透過您的圖書館登入
IP:13.59.122.162

並列摘要


Entities and their relationships for various fields of specialization can be described by ontologies. For example, the classes, relationships, and methods for designing a virus may be put into a Protégé ontology. If that design is to be integrated with a missile design, it will require a standard way of sharing and cross-referencing both classes and objects of the ontologies. This should be done in a secure way which only allows access to specified researchers using specified classes, relations, methods, and documentation. In this paper, we introduce a framework for ontology sharing that enables ontologies to easily be deployed on the web. Kernel0 is the ontology of classes, relations, attributes, and objects. It describes its own typing constraints and meta-data in the same way as data. Objects can have relationships to objects of other ontologies. Kernel-1 authorization definitions in our framework are able to dynamically determine the permissions of each user or group for queried objects. Our authorization has the ability to perform inferences via IS-A inheritance and by evaluating implicit relations and operator definitions. All modifications of values in the knowledge base are checked for both appropriate authorization and satisfaction of all typing constraints.

參考文獻


Semantic Web Rule Language, Retrieved on April 21, 2012, from http://www.w3.org/Submission/SWRL/
Apache Hadoop, Retrieved on April 3, 2012, from http://hadoop.apache.org
Berners-Lee, T.,Hendler, J.,Lassila, O.(2001).The semantic web.Scientific American.284(5),34-43.
Blanquer, I.,Hern'andez, V.,Segrelles, D.,Torres, E.(2009).Enhancing privacy and authorization control scalability in the grid through ontologies.IEEE Transactions on Information Technology in Biomedicine.13(1),16-24.
Buehrer, D.J.,Chien, L.R.(2003).Knowledge creation using class algebra.Proceedings of IEEE 2003 International Conference on Natural Language Processing and Knowledge Engineering.(Proceedings of IEEE 2003 International Conference on Natural Language Processing and Knowledge Engineering).:

被引用紀錄


侯孟妤(2013)。因應個人資料保護法之施行探究企業之風險管理〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2013.00436
Li, H. C. (2010). 台灣自然導向影片(2004-2009):荒野、科技與環境想像 [doctoral dissertation, Tamkang University]. Airiti Library. https://doi.org/10.6846/TKU.2010.00436
吳振樹(2009)。我國《全民國防教育法》立法過程與執行初期之研究〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2009.00068
劉金嬋(2007)。QR碼影像擷取器平台設計與實現〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2007.00908
黃延林(2007)。跨國企業全球化危機管理戰略之研究 以台灣高科技產業營運安全管理為例〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2007.00191

延伸閱讀