• Title/Summary/Keyword: semantic security

Search Result 97, Processing Time 0.02 seconds

Modern Linguistics: Theoretical Aspects of the Development of Cognitive Semantics

  • Nataliia Mushyrovska;Liudmyla Yursa;Oksana Neher;Iryna Pavliuk
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.162-168
    • /
    • 2023
  • This article presents an examination of the major cognitive-semantic theories in linguistics (Langacker, Lakoff, Fillmore, Croft). The CST's foundations are discussed concerning the educational policy changes, which are necessary to improve the linguistic disciplines in the changing context of higher education, as well as the empowerment and development of the industry. It is relevant in the light of the linguistic specialists' quality training and the development of effective methods of language learning. Consideration of the theories content, tools, and methods of language teaching, which are an important component of quality teaching and the formation of a set of knowledge and skills of students of linguistic specialties, remains crucial. This study aims to establish the main theoretical positions and directions of cognitive-semantic theory in linguistics, determine the usefulness of teaching the basics of cognitive linguistics, the feasibility of using methods of cognitive-semantic nature in the learning process. During the research, the methods of linguistic description and observation, analysis, and synthesis were applied. The result of the study is to establish the need to study basic linguistic theories, as well as general theoretical precepts of cognitive linguistics, which remains one of the effective directions in the postmodern mainstream. It also clarifies the place of the main cognitive-semantic theories in the teaching linguistics' practice of the XXI century.

An extended Access Control with Uncertain Context

  • Kang, Woojun
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.66-74
    • /
    • 2018
  • While new information technology advances have made information access and acquisition methods much more diverse and easier, there are side effects that allow illegal access using diverse and high-performance tools. In order to cope with such threats, there are access control methods in database technology, and various studies are being conducted to extend traditional access control to cope with new computing environments. In this paper, we propose an extended access control with uncertain context-awareness. It enables appropriate security policy enforcement even if the contextual constraints specified by the security policy does not match those accompanied by access request query. We extract semantic implications from context tree, and define the argument that can quantitatively measure the semantic difference between two nodes in the context tree. It is used to semantically enforce the security policy, and to prevent the excessive authorization caused by the implication.

An Efficient Privacy Preserving Method based on Semantic Security Policy Enforcement (의미적 보안정책 집행에 의한 효율적 개인정보보호 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2013
  • New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. To challenge these threats, various extended access control methods are being studied. We suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules via their semantic relationship. New our approach derives semantic implications using tree hierarchy structure and coordinates the exceed privileges using semantic gap factor calculating the degree of the discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.

Analysis of Web Browser Security Configuration Options

  • Jillepalli, Ananth A.;de Leon, Daniel Conte;Steiner, Stuart;Alves-Foss, Jim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6139-6160
    • /
    • 2018
  • For ease of use and access, web browsers are now being used to access and modify sensitive data and systems including critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully updated. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations. However, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure web browsing ecosystem. We analyzed more than a 1000 browser security configuration options in three major browsers and found that only 13 configuration options had syntactic and semantic similarity, while 4 configuration options had semantic similarity, but not syntactic similarity. We: a) describe the results of our in-depth analysis of browser security configuration options; b) demonstrate the complexity of policy-based configuration of web browsers; c) describe a knowledge-based solution that would enable organizations to implement highly-granular and policy-level secure configurations for their information and operational technology browsing infrastructures at the enterprise scale; and d) argue for necessity of developing a common language and semantics for web browser configurations.

Semantic Interoperability Framework for IAAS Resources in Multi-Cloud Environment

  • Benhssayen, Karima;Ettalbi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.1-8
    • /
    • 2021
  • Cloud computing has proven its efficiency, especially after the increasing number of cloud services offered by a wide range of cloud providers, from different domains. Despite, these cloud services are mostly heterogeneous. Consequently, and due to the rising interest of cloud consumers to adhere to a multi-cloud environment instead of being locked-in to one cloud provider, the need for semantically interconnecting different cloud services from different cloud providers is a crucial and important task to ensure. In addition, considerable research efforts proposed interoperability solutions leading to different representation models of cloud services. In this work, we present our solution to overcome this limitation, precisely in the IAAS service model. This solution is a framework permitting the semantic interoperability of different IAAS resources in a multi-cloud environment, in order to assist cloud consumers to retrieve the cloud resource that meets specific requirements.

A Study on the Notion of Security for Public-Key Encryption Schemes (공개키 암호 방식의 안전성 개념에 관한 연구)

  • 강주성;박춘식
    • Review of KIISC
    • /
    • v.8 no.4
    • /
    • pp.5-14
    • /
    • 1998
  • 본 논문에서는 공개키 암호 방식에 대한 안전성 개념들을 종합적으로 조사하고 분석한다. 의미론적 안전성(semantic security ), 구별불능 안전성(indistinguishable encryption), NM- 안전성(non-malleability)등에 대한 개념을 소개한다. 그리고 이들 개념에 공격(attack)관점의 안전성을 결합한 정의에 대해서 고찰하며, 소개한 개념들 사이의 수학적 관계를 규명한다.

