An approach for a security and privacy-aware cloud-based storage of data in the Semantic Web

Author(s):  
Jens Kohler ◽  
Thomas Specht ◽  
Kiril Simov
Author(s):  
Yi Zhao ◽  
Xia Wang ◽  
Wolfgang A. Halang

With the increasing interest in Semantic Web-based applications, researchers have started to build tools enabling organisations to share information. An important aspect in maintaining the Semantic Web is, however, to preserve security during semantic interoperation of different entities. Security and privacy are indispensable to the success of Semantic Web services. Hence, this chapter aims to investigate the currently used security methods in semantic interoperation, including the security methods employing Semantic Web representation languages such as XML, RDF and ontologies, and their application methods in semantic interoperation such as secure access control and secure knowledge management. How to manage privacy, trust and reputation at the same time during semantic interoperation will also be discussed in this chapter. Finally, some directions for our further research will be presented.


2011 ◽  
Vol 21 (8) ◽  
pp. 1-8 ◽  
Author(s):  
Akhilesh Dwivedi ◽  
Suresh Kumar ◽  
Abhishek Dwivedi ◽  
Manjeet Singh

Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Informatica ◽  
2015 ◽  
Vol 26 (2) ◽  
pp. 221-240 ◽  
Author(s):  
Valentina Dagienė ◽  
Daina Gudonienė ◽  
Renata Burbaitė

Sign in / Sign up

Export Citation Format

Share Document