Index

Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.

A

Access control, 159f
cloud computing, security challenges, 392
leveraging semantic web technologies
DEMONS ontological access control model, 499–502
implementing RBAC, with ontologies, 494–495
online social networks (OSNs), 498–499
ontology-based context awareness, 496–497
overview of, 493–494
state-of-the-art ontological models, 502–503
user preferences, 497–498
XACML attribute model, 495–496
ontological rule, 497–498, 501f
privacy-aware, 493–494
semantic models, 503t
virtual infrastructure setup, 392
Access control lists (ACLs), 425–426
Access control ontology (ACO), 498–499
Acquisition program protection planning, 11f
A3 cross-site scripting, 483

Get Emerging Trends in ICT Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.