-
1
-
-
84863910133
-
Semantic technologies and cloud computing
-
Fensel, D., Ed.; Springer: Berlin, Germany
-
Eberhart, A.; Haase, P.; Oberle, D.; Zacharias, V. Semantic technologies and cloud computing. In Foundations for the Web of Information and Services; Fensel, D., Ed.; Springer: Berlin, Germany, 2011; pp. 239-251.
-
(2011)
In Foundations for the Web of Information and Services
, pp. 239-251
-
-
Eberhart, A.1
Haase, P.2
Oberle, D.3
Zacharias, V.4
-
3
-
-
71749093343
-
Towards automated security policy enforcement in multi-tenant virtual data centers
-
Cabuk, S.; Dalton, C.I.; Eriksson, K.; Kuhlmann, D.; Ramasamy, H.V.; Ramunno, G.; Sadeghi, A.R.; Schunter, M.; Stüble, C. Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 2010, 18, 89-121.
-
(2010)
J. Comput. Secur
, vol.18
, pp. 89-121
-
-
Cabuk, S.1
Dalton, C.I.2
Eriksson, K.3
Kuhlmann, D.4
Ramasamy, H.V.5
Ramunno, G.6
Sadeghi, A.R.7
Schunter, M.8
Stüble, C.9
-
4
-
-
67650387382
-
View-based query answering over description logic ontologies
-
In Proceedings of Eleventh International Conference on Principles of Knowledge Representation and Reasoning, Sydney, Australia, 16-19 September
-
Calvanese, D.; de Giacomo, D.; Lenzerini, M.; Rosati, R. View-based query answering over description logic ontologies. In Proceedings of Eleventh International Conference on Principles of Knowledge Representation and Reasoning, Sydney, Australia, 16-19 September 2008.
-
(2008)
-
-
Calvanese, D.1
de Giacomo, D.2
Lenzerini, M.3
Rosati, R.4
-
5
-
-
84856576672
-
Datalog for security, privacy and trust
-
Bonatti, A.P. Datalog for security, privacy and trust. Datalog Reloaded 2011, 6702, 21-36.
-
(2011)
Datalog Reloaded
, vol.6702
, pp. 21-36
-
-
Bonatti, A.P.1
-
6
-
-
80054081293
-
Semantics-enabled policies for information sharing and protection in the cloud
-
Hu, Y.J.; Wu, W.N.; Yang, J.J. Semantics-enabled policies for information sharing and protection in the cloud. Lect. Notes Comput. Sci. 2011, 6984, 198-211.
-
(2011)
Lect. Notes Comput. Sci
, vol.6984
, pp. 198-211
-
-
Hu, Y.J.1
Wu, W.N.2
Yang, J.J.3
-
7
-
-
84863940843
-
Towards law-aware semantic cloud policies with exceptions for data integration and protection
-
In Proceedings of International Conference on Web Intelligence, Mining and Semantics (WIMS12), Craiova, Romania, 13-15 June
-
Hu, Y.J.; Wu, W.N.; Cheng, D.R. Towards law-aware semantic cloud policies with exceptions for data integration and protection. In Proceedings of International Conference on Web Intelligence, Mining and Semantics (WIMS12), Craiova, Romania, 13-15 June 2012.
-
(2012)
-
-
Hu, Y.J.1
Wu, W.N.2
Cheng, D.R.3
-
8
-
-
33845546728
-
Countering terrorism through information and privacy protection technologies
-
Popp, R.; Poindexter, J. Countering terrorism through information and privacy protection technologies. IEEE Secur. Priv. 2006, 4, 24-33.
-
(2006)
IEEE Secur. Priv
, vol.4
, pp. 24-33
-
-
Popp, R.1
Poindexter, J.2
-
9
-
-
85019239930
-
-
Available online: (accessed on 19 October 2012).
-
Peter Fleischer's Blog: Which Privacy Laws Should Apply on the Global Internet? Available online: http://peterfleischer.blogspot.com (accessed on 19 October 2012).
-
Which Privacy Laws Should Apply on the Global Internet?
-
-
-
10
-
-
77953344591
-
Defeasible reasoning
-
Adler, J., Rips, L., Eds.; Cambridge University Press: New York, NY, USA
-
Pollock, L.J. Defeasible reasoning. In Reasoning: Studies of Human Inference and Its Foundations; Adler, J., Rips, L., Eds.; Cambridge University Press: New York, NY, USA, 2008.
-
(2008)
In Reasoning: Studies of Human Inference and Its Foundations
-
-
Pollock, L.J.1
-
11
-
-
70349371159
-
Hybrid reasoning with rules and ontologies
-
Drabent, W.; Eiter, T.; Ianni, G.; Krennwallner, T.; Lukasiewicz, T.; Mauszynski, J. Hybrid reasoning with rules and ontologies. Semant. Tech. Web 2009, 5500, 1-49.
