Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
To achieve the dream of the semantic web, it must be possible for ordinary users to invoke services. Exactly how to turn this dream into reality is a challenging opportunity and a...
Muhammed Al-Muhammed, David W. Embley, Stephen W. ...
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Abstract. The next phase envisioned for the World Wide Web is automated ad-hoc interaction between intelligent agents, web services, databases and semantic web enabled applications...
Phillipa Oaks, Arthur H. M. ter Hofstede, David Ed...
Unambiguous definition of the information exchanged between distributed systems is a necessary requirement for simulation system interoperability. The ontological spectrum categor...