The explosion of digital content and the heterogeneity of enterprise content sources have pushed existing data integration solutions to their boundaries. An alternative solution is to use the Resource Description Framework (RDF) together with the existing web infrastructure, commonly known as the Linked Data Web (LDW), as a means to integrate both public and private data. With the advent of SPARQL 1.1, it is possible not only to execute queries over the LDW, but also to use the SPARQL query language to maintain distributed graph data. However, such a decentralised architecture brings with it a number of additional challenges with respect to both data security and integrity. In this thesis, we focus on the problem of access control for the LDW. We are particularly interested in lifting both the data and the access control policies from existing line of business applications and enforcing and maintaining access control over linked data, irrespective of how it is published. We start by proposing a lifting strategy, which can be used to extract both data and access control policies from relational databases. The access permissions are represented using an extension of the RDF model known as annotated RDF (aRDF), which allows contextual information to be associated with RDF data. By using aRDF domain operations it is possible to combine different annotations for the same triple and to infer new annotations based on RDF Schema (RDFS) inference rules. We demonstrate how the proposed modelling, together with a set of inference rules, can be used to provide support for commonly used access control models, such as Role-Based Access Control, Attribute Based Access Control and View Based Access Control. With regards to the enforcement and administration of access control over RDF, we focus specifically on Discretionary Access Control (DAC). Given DAC allows users to delegate their permissions to others, it is particularly suitable for managing access control over distributed data. Although a number of authors demonstrate how they can used Semantic Web technology to represent DAC policies, the authors do not examine DAC from a data model perspective. In order to fill this gap, we provide a summary of access control requirements for the RDF data model, based on the different characteristics of the RDF data model compared to relational and tree data models. In order to support access control policy specification at the triple, resource,graph and schema level, authorisations are specified using graph patterns. In addition, we demonstrate how our proposed flexible graph based authorisation framework, which we call GFAF, can be used to cater for the specification, administration and enforcement of DAC policies over linked data. Given the proposed access control framework enforces access control at the query layer, when access to the requested RDF data is partially restricted, it is necessary to rewrite the query so that it behaves in the same manner as a query executed over a filtered dataset. Therefore, we propose a query rewriting strategy for both the SPARQL 1.1 query and update languages, thatcan be used to partially restrict access to unauthorised data. In addition, we demonstrate how a set of criteria, which was originally used to verify relational access control policies, can be adapted to ensure the correctness of access control over RDF via query rewriting.
The three-year Nation, Gender and Genre project seeks to gain a broader and deeperunderstanding of a body of 19th and early 20th-century literature from Britain and Ire-land by utilising social network analysis and other digital humanities methodologies.This presentation aims to briey describe the project's goals and methodological de-velopment, and will further indicate how cultural literacy concepts have informed anddriven the project's development, as well as discussing some early-stage results.Henry James's characterisation of Victorian novels as large loose baggy monsters.
The large number of event logs generated in atypical network is increasingly becoming an obstacle for forensicinvestigators to analyze and use to detect and verify maliciousactivities. Research in the area of network forensics is trying toaddress the challenge of using network logs to reconstruct attackscenarios by proposing events correlation models. In this paperwe introduce and examine a new network forensics model thatmakes network event-logs admissible in the court of low. The ideaof our model is to collect available logs from connected networkdevices and then apply Support Vectors Machine (SVMs) in orderto filter out anomaly intrusion, and re-route these logs to a centralrepository where a event-logs management functions are applied.
Chemotactic movement of ionic liquid droplets Herein we report the chemotactic behaviour of self-propelled droplets composed solely of the ionic liquid (IL) trihexyl(tetradecyl)phosphonium chloride ([P6,6,6,14][Cl]). These droplets move spontaneously across the liquid/interface and are guided to specific destinations within open fluidic channels through the use of chloride gradients. The movement of these droplets is controlled by the triggered release of the [P6,6,6,14] + cation, a component of the IL and a very efficient cationic surfactant. Surfactant release has been previously used to develop smart droplets which can solve complex mazes  or can be photo-manipulated . In this study the [P6,6,6,14]+ diffuses from the droplet into the aqueous solution which causes a local drop in surface tension, this creates marangoni like flows which drive the droplet from areas of low surface tension to high surface tension. The rate of [P6,6,6,14]+ release depends on the concentration of the chloride in the aqueous solution, as the formation of free [P6,6,6,14]+ (the active surfactant at the air-aqueous interface) through dissociation of the relatively closely associated [P6,6,6,14][Cl] ions in the IL depends on the local Cl- concentration at the IL-aqueous boundary. We envision that these smart IL droplets could be used for a variety of applications within the microfluidic sector such as dynamic sensing, cargo transport and serve as micro-vessels for chemical reactions. Furthermore we believe this new approach to micro-vehicle movement will provide a much broader base for the development of a wide range of new droplet chemistries that exploit the vast and still rapidly growing numbers of ionic liquids.  I. Lagzi, S. Soh, P. Wesson, K. Browne and B. Grzybowski, Journal of the American Chemical Society, 2010, 132, 1198-1199.  L. Florea, K. Wagner, P. Wagner, G. G. Wallace, F. Benito‐Lopez, D. L. Officer and D. Diamond, Advanced materials, 2014.