-
(2009)
Semant. Tech. Web
, vol.5500
, pp. 1-49
-
-
Drabent, W.1
Eiter, T.2
Ianni, G.3
Krennwallner, T.4
Lukasiewicz, T.5
Mauszynski, J.6
-
12
-
-
85019194844
-
Data Management in Peer-to-Peer Data Integration Systems
-
IOS Press: Amsterdam, The Netherlands
-
Calvanese, D.; de Giacomo, G.; Lembo, D.; Lenzerini, M.; Rosati, R. Data Management in Peer-to-Peer Data Integration Systems; IOS Press: Amsterdam, The Netherlands, 2006; pp. 177-201.
-
(2006)
, pp. 177-201
-
-
Calvanese, D.1
de Giacomo, G.2
Lembo, D.3
Lenzerini, M.4
Rosati, R.5
-
13
-
-
3142764854
-
The Piazza Peer data management system
-
Halevy, A.; Ives, Z.G.; Madhavan, J.; Mork, P.; Suciu, D.; Tatarinov, I. The Piazza Peer data management system. IEEE Trans. Knowled. Data Eng. 2004, 16, 787-798.
-
(2004)
IEEE Trans. Knowled. Data Eng
, vol.16
, pp. 787-798
-
-
Halevy, A.1
Ives, Z.G.2
Madhavan, J.3
Mork, P.4
Suciu, D.5
Tatarinov, I.6
-
14
-
-
84858669792
-
Web-scale data integration: You can only afford to pay as you go
-
In Proceedings of Third Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, 7-10 January
-
Madhavan, J.; Jeffery, S.R.; Cohen, S.; Dong, X.; Ko, D.; Yu, C.; Halevy, A. Web-scale data integration: You can only afford to pay as you go. In Proceedings of Third Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, 7-10 January 2007.
-
(2007)
-
-
Madhavan, J.1
Jeffery, S.R.2
Cohen, S.3
Dong, X.4
Ko, D.5
Yu, C.6
Halevy, A.7
-
15
-
-
0035658039
-
Answering queries using views: A survey
-
Halevy, Y.A. Answering queries using views: A survey. VLDB J. 2001, 10, 270-294.
-
(2001)
VLDB J
, vol.10
, pp. 270-294
-
-
Halevy, Y.A.1
-
17
-
-
0032596647
-
Navigational plans for data integration
-
In Proceedings of the 16th National Conference on Artificial Intelligence, Orlando, Fl ,USA, 19-22 July
-
Friedman, M.; Levy, A.; Millstein, T.; Navigational plans for data integration. In Proceedings of the 16th National Conference on Artificial Intelligence, Orlando, Fl ,USA, 19-22 July 1999.
-
(1999)
-
-
Friedman, M.1
Levy, A.2
Millstein, T.3
-
18
-
-
18144386595
-
Data exchange: Semantics and query answering
-
Faigin, R.; Kolaitis, P.G.; Miller, R.J.; Popa, L. Data exchange: Semantics and query answering. Theor. Comput. Sci. 2005, 336, 89-124.
-
(2005)
Theor. Comput. Sci
, vol.336
, pp. 89-124
-
-
Faigin, R.1
Kolaitis, P.G.2
Miller, R.J.3
Popa, L.4
-
19
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
In Proceedings of 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, Paris, France, 13 June
-
Clifton, C.; Kantarcioğlu, M.; Doan, A.; Schadow, G.; Vaidya, J.; Elmagarmid, A.; Suciu, D. Privacy-preserving data integration and sharing. In Proceedings of 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, Paris, France, 13 June 2004.
-
(2004)
-
-
Clifton, C.1
Kantarcioğlu, M.2
Doan, A.3
Schadow, G.4
Vaidya, J.5
Elmagarmid, A.6
Suciu, D.7
-
20
-
-
84878711569
-
Privacy in GLAV Information integration
-
Nash, A.; Deutsch, A. Privacy in GLAV Information integration. Lect. Notes Comput. Sci. 2006, 4353, 89-103.
-
(2006)
Lect. Notes Comput. Sci
, vol.4353
, pp. 89-103
-
-
Nash, A.1
Deutsch, A.2
-
21
-
-
0024631953
-
What you always wanted to know about Datalog (and never dared to ask)
-
Ceri, S.; Gottlob, G.; Tanca, L. What you always wanted to know about Datalog (and never dared to ask). IEEE Trans. Knowl. Data Eng. 1989, 1 146-166.
