SECURED ONTOLOGY MAPPING

Published: 19 August 2022
on channel: International J of Web & Semantic Technology
8
1

SECURED ONTOLOGY MAPPING

Authors
Manjula Shenoy.K1 ,Dr.K.C.Shet2 ,Dr. U.Dinesh Acharya1
1Department of Computer Engineering, Manipal University, MIT, Manipal
2Department of Computer Engineering, NITK, Suratkal

Abstract
Today’s market evolution and high volatility of business requirements put an increasing emphasis on the ability for systems to accommodate the changes required by new organizational needs while maintaining
security objectives satisfiability. This is all the more true in case of collaboration and interoperability between different organizations and thus between their information systems. Ontology mapping has been
used for interoperability and several mapping systems have evolved to support the same. Usual solutions do not take care of security. That is almost all systems do a mapping of ontologies which are unsecured.
We have developed a system for mapping secured ontologies using graph similarity concept. Here we give no importance to the strings that describe ontology concepts ,properties etc. Because these strings may be
encrypted in the secured ontology. Instead we use the pure graphical structure to determine mapping between various concepts of given two secured ontologies. The paper also gives the measure of accuracy
of experiment in a tabular form in terms of precision, recall and F-measure.

KEYWORDS
Ontology, Ontology mapping, Security ,Interoperability

Source URL : https://airccse.org/journal/ijwest/papers/...

Volume URL : http://www.airccse.org/journal/ijwest/vol3...


Watch video SECURED ONTOLOGY MAPPING online, duration hours minute second in high quality that is uploaded to the channel International J of Web & Semantic Technology 19 August 2022. Share the link to the video on social media so that your subscribers and friends will also watch this video. This video clip has been viewed 8 times and liked it 1 visitors.