

[82]  James Clark,et al.  XSL Transformations (XSLT) Version 1.0 , 1999 .

[83]  Fausto Giunchiglia,et al.  Lightweight Ontologies , 2009, Encyclopedia of Database Systems.

[84]  John G. Breslin,et al.  Microblogging: A Semantic Web and Distributed Approach , 2008 .

[85]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..