-
(1989)
IEEE Trans. Knowl. Data Eng
, vol.1
, pp. 146-166
-
-
Ceri, S.1
Gottlob, G.2
Tanca, L.3
-
22
-
-
85019214392
-
Rule-based OWL ontology reasoning systems: Implementations, strength, and weakness
-
In Handbook of Research on Emerging Rule-Based Languages and Technologies: Open Solutions and Approaches; IGI Global: Hershey, PA, USA
-
Meditskos, G.; Bassilliades, N. Rule-based OWL ontology reasoning systems: Implementations, strength, and weakness. In Handbook of Research on Emerging Rule-Based Languages and Technologies: Open Solutions and Approaches; IGI Global: Hershey, PA, USA, 2009; pp. 124-148.
-
(2009)
, pp. 124-148
-
-
Meditskos, G.1
Bassilliades, N.2
-
23
-
-
69049102207
-
Realizing default logic over description logic knowledge bases
-
Dao-Tran, M.; Eiter, T.; Krennwallner, T. Realizing default logic over description logic knowledge bases. Lect. Notes Comput. Sci. 2009, 5590, 602-613.
-
(2009)
Lect. Notes Comput. Sci
, vol.5590
, pp. 602-613
-
-
Dao-Tran, M.1
Eiter, T.2
Krennwallner, T.3
-
25
-
-
85019227614
-
-
In Proceedings of 12th National Conference on Artificial Intelligence, Seattle, WA, USA, 31 July-4 August
-
Brewka, G. Reasoning about priorities in default logic. In Proceedings of 12th National Conference on Artificial Intelligence, Seattle, WA, USA, 31 July-4 August 2012.
-
(2012)
Reasoning about priorities in default logic
-
-
Brewka, G.1
-
26
-
-
33750124112
-
Creating a policy-aware web: Discretionary, rule-based access for the World Wide Web
-
In Web and Information Security; Ferrari, E., Thuraisingham, B., Eds.; IGI Global: Hershey, PA, USA,
-
Weitzner, J.D.; Hendler, J. Creating a policy-aware web: Discretionary, rule-based access for the World Wide Web. In Web and Information Security; Ferrari, E., Thuraisingham, B., Eds.; IGI Global: Hershey, PA, USA, 2006; pp. 1-31.
-
(2006)
, pp. 1-31
-
-
Weitzner, J.D.1
Hendler, J.2
-
27
-
-
0344927771
-
Schema mediation in peer data management systems
-
In Proceedings of 19th International Conference on Data Engineering (ICDE), Bangalore, India, 5-8 March
-
Halevy, A.; Ives, Z.G.; Suciu, D.; Tatarinov, I. Schema mediation in peer data management systems. In Proceedings of 19th International Conference on Data Engineering (ICDE), Bangalore, India, 5-8 March 2003; pp. 505-516.
-
(2003)
, pp. 505-516
-
-
Halevy, A.1
Ives, Z.G.2
Suciu, D.3
Tatarinov, I.4
-
28
-
-
84870976232
-
Querying a super-peer in a schema-based super-peer network
-
Beneventano, D.; Bergamaschi, S.; Guerra, F.; Vincini, M. Querying a super-peer in a schema-based super-peer network. Lect. Notes Comput. Sci. 2007, 4125, 13-25.
-
(2007)
Lect. Notes Comput. Sci
, vol.4125
, pp. 13-25
-
-
Beneventano, D.1
Bergamaschi, S.2
Guerra, F.3
Vincini, M.4
-
30
-
-
85019242605
-
A semantic privacy-preserving model for data sharing and integration
-
In Proceedings of International Conference on Web Intelligence, Mining and Semantics, Sogndal, Norway, 25-27 May
-
Hu, Y.J.; Yang, J.J. A semantic privacy-preserving model for data sharing and integration. In Proceedings of International Conference on Web Intelligence, Mining and Semantics, Sogndal, Norway, 25-27 May 2011.
-
(2011)
-
-
Hu, Y.J.1
Yang, J.J.2
-
32
-
-
4444361318
-
Answering queries using views: A KRDB perspective for the semantic web
-
Goasdoué, F.; Rousset, M.C. Answering queries using views: A KRDB perspective for the semantic web. ACM Trans. on Internet Technol. 2004, 4, 255-288.
-
(2004)
ACM Trans. on Internet Technol
, vol.4
, pp. 255-288
-
-
Goasdoué, F.1
Rousset, M.C.2
-
33
-
-
84875664448
-
Access control policies and languages in open environments
-
Di Vimercati, S.C.; Foresti, S.; Jajodia, S.; Samarati, P. Access control policies and languages in open environments. Adv. Inf. Secur. 2007, 33, 21-58.
-
(2007)
Adv. Inf. Secur
, vol.33
, pp. 21-58
-
-
Di Vimercati, S.C.1
Foresti, S.2
Jajodia, S.3
Samarati, P.4
-
34
-
-
60049093906
-
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment
-
The National Academies Press: Washington, DC, USA
-
Perry, J.W. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment; The National Academies Press: Washington, DC, USA, 2008.
