<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Semantic Insecurity: Security and the Semantic Web</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Harry</forename><surname>Halpin</surname></persName>
							<email>harry.halpin@inria.fr</email>
							<affiliation key="aff0">
								<orgName type="institution">INRIA</orgName>
								<address>
									<addrLine>2 rue Simone Iff</addrLine>
									<postCode>75012</postCode>
									<settlement>Paris</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Semantic Insecurity: Security and the Semantic Web</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DA2130CE5CDFE4AF2859A9E03A36E12A</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T08:48+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>security</term>
					<term>TLS</term>
					<term>WebID</term>
					<term>Semantic Web</term>
					<term>RDF</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Strangely enough, the Semantic Web has fallen behind the rest of the Web in terms of security. TLS is not in use currently for the majority of URIs on the Semantic Web, and this leads to a number of potential attacks on the network, web, and even semantic level. After explaining the necessity and arguments over the TLS on the Semantic Web, we point out security and privacy flaws in WebID+TLS and recent other proposed Semantic Web standards at the W3C. We propose a new kind of attacker, a semantic attacker, that attacks inference procedures. Lastly, we propose alternatives, including the use of modern cryptography that prevent attacks by virtue of using TLS, and how W3C standards such as the W3C Web Cryptography API and IETF OAuth can solve the use-cases needed by the Semantic Web.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Currently, the Semantic Web claims to be the future of the Web, but unlike alternative visions such as blockchain-based technology, the Semantic Web has no privacy or security considerations. This is a rather embarassing state of affairs for a Web standard that wants to connect the world's data. Whether or not the poor security and privacy of the Semantic Web can be rectified needs serious analysis if the entire research endeavour is to be taken seriously, and considerable work if the Semantic Web is to ever be deployed, particularly for use-cases involving personal data.</p><p>The Semantic Web is based on linked data where items of interest are identified by URIs (Uniform Resource Identifiers) such as http://www.example.org. Due to this design choice, to a large extent the Semantic Web crucially depends on these identifiers being able to successfully retrieve documents in order to put the "Web" into the Semantic Web. Strangely enough, the Semantic Web has fallen behind the rest of the Web in terms of security.</p><p>As the core Semantic Web technologies were standardized by the W3C before the widespread use of TLS and the Same Origin Policy was formalized, the Semantic Web was designed without any security considerations. Yet today there is almost no academic work on security in terms of the Semantic Web <ref type="bibr" target="#b22">[23]</ref>. Rather unfortunately, there also seems to be considerable confusion about security in existing Semantic Web deployments like Solid, <ref type="foot" target="#foot_0">1</ref> ranging from confusion over the security problems in HTTP URIs to misuse of cryptography in WebID+TLS. <ref type="foot" target="#foot_1">2</ref>This also problematically leads to the Semantic Web to become a privacy risk for personal data, rather than being a force for privacy.</p><p>First, we review related literature on security, showing how this is the first work to look at the security of the Semantic Web itself in Section 2. Then security is defined in Section 3 via the classical definition of semantic security from provable security, and we introduce the symbolic model for protocol analysis <ref type="bibr" target="#b12">[13]</ref>. Then we outline the three different kinds of potential attacks on Semantic Web architecture, following the lead of Barth et al.'s formalization of Web Security in general, but with the addition of a new attacker, the semantic attacker <ref type="bibr" target="#b0">[1]</ref>:</p><p>1. The Network attacker: On the network level, we show TLS is not in use currently for the majority of URIs on the Semantic Web, leading to trivial attacks on Linked Data in Section 4. 2. The Web attacker: On the level of Web applications, we show proposed standards like WebID+TLS and the W3C Social Web standards have cryptographic security flaws in Section 5. 3. The Semantic attacker: On the level of inference procedures, we show how the preceding two levels can lead to attacks that can lead to corrupted inferences in Section 6.</p><p>In general, the dependency of data retrieval and inferences based on insecure Semantic Web data can lead to attacks on trusted semantics of the Semantic Web itself. In Section 7, we demonstrate that this does not have to be the case: A number of standards from the IETF and W3C can be used to upgrade the Semantic Web to modern security-best practices, leading to a secure Semantic Web.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Literature</head><p>There has been a large amount of previous research on the security of the Semantic Web, yet none of it looks at the security properties of the Semantic Web infrastructure itself. In general, there have been three streams of research on security on the Semantic Web: Semantic Web policy languages for access control, Semantic Web ontologies for cybersecurity, and problems with privacy in publishing Semantic Web data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Semantic Web-based Access Control</head><p>By far the largest amount of research has been done on access control languages for the Semantic Web, such as Rei <ref type="bibr" target="#b19">[20]</ref> and more recently the use of N3Logic <ref type="bibr" target="#b3">[4]</ref> with a sketch of a future W3C standard for Web Access Control (WAC). <ref type="foot" target="#foot_2">3</ref> All of these approaches descend from an attempt to model the permissions and obligations between agents that would be operating on Semantic Web data using speech acts <ref type="bibr" target="#b19">[20]</ref>, with the goal to maintain some security policy during a distributed activity such as Semantic Web Service composition. In practice these approaches are mostly useful for interoperation between various access control policies. Policy languages are typically used with mandatory access control (possibly extended to role-based and attribute-based access control), which relies on a central trusted party such as an OS to actually enforce the access control <ref type="bibr" target="#b24">[25]</ref>, and such a centralized trusted party is missing on the open Web except on the level of individual web-sites. The primary innovation in using the Semantic Web for policy languages is distributed access control. Rather than policy languages, much of the rest of the Web depends on a capabilities-based approach as given by OAuth <ref type="bibr" target="#b13">[14]</ref>. This line of research on policy languages has been the source of much innovation but is orthogonal to the security concerns of Semantic Web data itself, upon which these policy languages depend for use in their inference.