Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

Resolving Security Issues for Semantic Web Related Networks and Datasets

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 119 - Number 1
Year of Publication: 2015
Authors:
S. Munisankaraiah
Kudali Hymavathi
10.5120/21033-3035

S.munisankaraiah and Kudali Hymavathi. Article: Resolving Security Issues for Semantic Web Related Networks and Datasets. International Journal of Computer Applications 119(1):32-34, June 2015. Full text available. BibTeX

@article{key:article,
	author = {S.munisankaraiah and Kudali Hymavathi},
	title = {Article: Resolving Security Issues for Semantic Web Related Networks and Datasets},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {119},
	number = {1},
	pages = {32-34},
	month = {June},
	note = {Full text available}
}

Abstract

Improve the quality of web service composition using the petri nets and ontology. Previously web services are design independently. These kinds of services are not compatible. We observe the different security issues. Now in this paper we design new semantic web networks using petri nets and ontology. Start the interaction process levels display the decisions using colored petri nets environment. After interaction process defines the semantic context information. Control the mismatches mapping decisions information like security issues. It's allows the semantic mapping users as an authentication users. Compare to previous approaches control the more security issues efficiently.

References

  • T. Berners Lee, J. Hendler, O. Lassila, The semantic web, Scientific American; May 2001, 34 – 43.
  • What is Social Networking?, http://www. whatissocialnetworking
  • Journal of Computer-Mediated Communication http://jcmc. indiana. edu/vol13/issue1/boyd. ellison. html.
  • Leveraging Social data with Semantics, http://www. w3. org/2008/09/ msnws/papers/ereteo_et_al_2008_leveraging. html.
  • Virtual economy, WikiPedia, http://en. wikipedia. org/wiki/Virtual_economy.
  • Burleson, 2007. Introduction to the semantic web Vision and Technologies, http://www. semanticfocus. com/blog/entry/title/introduction-tothe-semantic-web-vision-andtechnologies-part-2-foundations.
  • B. Matthews,? semantic web Technologies. JISC Technology and Standards Watch,? 2005.
  • T. Berners Lee, 2006. Uniform Resource Identifiers, URI Generic Syntax. IETF. http://www. ietf. org/rfc/rfc2396. txt. A. Medi?, Criptography – Securing web Servers and web Applications, University of Biha?, Technical Faculty Biha?, engineer thesis, Biha?, Bosnia and Herzegovina, February 2008.
  • Fensel, 2002. Layering the semantic web: Problems and Directions. In the Proceeding of 1st International semantic web Conference (ISWC, 2002). Sardinia, Italy, 9-12 June, pp: 476. ISBN: 3540437606, 9783540437604.
  • S. St. Laurent, XML, McGraw Hill, New York, NY, 2000.
  • S. Buraga and G. Ciobanu. , 2002. A RDF- based model for expressing spatio-temporal relation between web sites. In The 3rd International Conference on Information Systems Engineering. IEEE Computer Society. pp: 355. IEEE Computer Society Washington, DC, USA. , ISBN:0-7695- 1766-8.
  • Description Framework?, in D-Lib Magazine, May. 1998; http://www. dlib. org/dlib/may98/miller/05miller. html.
  • R. Cloran and B. Irwin, 2005. XML Digital Signature and RDF, http://icsa. cs. up. ac. za/issa/2005/Proceedings/ Poster/026_Article. pdf
  • T. Haytam, Al-Feel, M. Koutb and H. Suoror, semantic web on Scope: A New Architectural Model for the semantic web, Journal of Computer Science 4 (7): 613-624, 2008.
  • B. Thuraisingham,W. Ford, Security constraint processing in a distributed database management system, IEEE Transactions on Knowledge and Data Engineering (1995) 274– 293.
  • Ryan Naraine, ?PlayStation Home virtual world hacked?, ZDNET. Dec. 22, 2008. Available: http://blogs. zdnet. com/security/?p=2330.
  • B. Thuraisingham, Data Mining: Technologies, Techniques, Tools and Trends, CRC Press, Boca Raton, FL, 1998.
  • B. Thuraisingham, Secure Sematic web Services, Technical Report, University of Texas – Department of Computer Science, 2007.