Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.


Access control, 159f
cloud computing, security challenges, 392
leveraging semantic web technologies
DEMONS ontological access control model, 499–502
implementing RBAC, with ontologies, 494–495
online social networks (OSNs), 498–499
ontology-based context awareness, 496–497
overview of, 493–494
state-of-the-art ontological models, 502–503
user preferences, 497–498
XACML attribute model, 495–496
ontological rule, 497–498, 501f
privacy-aware, 493–494
semantic models, 503t
virtual infrastructure setup, 392
Access control lists (ACLs), 425–426
Access control ontology (ACO), 498–499
Acquisition program protection planning, 11f
A3 cross-site scripting, 483

Get Emerging Trends in ICT Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.