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Ontologies for cybersecurity</head><p>Another approach is to classify the kinds of attacks and security vulnerabilities into a traditional OWL-based Semantic Web ontology <ref type="bibr" target="#b23">[24]</ref>. Although such work is interesting, and could be combined with provenance-based data integration in order to help, for example, the U.S. Department of Homeland Security in combining data about cyber-attacks, this approach does not actually discuss the problems inherent in using such ontologies within an adversarial environment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Privacy ramifications of Open Data</head><p>While publishing open data using Semantic Web standards may appear to be a public good, even innocuous public data such as road data may serve to deanonymize users and so reveal personal or sensitive data, ranging from whether or not a property is abandoned to enabling the discovery of sexual preference <ref type="bibr" target="#b9">[10]</ref>. In order to prevent these problems, the publication and search of encrypted RDF data has been proposed <ref type="bibr" target="#b20">[21]</ref>, as well as differential privacy <ref type="bibr" target="#b15">[16]</ref>, but so far neither have been implemented. Although there has been increased advocacy by Berners-Lee for the use of Semantic Web standards to "decentralize the Web" and provide personal data <ref type="bibr" target="#b21">[22]</ref>, the very same use of the Semantic Web for data integration can be used by third parties in order to build FBI Fusion Centers in the USA <ref type="bibr" target="#b31">[32]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4">Semantic Web Security</head><p>Although previous research has noted on a very high-level "securing RDF is much more challenging" than traditional XML and HTML-based infrastructure as "we also need to ensure that security is preserved at the semantic level" <ref type="bibr" target="#b28">[29]</ref>, so far there is no research in this direction that go beyond the mere "idea of semantic web security standardization" <ref type="bibr" target="#b22">[23]</ref> Instead, enterprise and government users simply believe that it is best to "access control or security occurs at the layer of the HTTP access and protocols, and not at the linked data layer." 4   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Defining Semantic Security</head><p>What is security? Security is defined in terms of an attacker(or "threat model"). Informally, if a message is encrypted, an attacker can not discover the original message without a secret key that the attacker does not have. The original message is called the "cleartext" (M ) and the message encrypted by the secret key is called the "ciphertext" (C). In terms of encryption and decryption, it is E(M ) → C and D(C) → M . To define this more precisely involves defining the property of semantic security, as defined by Goldwasser and Micali: "Whatever is efficiently computable about the cleartext given the ciphertext, is also efficiently computable without the ciphertext" <ref type="bibr" target="#b12">[13]</ref>, i.e. P (f (M |C) = P (f (M )) for any computable function f . To rephrase, an attacker can gain nothing in terms of information if the ciphertext has been intercepted. Formally semantic security is equivalent to indistinguishability under chosen plaintext attack (IND-CPA) by a computationally bounded adversary for a given bound . However, in this work for the sake of simplicity, definitions will given using the symbolic model, where the attacker is not considered computationally bounded and cryptographic primitives are considered functions over bitstrings in an abstract algebra <ref type="bibr" target="#b11">[12]</ref>. This is a useful formalism as it can be easily automated by formal proof-proving tools <ref type="bibr" target="#b7">[8]</ref>. The attacker breaks the security of a ciphertext if the attacker (A) knows the plaintext even if the message is encrypted, i.e. knows(A, M ) ∧ E(M ).</p><p>Separable from security and less rigorously defined is privacy. Privacy is typically defined relative to an anonymity set, i.e. requiring the entity not being identifiable within a set of entities (the anonymity set) by an adversary. Privacy can be phrased in terms of unlinkability, namely that an entity can not be linked to their actions (in this context "link" means a information-theoretic reduction of the anonymity set, an entirely different notion than a hyperlink or link between RDF documents). On the Web, users are entities whose primary action is visiting a web-site, where a website is defined by an origin, where the origin is the domain name without the scheme, i.e. origin.org without the http scheme. The linking (i.e. "tracking") of users between origins violates their privacy. On the Web, the privacy and security boundary is given by the same origin policy: Any code or data on the user's browser is restricted by origin. So a cookie from http://origin.org should be accessible from https://origin.org and any subpages such as http://origin.org/page.html, but should not be accessible from http://origin2.org, and a user visiting the latter should not be connected by a third party (such as the website themselves are a third-party advertising bureau). The same goes for any state changes in the browser, including information in localStorage in the browser.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">The Lack of Network Layer Security (TLS) on the Semantic Web</head><p>Transport Layer Security (TLS) is the well-known IETF standard for encrypting content transmitted over HTTP. <ref type="foot" target="#foot_3">5</ref> In addition to encrypting data sent over HTTP, the server that delivers the HTTP message can be authenticated with a certificate (a public key attached to its domain name), so that the origin can be proven to have sent the message. <ref type="foot" target="#foot_4">6</ref> Users do not authenticate to servers using TLS as specified by the IETF, but only the web site authenticates. This means that resources hosted on URIs without TLS are vulnerable to having their content intercepted, which is equivalent to the adversary visiting the site rather than the user. Note the adversary can remove any additional messages (such as HTTP headers or certificates that are in plaintext) and replay the message without those messages. Worse, the content could be altered by an attacker without the possibility of a user knowing that this is the case, giving the user a fake resource.</p><p>Why not use TLS on the Semantic Web to preserve security and privacy? When a URI is enabled with TLS, the URI uses HTTPS as its scheme in the URI rather than HTTP. TLS was called informally "SSL" (Secure Sockets Layer), and HTTP with TLS enabled adds a "S" for historical reasons to become HTTPS. Unfortunately, the RDF specification states that HTTP and HTTPS URIs are not the same: "Two IRIs are equal if and only if they are equivalent under Simple String Comparison ... further normalization MUST NOT be performed when comparing IRIs for equality" <ref type="bibr" target="#b10">[11]</ref>. Using owl:sameAs (or to preserve the correct semantics, owl:equivalentClass and owl:equivalentProperty when needed) between HTTP and HTTPS URIs does not work as these are statements about the things a URI denotes <ref type="bibr" target="#b14">[15]</ref>, not the text of the URI itself. RDF also does not have a way to talk about a URI itself via a mechanism such as quoting.</p><p>One could claim a Semantic Web URI is only a name and so the usage of TLS is not required. If there is no access to the content of the URI, URIs are the same as any other arbitrary string in a knowledge representation language, and so using HTTP or HTTPS has no effect on the formal semantics that determine the inferences that result from a Semantic Web reasoning engine. There would hold also be no problem if all Semantic Web resources were behind a perfectly secure enterprise firewall. Yet if this was truly the case then there really is no "Web" in the Semantic Web, and so the use of long HTTP URIs on the Semantic Web is simply an odd naming convention. The opposing view has also been argued by the Linked Data community that URIs should be linked to actual data that can be retrieved by Semantic Web applications <ref type="bibr" target="#b6">[7]</ref>. The entire point of Linked Data is that a URI should have RDF statements available via HTTP about the resource(s) denoted by the URI. Further, if a user agent such as a browser can follow one URI to another via the links given by the RDF statements and so can "follow your nose" to discover new RDF statements that form a more complete knowledge representation of the resource.