Privacy for Semantic Web Mining using Advanced DSA – Spatial LBS Case Study
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
The Web Services paradigm promises to enable rich flexible d dynamic interoperation of highly distributed, eterogeneous etwork enabled services. The idea of Web ervices Mining that t makes use of the findings in the field of ata mining and pplies them to the world of Web Services. he emerging oncept of Semantic Web Services aims at more sophisticated eb Services technologies: on basis of Semantic Description Frameworks, Intelligent mechanisms are visioned for iscovery, Composition, and contracting of Web ervices. The im of semantic web is not only to support to cess information on he web but also to support its usage. ospatial Semantic Web is an augmentation to the Semantic eb that adds geospatial abstractions, as well as related asoning, representation and query mechanisms. Web ervice Security represents a key requirement for today’s istributed terconnected digital world and for the new generations, Web .0 and Semantic Web. To date, the problem of security has een investigated very much in the context of standardization fforts; ersonal judgments are made usually based on the ensitivity f the information and the reputation of the party to hich the nformation is to be disclosed. On the privacy front, his means hat privacy invasion would net more quality and ensitive ersonal information. In this paper, we had mplemented a ase study on integrated privacy issues of patial Semantic Web Services Mining. Initially we improved rivacy of Geospatial emantic Layer. Finally, we mplemented Location Based ystem and improved its digital signature capability, using dvanced Digital Signature tandards
Authors and Affiliations
Dr. D. Sravan Kumar , M. Upendra Kumar
Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach
To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as...
Performance Analysis of Gender Clustering and Classification Algorithms
In speech processing, gender clustering and classification plays a major role. In both gender clustering and classification, selecting the feature is an important process and the often utilized feature for gender cluster...
Applying moving boundary to compute the alluvium transport and testing the results by remote sensing
To compute the alluvium transport, we use a current model based on a 2D finite-difference grid and a sediment transport model. The first one gives the velocity distribution on the surface of water body and in the case of...
AN ANDROID APPLICATION FOR ATM WITH A SECURED PIN-ENTRY METHODS
One of the most commonly occurringproblems in the recent years are the ATM (Automatic teller machine) frauds. People lose their money due to lack of awareness. The major reason for such kind of actions is the attacks mad...
A Fast Algorithm for Mining Multilevel Association Rule Based on Boolean Matrix
In this paper an algorithm is proposed for mining multilevel ssociation rules. A Boolean Matrix based approach has been mployed to discover frequent itemsets, the item forming a ule ome from different levels. It adop...