  • PDF

Development of the Recommender System of Arabic Books Based on the Content Similarity

  • Alotaibi, Shaykhah Hajed;Khan, Muhammad Badruddin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.175-186
    • /
    • 2022
  • This research article develops an Arabic books' recommendation system, which is based on the content similarity that assists users to search for the right book and predict the appropriate and suitable books pertaining to their literary style. In fact, the system directs its users toward books, which can meet their needs from a large dataset of Information. Further, this system makes its predictions based on a set of data that is gathered from different books and converts it to vectors by using the TF-IDF system. After that, the recommendation algorithms such as the cosine similarity, the sequence matcher similarity, and the semantic similarity aggregate data to produce an efficient and effective recommendation. This approach is advantageous in recommending previously unrated books to users with unique interests. It is found to be proven from the obtained results that the results of the cosine similarity of the full content of books, the results of the sequence matcher similarity of Arabic titles of the books, and the results of the semantic similarity of English titles of the books are the best obtained results, and extremely close to the average of the result related to the human assigned/annotated similarity. Flask web application is developed with a simple interface to show the recommended Arabic books by using cosine similarity, sequence matcher similarity, and semantic similarity algorithms with all experiments that are conducted.

Knowledge Representation Using Fuzzy Ontologies: A Survey

  • V.Manikandabalaji;R.Sivakumar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.199-203
    • /
    • 2023
  • In recent decades, the growth of communication technology has resulted in an explosion of data-related information. Ontology perception is being used as a growing requirement to integrate data and unique functionalities. Ontologies are not only critical for transforming the traditional web into the semantic web but also for the development of intelligent applications that use semantic enrichment and machine learning to transform data into smart data. To address these unclear facts, several researchers have been focused on expanding ontologies and semantic web technologies. Due to the lack of clear-cut limitations, ontologies would not suffice to deliver uncertain information among domain ideas, conceptual formalism supplied by traditional. To deal with this ambiguity, it is suggested that fuzzy ontologies should be used. It employs Ontology to introduce fuzzy logical policies for ambiguous area concepts such as darkness, heat, thickness, creaminess, and so on in a device-readable and compatible format. This survey efforts to provide a brief and conveniently understandable study of the research directions taken in the domain of ontology to deal with fuzzy information; reconcile various definitions observed in scientific literature, and identify some of the domain's future research-challenging scenarios. This work is hoping that this evaluation can be treasured by fuzzy ontology scholars. This paper concludes by the way of reviewing present research and stating research gaps for buddy researchers.

Assessment of performance of machine learning based similarities calculated for different English translations of Holy Quran

  • Al Ghamdi, Norah Mohammad;Khan, Muhammad Badruddin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.111-118
    • /
    • 2022
  • This research article presents the work that is related to the application of different machine learning based similarity techniques on religious text for identifying similarities and differences among its various translations. The dataset includes 10 different English translations of verses (Arabic: Ayah) of two Surahs (chapters) namely, Al-Humazah and An-Nasr. The quantitative similarity values for different translations for the same verse were calculated by using the cosine similarity and semantic similarity. The corpus went through two series of experiments: before pre-processing and after pre-processing. In order to determine the performance of machine learning based similarities, human annotated similarities between translations of two Surahs (chapters) namely Al-Humazah and An-Nasr were recorded to construct the ground truth. The average difference between the human annotated similarity and the cosine similarity for Surah (chapter) Al-Humazah was found to be 1.38 per verse (ayah) per pair of translation. After pre-processing, the average difference increased to 2.24. Moreover, the average difference between human annotated similarity and semantic similarity for Surah (chapter) Al-Humazah was found to be 0.09 per verse (Ayah) per pair of translation. After pre-processing, it increased to 0.78. For the Surah (chapter) An-Nasr, before preprocessing, the average difference between human annotated similarity and cosine similarity was found to be 1.93 per verse (Ayah), per pair of translation. And. After pre-processing, the average difference further increased to 2.47. The average difference between the human annotated similarity and the semantic similarity for Surah An-Nasr before preprocessing was found to be 0.93 and after pre-processing, it was reduced to 0.87 per verse (ayah) per pair of translation. The results showed that as expected, the semantic similarity was proven to be better measurement indicator for calculation of the word meaning.

A Method for Access Control on Uncertain Context (불확정 상황정보 상에서의 접근제어 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.215-223
    • /
    • 2010
  • New information technologies make it easy to access and acquire information in various ways. However, It also enable powerful and various threat to system security. The prominent database technology challenging these threats is access control. Currently, to keep pace with the new paradigms, new extended access control methods are challenged. We study access control with uncertain context. With respect to access control, it is possible that there is a discrepancy between the syntactic phrase in security policies and that in queries, called semantic gap problem. In our semantic access control, we extract semantic implications from context tree and introduce the measure factor to calculate the degree of the discrepancy, which is used to control the exceed privileges.