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Attacks</head><p>If TLS is not used on a origin, a network attacker may perform a number of attacks. The goal of the network attacker is to gain access to the plaintext of the resource retrieved from an origin. The first attack is trivial: If all data is sent over using HTTP, then the attacker can intercept the HTTP traffic. Also, an attacker can deliver whatever data they want to the unsuspecting user without detection due to the origin not being authenticated. For example, if one is retrieving open government data in Linked Data about the expenses given by the French government for the upkeep of the Eiffel Tower and the revenue created by tourists visiting the Eiffel Tower, and an attacker wanted to maliciously to prove to the French government that the Eiffel Tower was a bad investment, then the attacker could simply intercept the HTTP traffic hosted at the website and so change the numbers in the government data. It would be impossible for a user, such as a journalist, to tell if their HTTP traffic was tampered with by an attacker. This is a very easy attack that can be done using open-source tools such as wireshark <ref type="foot" target="#foot_5">7</ref> and sslstrip. <ref type="foot" target="#foot_6">8</ref>Opportunistic encryption that automatically upgrades HTTP to HTTPS can be done by using the W3C Upgrade Insecure Requests specification where a server requests that a HTTPS URI be used if possible via a HTTP Header <ref type="bibr" target="#b32">[33]</ref>. The server can then use a HSTS header to prevent any downgrade attacks that stripped the 'S' off the HTTPS in a URI <ref type="bibr" target="#b16">[17]</ref>. In this way, a browser or Semantic Web application can ask for a Semantic Web HTTP URI and retrieve content from a HTTPS URI. The W3C began to use this methodology on its site, including RDF namespaces. <ref type="foot" target="#foot_7">9</ref> However, although the W3C has put hope in the eventual use of Upgrade Insecure Requests and HSTS, and to just "keep writing 'http:' and trust that the infrastructure will quietly switch over to TLS." <ref type="foot" target="#foot_8">10</ref> This path makes insecure HTTP URIs the default mode, and does not offer any reason for the Semantic Web to upgrade to TLS.</p><p>However, the attack is that the Upgrade Insecure Requests headers are delivered over HTTP, any attacker actively watching the unencrypted HTTP redirection can simply strip those headers to prevent upgrade to HTTPS and allow the HTTP content to be attacked by sending the same request, but stripped of the header. This allows the attacker to impersonate the user and intercept the unencrypted resource. So to just keep using HTTP URIs and hope for the best does not solve the problem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Defenses</head><p>So why should Linked Data use HTTPS rather than HTTP URIs? URIs are also exposed to HTML links, and thus Tim Berners-Lee is rightfully worried that a switch to HTTP violates his principle that "Cool URIs Don't Change" <ref type="foot" target="#foot_9">11</ref> and so the adoption of HTTPS would break existing links. Berners-Lee goes even further:"Put simply, the HTTPS Everywhere campaign taken at face value completely breaks the web. In a way it is arguably a greater threat to the integrity for the web than anything else in its history" <ref type="bibr" target="#b2">[3]</ref>. Indeed, network-level information about encryption (i.e. the use of HTTPS) should not have been exposed to the application level. One can still declare by fiat that all HTTPS URIs are equivalent to HTTP URIs on the Semantic Web: "If two URIs differ only in the 's' of 'https:', then they may never be used for different things." <ref type="foot" target="#foot_10">12</ref> However, this proposal has not been accepted and Upgrade Insecure Requests still requires an unencrypted HTTP response. The recommended solution should be to use HTTPS on all origins that host Linked Data. This is a serious problem for the Semantic Web community as the use of TLS-enabled HTTP URIs on the Semantic Web is minuscule, being less than .1% of Semantic Web URIs. <ref type="foot" target="#foot_11">13</ref> In comparsion in January 2017, the rest of the Web has 50% usage of TLS. 14   5 Application-level Attacks on the Semantic Web Unfortunately, even if TLS is used correctly on the network level, there may be attacks on the level of the Web application by a Web attacker <ref type="bibr" target="#b0">[1]</ref>. The goal of a Web attacker is to violate the privacy of a user as defined in Section 3. In terms of models, this means that not only can a user and an attacker visit websites to retrieve resources and gain knowledge of them, but now origins are actors that work on behalf of users and may thus interact with other origins (i.e. "visit sites") and have knowledge as well. This new paradigm can lead a Web attacker to have new attacks, in particular to impersonate a user to a given origin. As Semantic Web application-level standards do not use modern cryptography and violate the same origin policy, Web attackers can be successful. First, we'll look in detail at WebID+TLS in detail and then give an overview of security issues in a wider emerging stack of standards for distributed social networking from the W3C based on the Semantic Web.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">WebID+TLS considered Harmful</head><p>Background There has been some awareness of TLS in the Semantic Web community due to the WebID+TLS effort to use URIs as identifiers for people, with the evocative goal of creating decentralized social networking applications <ref type="bibr" target="#b26">[27]</ref>. The goal of WebID is that each person can have their own personal URI that maintains their identity on the Web and from which their personal data, given by RDF statements, can be retrieved. Variations on WebID+TLS have tried adding access control in order make sure that personal data can only be given to explicitly authorized agents rather than given to absolutely anyone who issues a HTTP request <ref type="bibr" target="#b29">[30]</ref>. In WebID+TLS, a user generates a client certificate using asymmetric cryptography (which contains a signature given by a private key stored in TLS keystore, as well as a link to their WebID URL) that is stored by the browser. 15 The public key can then be posted to the URI of their WebID URI. When a user wishes to authenticate themselves and authorize the transfer of their own personal RDF data from a site (called the identity provider on a distinct origin, following the terminology used in OAuth <ref type="bibr" target="#b13">[14]</ref>) to a third-party (a relying party), a Semantic Web application can ask the user to authenticate a TLS session using their client certificate to identify their browser, and since the client certificate stored by the browser is signed with the private key that corresponds to the public key on their WebID URI (i.e. the signature on the certificate can be verified using that public key), they can prove that the WebID URI is controlled by the same agent that controls the browser. Normal TLS requires only the server authenticate, but client certificates also allow a client to authenticate, creating a mutually authenticated TLS session (not done in normal TLS). The Diagram 1 illustrates the protocol flow, with the flow of sensitive personal data given in green:</p><p>1. User presents a self-signed client certificate to the relying party. 2. Relying party extracts URI of identity provider from client certificate and retrieves public key from identity provider. 3. If public key matches key in client certificate, authenticate user using a challenge-response. 4. Relying party retrieves personal RDF data from he identity provider.</p><p>Attacks Despite using TLS, the problem with WebID+TLS is that it violates the security and privacy boundaries of the Web. In WebID+TLS, the client certificate is currently created with the &lt;keygen&gt; tag and stored in the TLS keystore. However, due to its age (it predates the same origin policy) and the lack of privacy concerns when it was designed, a keygen-generated client certificate Fig. <ref type="figure">1</ref>. WebID Protocol Flow can be accessible from any origin, and so serve as a "super-cookie" to track users across origins.</p><p>If an attacker wants to track a user, the attacker can query and ask for a client certificate. A malicious attacker from one origin who wanted to re-identify a user on another origin could simply install a client certificate on the malicious origin and ask for the certificate again on another origin. Worse, the current userexperience around both generating and selecting client certificates is confusing, and neither the installation nor usage of client certificates by HTML is standardized, so the usage of client certificates in HTML depends on ad-hoc browser behavior dependent on a particular idiosyncratic per-browser interpretation of a MIME-type. <ref type="foot" target="#foot_12">16</ref>WebID+TLS is also based on out-of-date browser cryptography that is being deprecated by the browsers themselves. Even if the user does end up successfully identifying themselves with a client certificate, current browsers use the insecure MD5 hash function in the signed client certificate. MD5 has proven to not be collision resistant, which means that an attacker can generate a fake client certificate whose signature can be verified using the public key of a user even though the attacker does not have private key of the user <ref type="bibr" target="#b30">[31]</ref>. In this way, a user can be impersonated by an attacker.</p><p>Defenses Due to these security and privacy issues, browser vendors are currently deprecating keygen from HTML and client certificates handling from the application layer, which will mean WebID+TLS will stop working. Although the Semantic Web community has yet to engage with it, modern cryptographic primitives are now provided by the W3C Web Cryptography API. <ref type="foot" target="#foot_13">17</ref> Getting rid of passwords can be done via authentication by hardware tokens (or other authenticators) by the W3C Web Authentication API, which is designed both to not violate the same-origin policy (i.e. keys differ per origin) and use modern cryptographic primitives such as ECDSA <ref type="bibr" target="#b4">[5]</ref>. Much like the rest of the Web, the Semantic Web can use explicit authorization of personal data transfer using IETF standards like OAuth <ref type="bibr" target="#b13">[14]</ref>. By separating identities by origin and using modern cryptography, both the privacy and the security of users can be protected while enabling decentralized Semantic Web applications.</p><p>Part of the problem is a confusion over the layers of the Web: TLS is a network-level protocol, not an application level protocol. For example, interrupting a network-level TLS handshake in order to start a user-centric identity and authentication protocol in WebID+TLS is bad design insofar as it mixes the application-level concept of an "a person's identity" with the network level that just ships bits around. To some extent, the problems with the use of TLS on th e Semantic Web is that network level information (whether a HTTP connection is encrypted using TLS or not) is exposed on the level of a URI used in a Semantic Web applications, including but not limited to WebID+TLS. Web applications should use TLS to access origins but not use messages in the TLS flow such as certificates outside the network layer.</p><p>Instead, messages should be sent on the application level, as done in modern authorization protocols such as OAuth <ref type="bibr" target="#b13">[14]</ref>. There has been some claims We-bID+TLS is more private than OAuth. Although this is not true, as the identity provider is aware of all relying party transactions in both protocols, if user privacy against a malicious relying party is needed, then blind signatures can be used in OAuth to create unlinkability between a user's the identity provider and the relying party while still sending personal data <ref type="bibr" target="#b17">[18]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Privacy and Security Flaws in W3C Social Web standards</head><p>Although a complete analysis of these standards would require more space, the precedent set by WebID+TLS is troubling insofar as other W3C Semantic Web standards and proposed standards do not take into account adversaries or modern cryptography as well. To continue our analysis of Solid, Solid allows a user after authentication via WebID+TLS to read and write data using HTTP GET and POST verbs with additional. However, again if a local POST is done to a HTTP origin rather than a HTTPS origin, all the attacks in Section 4 apply as the request and any Link headers will be unencrypted. Solid uses W3C Linked Data Notifications<ref type="foot" target="#foot_14">18</ref> to share RDF data using either the Linked Data Platform or a publish-subscribe model following the W3C WebSub Recommendation. <ref type="foot" target="#foot_15">19</ref>While Linked Data Notifications requires signing data and a whitelist, but does not specify how either can be done. In terms of signatures, proposed stan-dards such as Linked Data Signatures<ref type="foot" target="#foot_16">20</ref> repeat the mistakes of XML Digital Signatures: There is a complex canonicalization algorithm that does not specify how to resolve problems noted by earlier research <ref type="bibr" target="#b8">[9]</ref> in chosing how to serialize a RDF graph in order (i.e. the "Expansion Algorithm" is undocumented in RDF Dataset normalization as used by Linked Data Signatures<ref type="foot" target="#foot_17">21</ref> and in the payload has a signature that can be simply detached by an attacker and replaced by the attacker's signature (a "signature stripping" attack) <ref type="bibr" target="#b18">[19]</ref>. Linked Data Signatures ignores the foundations of digital signatures, namely that digital signatures require concrete byte-strings, and so do not work over abstract graphs without canonicalization. So it is unclear why Linked Data Signatures could simply convert the RDF to a binary string (via a "base64" transformation), the payload as is recommended by the IETF JOSE Working Group. <ref type="foot" target="#foot_18">22</ref>WebSub claims to support digital signatures for authentication to prevent Sybil attacks (an attack where, due to lack of mutual authentication in publishsubscribe, server is overwhelmed by client requests or a server overwhelms a client with requests), but does not use asymmetric digital signatures, instead relying on a shared secret to create a HMAC (i.e. symmetric cryptography). Yet the shared secret is simply sent along optionally with the first message, and given a server must accept re-requests (possibly with new shared secrets), unless TLS connections are used on both the client and server in WebSub, the shared secret may be intercepted or re-set at any time. WebSub has only the callback URL of the subscriber require HTTPS, and the initial shared secret is sent back not with the callback URL but by the first subscription request. Lastly, the broken SHA-1 hash function is supported for calculation of the HMAC. These problems of authentication in scalable pub-sub systems are known to the research community, and solutions have been proposed relying on identity-based cryptography that are not used in WebSub <ref type="bibr" target="#b27">[28]</ref>. Thus, it can be shown that the problems of authentication and the failure to use well-known cryptographic techniques continues to be a problem in further proposed Semantic Web standards.