Skip to main content

On the Use of Semantic Technologies to Model and Control Security, Privacy and Dependability in Complex Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6894))

Abstract

In this paper a semantic approach is presented to model and control Security, Privacy and Dependability (SPD) in complex interconnected environment composed by heterogeneous Embedded Systems.

Usually, only the individual properties are locally considered to obtain desired functionalities and this could result in sub-optimal solutions. With the use of modern semantic technologies (like OWL or reasoning engines) it is possible to model not only the individual parameters but also the relations between the different (and dynamically changing) parts of the systems, thus providing enriched knowledge and more useful information that could feed control algorithms.

The model presented in this paper is based on the results obtained during the first phase of the pSHIELD project (conceived and lead by Finmeccanica) and it is focused on a concrete application coming from a critical scenario in railway environment: the monitoring of freight trains transporting hazardous material.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Common Criteria for Information Technology Security Evaluation, v3.1 (July 2009)

    Google Scholar 

  2. Ding, L., Kolari, P., Ding, Z., Avancha, S.: Using Ontologies in the Semantic Web: A Survey. Ontologies 14, 79–113 (2007)

    Article  Google Scholar 

  3. Mascardi, V., Locoro, A., Rosso, P.: Automatic Ontology Matching via Upper Ontologies: A Systematic Evaluation. IEEE Transactions on Knowledge and Data Engineering 22(5), 609–623 (2010)

    Article  Google Scholar 

  4. Henkel, J., Narayanan, V., Parameswaran, S., Ragel, R.: Security and Dependability of Embedded Systems: A Computer Architects’ Perspective”. In: 22nd International Conference on VLSI Design 2009, pp. 30–33 (2009), doi:10.1109/VLSI.Design.2009.114

    Google Scholar 

  5. pSHIELD Technical Annex (June 2010)

    Google Scholar 

  6. Dean, M., Schreiber, G.: OWL Web Ontology Language Reference, http://www.w3.org/TR/2004/REC-owl-ref-20040210/

  7. McGuinness, D.L., van Harmelen, F.: OWL Web Ontology Language Overview, http://www.w3.org/TR/owl-features/

  8. Compton, M., Henson, C., Lefort, L., Neuhaus, H., Sheth, A.: A Survey of the Semantic Specication of Sensors. In: Proc. Semantic Sensor Networks 2009, pp. 17–32 (2009)

    Google Scholar 

  9. Gaines, B., Shaw, M.: Integrated knowledge acquisition architectures. Journal of Intelligent Information Systems 1(1), 9–34 (1992)

    Article  Google Scholar 

  10. Grosso, E., Eriksson, H., Fergerson, R., Tu, S., Musen, M.: Knowledge modeling at the millennium — the design and evolution of Protégé-2000. In: Proceedings of KAW 1999, Banff, Canada (1999)

    Google Scholar 

  11. Staab, S., Schnurr, H.-P., Studer, R., Sure, Y.: Knowledge processes and ontologies. IEEE Intelligent Systems 16(1) (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fiaschetti, A. et al. (2011). On the Use of Semantic Technologies to Model and Control Security, Privacy and Dependability in Complex Systems. In: Flammini, F., Bologna, S., Vittorini, V. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2011. Lecture Notes in Computer Science, vol 6894. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24270-0_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24270-0_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24269-4

  • Online ISBN: 978-3-642-24270-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics