Privacy for Semantic Web Mining using Advanced DSA – Spatial LBS Case Study
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
The Web Services paradigm promises to enable rich flexible d dynamic interoperation of highly distributed, eterogeneous etwork enabled services. The idea of Web ervices Mining that t makes use of the findings in the field of ata mining and pplies them to the world of Web Services. he emerging oncept of Semantic Web Services aims at more sophisticated eb Services technologies: on basis of Semantic Description Frameworks, Intelligent mechanisms are visioned for iscovery, Composition, and contracting of Web ervices. The im of semantic web is not only to support to cess information on he web but also to support its usage. ospatial Semantic Web is an augmentation to the Semantic eb that adds geospatial abstractions, as well as related asoning, representation and query mechanisms. Web ervice Security represents a key requirement for today’s istributed terconnected digital world and for the new generations, Web .0 and Semantic Web. To date, the problem of security has een investigated very much in the context of standardization fforts; ersonal judgments are made usually based on the ensitivity f the information and the reputation of the party to hich the nformation is to be disclosed. On the privacy front, his means hat privacy invasion would net more quality and ensitive ersonal information. In this paper, we had mplemented a ase study on integrated privacy issues of patial Semantic Web Services Mining. Initially we improved rivacy of Geospatial emantic Layer. Finally, we mplemented Location Based ystem and improved its digital signature capability, using dvanced Digital Signature tandards
Authors and Affiliations
Dr. D. Sravan Kumar , M. Upendra Kumar
Nodes distribution and selection of accurate mobility Framework to systematically analyze its impact for improving performance of routing protocols for mobile ad hoc networks through Simulations
Research on mobile ad hoc routing protocols performance based on simulation relies on choice of realistic mobility model. However, in the absence of realistic data movement, Synthetic models may be used for generating mo...
Improvement in Word Sense Disambiguation by introducing enhancements in English WordNet Structure
Word sense disambiguation (WSD) is an open problem of natural language processing, which governs the process of identifying the appropriate sense of a word (i.e. intended meaning) in a sentence, when the word has multipl...
Anti-Synchronization of the Hyperchaotic Liu and Hyperchaotic Qi Systems by Active Control
This paper investigates the problem of anti-synchronization of identical hyperchaotic Liu systems (2008), hyperchaotic Qi systems (2008) and non-identical hyperchaotic Liu and hyperchaotic Qi systems using active nonline...
Implementation of Secured password for Web applications using two server model
The secured password is the most commonly used uthentication mechanism in security applications [11]. There ay be chances of password hacking from the hackers, so hat t is very essential to protect password informati...
Stream Ciphers Encript Transformation
In this paper the initiative has been taken to review the flaws which have lead to the decline of stream ciphers in public domain. This review of the flaws in the existing stream cipher systems had lead to the developmen...