</p><p>6 Semantic Attackers</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1">Background</head><p>While earlier attacks are generic results of either the lack of network-level encryption in TLS or bad protocol design, the Semantic Web enables a new class of attacker specific to RDF. In detail, this Semantic attacker has the goal of altering inference procedures. This kind of if the Semantic attacker builds on attacks on the network, and possibly the Web level, to compromise the RDF triples that an inference procedure depends on and so maliciously alter them, therefore changing results of the inference procedure. An attack is semantic insofar as it depends on the semantics of an inference procedure, although it may but does not have to alter the semantics of the inference procedure itself. <ref type="foot" target="#foot_19">23</ref> Due to the distributed nature of resources on the Semantic Web.only gets worse if the Semantic Web application uses the "follow your nose" algorithm used in some Linked Data applications.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2">Attack</head><p>At any point data was retrieved from RDF statements given by a HTTP URI that does not use TLS, then the attacker can simply change the data and so influence the Semantic Web inference engine. An inference procedure I is given as depending on a set of x triples R = R 1 ∧ R 2 ∧ ...R x such that new triples S are produced by the inference procedure (I(R) → S). If an attacker knows the plaintext, they can alter it arbitrarily, such that plaintext R 1 → R a . Therefore, one or more malicious triples can be inserted R 2 = R 1 ∧ R a ∧ ...R x and the inference procedure will produce a result that is at least partially under the control of the attacker, I(R 2 ) → S 2 where S 1 = S 2 .</p><p>For example, if a Linked Data-aware application was trying to determine if a person belonged to a particular class, such as the class of all terrorists. If a malicious semantic attacker noticed that one of the resources that the inference procedure depended on did not use TLS, as would be the case if the definition of a terrorist was hosted in a RDF Schema given by non-TLS website (such as the majority of non-W3C Semantic Web vocabularies). In this case, the semantic attacker would intercept and alter the definition of terrorist in the OWL file by removing a triple that stated that the crime must be classified as political by virtue of a certain list of government-approved definitions. In this way, a person who did a simple robbery could be classified as a terrorist by Semantic Web inference engine operating off of insecure resources in a FBI Fusion Center. If further triples were removed, all sorts of people could be mistakenly classified as a terrorists by a correctly operating inference engine using poor data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.3">Defenses</head><p>Given that Semantic Web reasoning in Linked Data depends on having trusted information, the entire process of reasoning and information retrieval must use TLS for every URI if the Semantic Web application is to be trusted. The only exception to this is that if the URI is not accessed, but merely used as an identifier. However, in this case the only trusted Semantic Web inference process is one that does not depend on the HTTP infrastructure. If any triples are derived from Web-level protocols, these protocols should also maintain their security properties and use TLS properly to prevent attacks.</p><p>Network and semantic attacks on the Semantic Web could be fixed if TLS was used on the Semantic Web. The only problem is outdated Semantic Web specifications. Shouldn't W3C Recommendations, rather than being considered as religious texts, be fixed to keep up with modern security? Although the RDF specification lack a way to discuss URIs themselves <ref type="bibr" target="#b10">[11]</ref>, it would make sense that best practices allow HTTP and HTTPS URIs to be equivalent. While this could be added to future editions of the specification, there is no reason to wait. If one believes that the use of URIs on the Semantic Web is still a marginal phenomena, the argument that this "breaks" existing Semantic Web software seems to assume that the Semantic Web is a mature technology with widespread adoption. The Semantic Web still is in its early stages, and so doing security right should take precedence over preserving broken software.</p><p>The future of HTTPS is also bright: TLS has improved and became easier to deploy as well, with certificates available for free and the protocol itself faster and more secure. For example, TLS version 1.3<ref type="foot" target="#foot_20">24</ref> corrects a number of problems in TLS 1.2 such as an unclear state machine and attacks on TLS authentication <ref type="bibr" target="#b5">[6]</ref>. These problems and more are fixed in TLS 1.3, and there is now provably secure implementations of TLS 1.3 that rely on fast elliptic curve cryptography. Earlier, the price of server-side certificates was considered too high and there was concerns over the hierarchical nature of the Certificate Authority system, as a Certificate Authority can issue a certificate that has global scope. These problems led to either Semantic Web researchers completely ignoring TLS due to supposed "security concerns" and for those Semantic technologies using TLS to such as WebID+TLS to want to use "self-signed" certificates instead of those from a certificate authority. Thanks to the effort by "Let's Encrypt," the price of server certificates is now free, so there is no reason not to use the high-security TLS certificates from "Let's Encrypt" other than the time investment to configure a Web server to use TLS. <ref type="foot" target="#foot_21">25</ref> Also, if one uses certificates and is worried about a rogue Certificate Authority issuing certificates incorrectly or being compromised by a malicious actor, the IETF Certificate Transparency standards, employed by Google, provides efficient auditing and search of certificates using a Merkle tree. <ref type="foot" target="#foot_22">26</ref>Simply using the modern standards used by the rest of the Web such as OAuth <ref type="bibr" target="#b13">[14]</ref> would defeat most Web attackers, allowing it to be taken more seriously as a real deployment platform for sensitive personal data.Given that the design of cryptographic protocols is difficult for even experts, it should be no surprise that the creation of new protocols in W3C Semantic Web Working Groups that may not this expertise can lead to problems. Rather than use WebID+TLS, Semantic Web applications should respect the same-origin policy and use modern methods of authentication, such as the Web Authentication API, and authorization, such as OAuth, that respect the same origin policy. If cryptographic primitives are to be used on new protocols on the Semantic Web, they should use the primitives provided by modern APIs as provided by the W3C Web Cryptography API and not broken cryptographic primitives whose interaction with the browser are not normatively specified.