透過您的圖書館登入
IP:18.218.61.16
  • 學位論文

基於類別代數的點對點本體資料庫

A Peer-to-Peer Ontology Database Based on Class Algebra

指導教授 : 貝若爾
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


有著這樣相當普遍的共識: 語意網的類別階層與有型別的三量數,對分享資料來說是很有用的資料型別機制。這篇論文的目的是建立一個能自身反射的框架,可以同時安全地分享分散式資料和它們的本體。在這篇論文內所介紹的核心本體能讓人可以創造他們所有的本體、在網上分享它們,以及對資料型別(像是類別和二元關係的定義)和它們所描述的資料皆可跨躍參照和查詢。一個基於SROIN描述邏輯的直覺式查詢語言被設計給普遍使用者們,容易地在本體和它們的資料間做查詢。此外,對語意網來說,安全性是必要的。驗證與授權都基於與用來查詢知識庫相同的查詢式。所以類別和關係的定義也可被隱藏而不被某些使用者看到。這裡的授權,對抗於許多常見的攻擊,有著輕級耗費的防禦力。該授權機制會做推論來計算許可權。在這框架內,一般使用者可以方便地發展他們的本體,以及安全地在網上分享它們。並且那些分散的本體會組成語意網,在那兒機器和人都可使用有型別的資料和指標參照。

並列摘要


There is now fairly common agreement that the class hierarchy and the typed triples of the Semantic Web are useful data typing mechanisms for sharing data. The objective of this paper is to build a self-reflexive framework to securely share both distributed data and their ontologies. The Kernel ontologies that are introduced in this paper to allow people to create their own ontologies, share them on the Web, and cross-reference and query both the data types (i.e. classes and binary relation definitions) and the data that they describe. An intuitive query language that is based on SROIN description logic is designed for common users to easily query among ontologies and their data. Moreover, security is necessary for the Semantic Web. Authentication and authorization are based on the same queries that are used for querying the knowledge base, so class and relation definitions may also be hidden from some users. The authentication has a lightweight defense against many common attacks. The authorization mechanism performs inference to calculate permissions. In this framework, common users can conveniently develop their ontologies and share them securely on the web, and those distributed ontologies can form a semantic web where both machines and people can use typed data and pointers.

參考文獻


[23] Daniel J. Buehrer and Tzu-Yang Wang, “Authentication and Lookup For Network Services”, International Journal of Electronic Commerce Studies (IJECS), 2012.
[22] Daniel J. Buehrer and Tzu-Yang Wang, “Access Control For Shared Ontologies”, International Journal of Electronic Commerce Studies (IJECS), 2012.
[18] Huang Wei-Feng, “Authentication System for Cadabia Database”. A thesis submitted to Institute of Computer Science and Information Engineering, National Chung Cheng University, Taiwan, 2006.
[8] Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman, “Role-Based Access Control Models”. Computer, IEEE Press, Vol. 29, Issue 2, pp.38-47, 1996.
[3] D.J. Buehrer and Li-Ren Chien, “Knowledge Creation Using Class Algebra”. IEEE 2003 International Conference on Natural Language Processing and Knowledge Engineering, 2003.

延伸閱讀