Changes between Version 14 and Version 15 of SD2010-SemTech-Project-session
- Timestamp:
- 06/10/10 10:32:35 (14 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
SD2010-SemTech-Project-session
v14 v15 12 12 * Abstract: The presentation will highlight how formal logical representations can be used for information retrieval purposes in indefinite contexts such as, e.g., multimedia information systems. In these contexts, data is inherently unstructured and under-determined, and statements which cannot be derived to hold cannot be assumed to be false (in particular if data is provided incrementally, which is often the case). Furthermore, not knowing concrete names for objects set into relation to a certain object at a specific point in time cannot be handled by assuming that they do not exist, or by even signalling an exception. The presentation shows how expressive logical representation formalisms can nevertheless be used to provide certain answers. We will also show how additional data descriptions can be systematically derived such that symbolic structures better represent which meaning a set of data has for humans in a certain context. 13 13 14 !14:30 - !14:50 [https://www.posccaesar.org/attachment/wiki/SD2010-SemTech-Project-session/chowdhury_SemanticDays02062010-.pdf Applicability of Semantic Technologies in Security, Privacy and Trust] '''', by Mohammad Chowdhury, UNIK-University Graduate Center at Kjeller, Norway14 !14:30 - !14:50 [https://www.posccaesar.org/attachment/wiki/SD2010-SemTech-Project-session/chowdhury_SemanticDays02062010-.pdf Applicability of Semantic Technologies in Security, Privacy and Trust], by Mohammad Chowdhury, UNIK-University Graduate Center at Kjeller, Norway 15 15 16 16 * Abstract: Secure and privacy aware access can be achieved through access control mechanism. There are challenges in the specification of flexible, personalized and granular access constraints. These concerns can be addressed by the semantic technologies through the formal knowledge representation, rule-based constraint specification and automated reasoning capabilities. Such semantic access control mechanism can be applied not only on the Web but also in the context of devices. This talk provides an architectural overview of the mechanism including a brief presentation of the research results and some of the research challenges.