-
(2008)
-
-
Perry, J.W.1
-
35
-
-
84863938835
-
Cloud Computing and National Security Laws
-
Technical report; The Harvard Law National Security Research Group: Cambridge, MA, USA
-
Deyrup, I.; Matthew, S. Cloud Computing and National Security Laws; Technical report; The Harvard Law National Security Research Group: Cambridge, MA, USA, 2010.
-
(2010)
-
-
Deyrup, I.1
Matthew, S.2
-
36
-
-
82255173617
-
Survey of directly mapping SQL databases to the Semantic Web
-
Sequeda, F.J.; Tirmizi, S.H.; Corcho, O.; Miranker, D.P. Survey of directly mapping SQL databases to the Semantic Web. Knowl. Eng. Rev. 2011, 26, 445-486.
-
(2011)
Knowl. Eng. Rev
, vol.26
, pp. 445-486
-
-
Sequeda, F.J.1
Tirmizi, S.H.2
Corcho, O.3
Miranker, D.P.4
-
37
-
-
78650853282
-
Semantic technologies for enterprise cloud management
-
Haase, P.; Mathäß, T.; Schmidt, M.; Eberhart, A.; Walther, U. Semantic technologies for enterprise cloud management. Lect. Notes Comput. Sci. 2010, 6497, 98-113.
-
(2010)
Lect. Notes Comput. Sci
, vol.6497
, pp. 98-113
-
-
Haase, P.1
Mathäß, T.2
Schmidt, M.3
Eberhart, A.4
Walther, U.5
-
39
-
-
72249091212
-
-
World Wide Web 2004. Available online: (accessed on 19 October 2012).
-
Horrocks, I.; Patel-Schneider, P.F.; Boley, H.; Tabet, S.; Grosof, B.; Dean, M. SWRL: A semantic web rule language combing OWL and RuleML. World Wide Web 2004. Available online: http://www.w3.org/Submission/SWRL/ (accessed on 19 October 2012).
-
SWRL: A semantic web rule language combing OWL and RuleML
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
-
40
-
-
78649842800
-
SemPIF: A semantic meta-policy interchange format for multiple web policies
-
In Proceedings of Web Intelligence and Intelligent Agent Technology (WI-IAT), Toronto, Canada, August-3 September
-
Hu, Y.J.; Boley, H. SemPIF: A semantic meta-policy interchange format for multiple web policies. In Proceedings of Web Intelligence and Intelligent Agent Technology (WI-IAT), Toronto, Canada, August-3 September 2010; pp. 302-307.
-
(2010)
, pp. 302-307
-
-
Hu, Y.J.1
Boley, H.2
-
41
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, 21-24 May
-
Barth, A.; Datta, A.; Mitchell, J.C.; Nissenbaum, H. Privacy and contextual integrity: Framework and applications. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, 21-24 May 2006.
-
(2006)
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
42
-
-
81855218018
-
Understanding and protecting privacy: Formal semantics and principled audit mechanisms
-
Datta, A.; Blocki, J.; Christin, N.; DeYoung, H.; Garg, D.; Jia, L.; Kaynar, D.; Sinha, A. Understanding and protecting privacy: Formal semantics and principled audit mechanisms. Lect. Notes Comput. Sci. 2011, 7093, 1-27.
-
(2011)
Lect. Notes Comput. Sci
, vol.7093
, pp. 1-27
-
-
Datta, A.1
Blocki, J.2
Christin, N.3
DeYoung, H.4
Garg, D.5
Jia, L.6
Kaynar, D.7
Sinha, A.8
-
43
-
-
85117785726
-
Datalog: A family of logical knowledge representation and query languages for new applications: Keynote lecture
-
In Proceedings of 25th annual IEEE Symposium on Logic in Computer Science, Edinburgh, UK, 11-14 July
-
Cali, A.; Gottlob, G.; Lukasiewicz, T.; Marnette, B.; Pieris, A. Datalog: A family of logical knowledge representation and query languages for new applications: Keynote lecture. In Proceedings of 25th annual IEEE Symposium on Logic in Computer Science, Edinburgh, UK, 11-14 July 2010.
-
(2010)
-
-
Cali, A.1
Gottlob, G.2
Lukasiewicz, T.3
Marnette, B.4
Pieris, A.5
-
44
-
-
84874631968
-
-
Technical report, Deliverable D4.1.; The European project for Standardized Transparent Representations in order to Extend Legal Accessibility (ESTRELLA): Amsterdam, The Netherlands
-
Gordon, F.T. The Legal Knowledge Interchange Format (LKIF); Technical report, Deliverable D4.1.; The European project for Standardized Transparent Representations in order to Extend Legal Accessibility (ESTRELLA): Amsterdam, The Netherlands, 2008.
-
(2008)
The Legal Knowledge Interchange Format (LKIF)
-
-
Gordon, F.T.1
|