</p><p>Given that TLS certificates are free and that the Semantic Web has still not reached widespread usage enough to argue that moving from HTTP to HTTPS would break real-world applications, Semantic Web tools and Semantic Web vocabularies should switch as soon as possible to using TLS-encrypted HTTPS URIs. There is no excuse not to use encryption if you want users to trust the Semantic Web. Luckily, most of the attacks described here as potential attacks as the underlying W3C standards used in the Semantic Web still have not been widely deployed and remain mostly in the realm of academia, and thus there are limited real-world incentives to attack Semantic Web-based infrastructure.</p><p>Regardless, both open data and personal data require security, and personal data in addition also requires privacy. The building block for both security and privacy is proper usage of (at least) TLS and more complex cryptographic protocols on the level of applications. Otherwise, the use of the Semantic Web will likely be replaced by technology, such as blockchains, that takes security on board in its design.</p></div>			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://solid.mit.edu</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">It is well-known in the cryptographic research community that RSA signing keys should not be used also for encryption in general without changes to the underlying algorithms, as it introduces vulnerabilities<ref type="bibr" target="#b25">[26]</ref>.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">https://www.w3.org/wiki/WebAccessControl</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_3">TLS 1.2 is available at https://tools.ietf.org/html/rfc5246, with TLS 1.3 being under development at https://tlswg.github.io/tls13-spec/.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_4">In reality, the server proves it has a key validated by a Certificate Authority that the browser accepts. There is a long-standing issue that Certificate Authorities can create certificates for domains they do not own.<ref type="bibr" target="#b1">[2]</ref> </note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_5">https://www.wireshark.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_6">https://moxie.org/software/sslstrip/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="9" xml:id="foot_7">https://www.w3.org/blog/2016/05/https-and-the-semantic-weblinked-data/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="10" xml:id="foot_8">https://www.w3.org/blog/2016/05/https-and-the-semantic-weblinkeddata/#comment-93683</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="11" xml:id="foot_9">https://www.w3.org/Provider/Style/URI.html</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="12" xml:id="foot_10">https://lists.w3.org/Archives/Public/semantic-web/2014Aug/0078.html</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="13" xml:id="foot_11">According to http://lodlaundromat.org/, the largest search index of publicly available RDF URIs in 2017 (Retrieved on May 15th 2017).</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="16" xml:id="foot_12">https://groups.google.com/a/chromium.org/forum/#!msg/blinkdev/pX5NbX0Xack/kmHsyMGJZAMJ</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="17" xml:id="foot_13">https://www.w3.org/TR/WebCryptoAPI/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="18" xml:id="foot_14">https://www.w3.org/TR/ldn/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="19" xml:id="foot_15">https://www.w3.org/TR/websub/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="20" xml:id="foot_16">https://w3c-dvcg.github.io/ld-signatures/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="21" xml:id="foot_17">https://json-ld.github.io/normalization/spec/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="22" xml:id="foot_18">https://tools.ietf.org/html/rfc7515</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="23" xml:id="foot_19">Note that this is out of scope, as an adversary could simply add a triple to make a previously-valid OWL inference invalid, and so leaving only an RDF(S) inference possible.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="24" xml:id="foot_20">https://github.com/tlswg/tls13-spec</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="25" xml:id="foot_21">https://letsencrypt.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="26" xml:id="foot_22">https://www.certificate-transparency.org/</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Acknowledgments</head><p>This work is funded in part by the European Commission H2020 European Commission through the NEXTLEAP Project (Grant No. 6882).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Towards a formal foundation of web security</title>
		<author>
			<persName><forename type="first">Devdatta</forename><surname>Akhawe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Adam</forename><surname>Barth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peifung</forename><forename type="middle">E</forename><surname>Lam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><surname>Mitchell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dawn</forename><surname>Song</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computer Security Foundations Symposium (CSF)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2010">2010. 2010</date>
			<biblScope unit="page" from="290" to="304" />
		</imprint>
	</monogr>
	<note>23rd IEEE</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Security economics in the HTTPS value chain</title>
		<author>
			<persName><forename type="first">Michel</forename><surname>Hadi Asghari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Axel</forename><surname>Van Eeten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nico</forename><surname>Arnbak</surname></persName>
		</author>
		<author>
			<persName><surname>Van Eijk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Twelfth Workshop on the Economics of Information Security (WEIS 2013)</title>
				<meeting><address><addrLine>Washington, DC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">Tim</forename><surname>Berners-Lee</surname></persName>
		</author>
		<ptr target="https://www.w3.org/DesignIssues/Security-NotTheS.html" />
		<title level="m">Web security -&quot;HTTPS Everywhere&quot; harmful</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">N3logic: A logical framework for the world wide web</title>
		<author>
			<persName><forename type="first">Tim</forename><surname>Berners-Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dan</forename><surname>Connolly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lalana</forename><surname>Kagal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yosi</forename><surname>Scharf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jim</forename><surname>Hendler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory and Practice of Logic Programming</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">03</biblScope>
			<biblScope unit="page" from="249" to="269" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Web Authentication: An API for accessing scoped credentials</title>
		<author>
			<persName><forename type="first">Vijay</forename><surname>Bharadwaj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hubert</forename><forename type="middle">Le</forename><surname>Van Gong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dirk</forename><surname>Balfanz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alexei</forename><surname>Czeskis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Arnar</forename><surname>Birgisson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeff</forename><surname>Hodges</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Jones</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rolf</forename><surname>Lindemann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Jones</surname></persName>
