CFP last date
20 June 2024
Reseach Article

Resolving Security Issues for Semantic Web Related Networks and Datasets

by S.munisankaraiah, Kudali Hymavathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 1
Year of Publication: 2015
Authors: S.munisankaraiah, Kudali Hymavathi

S.munisankaraiah, Kudali Hymavathi . Resolving Security Issues for Semantic Web Related Networks and Datasets. International Journal of Computer Applications. 119, 1 ( June 2015), 32-34. DOI=10.5120/21033-3035

@article{ 10.5120/21033-3035,
author = { S.munisankaraiah, Kudali Hymavathi },
title = { Resolving Security Issues for Semantic Web Related Networks and Datasets },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 1 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-34 },
numpages = {9},
url = { },
doi = { 10.5120/21033-3035 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:02:53.205873+05:30
%A S.munisankaraiah
%A Kudali Hymavathi
%T Resolving Security Issues for Semantic Web Related Networks and Datasets
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 1
%P 32-34
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

Improve the quality of web service composition using the petri nets and ontology. Previously web services are design independently. These kinds of services are not compatible. We observe the different security issues. Now in this paper we design new semantic web networks using petri nets and ontology. Start the interaction process levels display the decisions using colored petri nets environment. After interaction process defines the semantic context information. Control the mismatches mapping decisions information like security issues. It's allows the semantic mapping users as an authentication users. Compare to previous approaches control the more security issues efficiently.

  1. T. Berners Lee, J. Hendler, O. Lassila, The semantic web, Scientific American; May 2001, 34 – 43.
  2. What is Social Networking?, http://www. whatissocialnetworking
  3. Journal of Computer-Mediated Communication http://jcmc. indiana. edu/vol13/issue1/boyd. ellison. html.
  4. Leveraging Social data with Semantics, http://www. w3. org/2008/09/ msnws/papers/ereteo_et_al_2008_leveraging. html.
  5. Virtual economy, WikiPedia, http://en. wikipedia. org/wiki/Virtual_economy.
  6. Burleson, 2007. Introduction to the semantic web Vision and Technologies, http://www. semanticfocus. com/blog/entry/title/introduction-tothe-semantic-web-vision-andtechnologies-part-2-foundations.
  7. B. Matthews,? semantic web Technologies. JISC Technology and Standards Watch,? 2005.
  8. T. Berners Lee, 2006. Uniform Resource Identifiers, URI Generic Syntax. IETF. http://www. ietf. org/rfc/rfc2396. txt. A. Medi?, Criptography – Securing web Servers and web Applications, University of Biha?, Technical Faculty Biha?, engineer thesis, Biha?, Bosnia and Herzegovina, February 2008.
  9. Fensel, 2002. Layering the semantic web: Problems and Directions. In the Proceeding of 1st International semantic web Conference (ISWC, 2002). Sardinia, Italy, 9-12 June, pp: 476. ISBN: 3540437606, 9783540437604.
  10. S. St. Laurent, XML, McGraw Hill, New York, NY, 2000.
  11. S. Buraga and G. Ciobanu. , 2002. A RDF- based model for expressing spatio-temporal relation between web sites. In The 3rd International Conference on Information Systems Engineering. IEEE Computer Society. pp: 355. IEEE Computer Society Washington, DC, USA. , ISBN:0-7695- 1766-8.
  12. Description Framework?, in D-Lib Magazine, May. 1998; http://www. dlib. org/dlib/may98/miller/05miller. html.
  13. R. Cloran and B. Irwin, 2005. XML Digital Signature and RDF, http://icsa. cs. up. ac. za/issa/2005/Proceedings/ Poster/026_Article. pdf
  14. T. Haytam, Al-Feel, M. Koutb and H. Suoror, semantic web on Scope: A New Architectural Model for the semantic web, Journal of Computer Science 4 (7): 613-624, 2008.
  15. B. Thuraisingham,W. Ford, Security constraint processing in a distributed database management system, IEEE Transactions on Knowledge and Data Engineering (1995) 274– 293.
  16. Ryan Naraine, ?PlayStation Home virtual world hacked?, ZDNET. Dec. 22, 2008. Available: http://blogs. zdnet. com/security/?p=2330.
  17. B. Thuraisingham, Data Mining: Technologies, Techniques, Tools and Trends, CRC Press, Boca Raton, FL, 1998.
  18. B. Thuraisingham, Secure Sematic web Services, Technical Report, University of Texas – Department of Computer Science, 2007.
Index Terms

Computer Science
Information Sciences


Semantic web networks petri nets ontology mapping procedures colored petri nets fuzzy concept.