		</author>
		<ptr target="https://www.w3.org/TR/webauthn/" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS</title>
		<author>
			<persName><forename type="first">Karthikeyan</forename><surname>Bhargavan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Antoine</forename><surname>Delignat Lavaud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Cédric</forename><surname>Fournet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alfredo</forename><surname>Pironti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pierre</forename><forename type="middle">Yves</forename><surname>Strub</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Symposium on Security and Privacy</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2014">2014. 2014</date>
			<biblScope unit="page" from="98" to="113" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Linked data-the story so far</title>
		<author>
			<persName><forename type="first">Christian</forename><surname>Bizer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tom</forename><surname>Heath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tim</forename><surname>Berners-Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Semantic Services, Interoperability and Web Applications: Emerging Concepts</title>
				<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="205" to="227" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">An Efficient Cryptographic Protocol Verifier Based on Prolog Rules</title>
		<author>
			<persName><forename type="first">Bruno</forename><surname>Blanchet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th IEEE Workshop on Computer Security Foundations, CSFW &apos;01</title>
				<meeting>the 14th IEEE Workshop on Computer Security Foundations, CSFW &apos;01<address><addrLine>Washington, DC, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page">82</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Signing rdf graphs</title>
		<author>
			<persName><forename type="first">Jeremy</forename><forename type="middle">J</forename><surname>Carroll</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Semantic Web Conference</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="369" to="384" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Personal privacy and the web of linked data</title>
		<author>
			<persName><forename type="first">David</forename><surname>Corsar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peter</forename><surname>Edwards</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><surname>Nelson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2013th International Conference on Society, Privacy and the Semantic Web-Policy and Technology</title>
				<meeting>the 2013th International Conference on Society, Privacy and the Semantic Web-Policy and Technology</meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="11" to="21" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">RDF 1.1 concepts and abstract syntax</title>
		<author>
			<persName><forename type="first">Richard</forename><surname>Cyganiak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><surname>Wood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Markus</forename><surname>Lanthaler</surname></persName>
		</author>
		<ptr target="https://www.w3.org/TR/rdf11-concepts/" />
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">On the security of public key protocols. Information Theory</title>
		<author>
			<persName><forename type="first">D</forename><surname>Dolev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Yao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="198" to="208" />
			<date type="published" when="1983-03">March 1983</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Probabilistic encryption</title>
		<author>
			<persName><forename type="first">Shafi</forename><surname>Goldwasser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Silvio</forename><surname>Micali</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of computer and system sciences</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="270" to="299" />
			<date type="published" when="1984">1984</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">Dickt</forename><surname>Hardt</surname></persName>
		</author>
		<ptr target="https://tools.ietf.org/html/rfc6749" />
		<title level="m">The Oauth 2.0 authorization framework</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">In defense of ambiguity</title>
		<author>
			<persName><forename type="first">J</forename><surname>Patrick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Harry</forename><surname>Hayes</surname></persName>
		</author>
		<author>
			<persName><surname>Halpin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal on Semantic Web and Information Systems (IJSWIS)</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="1" to="18" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Towards the use of graph summaries for privacy enhancing release and querying of linked data</title>
		<author>
			<persName><forename type="first">Benjamin</forename><surname>Heitmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Felix</forename><surname>Hermsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stefan</forename><surname>Decker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Society, Privacy and the Semantic Web -Policy and Technology</title>
				<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Hodges</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Jackson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Barth</surname></persName>
		</author>
		<ptr target="https://tools.ietf.org/html/rfc6797" />
		<title level="m">HTTP Strict Transport Security (hsts)</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Unlimitid: Privacy-preserving federated identity management using algebraic macs</title>
		<author>
			<persName><forename type="first">Marios</forename><surname>Isaakidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Harry</forename><surname>Halpin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">George</forename><surname>Danezis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society</title>
				<meeting>the 2016 ACM on Workshop on Privacy in the Electronic Society</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="139" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">The curse of namespaces in the domain of xml signature</title>
		<author>
			<persName><forename type="first">Meiko</forename><surname>Jensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lijun</forename><surname>Liao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jorg</forename><surname>Schwenk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2009 ACM Workshop on Secure Web Services, SWS &apos;09</title>
				<meeting>the 2009 ACM Workshop on Secure Web Services, SWS &apos;09<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="29" to="36" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A policy based approach to security for the semantic web</title>
		<author>
			<persName><forename type="first">Lalana</forename><surname>Kagal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tim</forename><surname>Finin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Anupam</forename><surname>Joshi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Semantic Web Conference</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="402" to="418" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Towards search on encrypted graph data</title>
		<author>
			<persName><forename type="first">Andreas</forename><surname>Kasten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ansgar</forename><surname>Scherp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Frederik</forename><surname>Armknecht</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Matthias</forename><surname>Krause</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Workshop on Society, Privacy and the Semantic Web-Policy and Technology</title>
				<meeting>the Workshop on Society, Privacy and the Semantic Web-Policy and Technology</meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="46" to="57" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A demonstration of the solid platform for social web applications</title>
		<author>
			<persName><forename type="first">Essam</forename><surname>Mansour</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrei</forename><surname>Vlad Sambra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sandro</forename><surname>Hawke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maged</forename><surname>Zereba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sarven</forename><surname>Capadisli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Abdurrahman</forename><surname>Ghanem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ashraf</forename><surname>Aboulnaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tim</forename><surname>Berners-Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 25th International Conference Companion on World Wide Web</title>
				<meeting>the 25th International Conference Companion on World Wide Web</meeting>
		<imprint>
			<publisher>International World Wide Web Conferences Steering Committee</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="223" to="226" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Making secure semantic web</title>
		<author>
			<persName><forename type="first">Adis</forename><surname>Medić</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Adis</forename><surname>Golubović</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Universal Journal of Computer Science and Engineering Technology</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="99" to="104" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Building an ontology of cyber security</title>
		<author>
			<persName><forename type="first">Alessandro</forename><surname>Oltramari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lorrie</forename><forename type="middle">Faith</forename><surname>Cranor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Robert</forename><forename type="middle">J</forename><surname>Walls</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Patrick</forename><forename type="middle">Drew</forename><surname>Mcdaniel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">STIDS</title>
				<imprint>
			<publisher>Citeseer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="54" to="61" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Mandatory access control and role-based access control revisited</title>
		<author>
			<persName><forename type="first">Sylvia</forename><surname>Osborn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the second ACM workshop on Role-based access control</title>
				<meeting>the second ACM workshop on Role-based access control</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="31" to="40" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">On the joint security of encryption and signature, revisited</title>
		<author>
			<persName><forename type="first">Kenneth</forename><surname>Paterson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jacob</forename><surname>Schuldt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Martijn</forename><surname>Stam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Susan</forename><surname>Thomson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Cryptology-ASIACRYPT 2011</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="161" to="178" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">FOAF+SSL: Restful authentication for the social web</title>
		<author>
			<persName><forename type="first">Henry</forename><surname>Story</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bruno</forename><surname>Harbulot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ian</forename><surname>Jacobi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mike</forename><surname>Jones</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the First Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009)</title>
				<meeting>the First Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009)</meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Securing brokerless publish/subscribe systems using identity-based encryption</title>
		<author>
			<persName><forename type="first">Adnan</forename><surname>Muhammad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Boris</forename><surname>Tariq</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kurt</forename><surname>Koldehofe</surname></persName>
		</author>
		<author>
			<persName><surname>Rothermel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE transactions on parallel and distributed systems</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="518" to="528" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Security standards for the semantic web</title>
		<author>
			<persName><forename type="first">Bhavani</forename><surname>Thuraisingham</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Standards &amp; Interfaces</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="257" to="268" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Extending the WebID protocol with access delegation</title>
		<author>
			<persName><forename type="first">Sebastian</forename><surname>Tramp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Henry</forename><surname>Story</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrei</forename><surname>Sambra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Philipp</forename><surname>Frischmuth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Martin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sören</forename><surname>Auer</surname></persName>
		</author>
		<ptr target="WS.org" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Third International Conference on Consuming Linked Data-Volume</title>
				<meeting>the Third International Conference on Consuming Linked Data-Volume</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">905</biblScope>
			<biblScope unit="page" from="99" to="111" />
		</imprint>
	</monogr>
	<note type="report_type">CEUR-</note>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">How to break MD5 and other hash functions</title>
		<author>
			<persName><forename type="first">Xiaoyun</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hongbo</forename><surname>Yu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Annual International Conference on the Theory and Applications of Cryptographic Techniques</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="19" to="35" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Prototyping fusion center information sharing; implementing policy reasoning over cross-jurisdictional data transactions occurring in a decentralized environment</title>
		<author>
			<persName><forename type="first">Krasnow</forename><surname>Waterman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Samuel</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Technologies for Homeland Security (HST), 2010 IEEE International Conference on</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="63" to="69" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<title level="m" type="main">Upgrade Insecure Requests</title>
		<author>
			<persName><forename type="first">Mike</forename><surname>West</surname></persName>
		</author>
		<ptr target="https://www.w3.org/TR/upgrade-insecure-requests/" />
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
