7,063 research outputs found
A formal model for classifying trusted Semantic Web Services
Semantic Web Services (SWS) aim to alleviate Web service limitations, by combining Web service technologies with the potential of Semantic Web. Several open issues have to be tackled yet, in order to enable a safe and efficient Web services selection. One of them is represented by trust. In this paper, we introduce a trust definition and formalize a model for managing trust in SWS. The model approaches the selection of trusted Web services as a classification problem, and it is realized by an ontology, which extends WSMO. A prototype is deployed, in order to give a proof of concept of our approach
Mind the Gap: From Desktop to App
In this article we present a new mobile game, edugames4all MicrobeQuest!, that covers core learning objectives from the European curriculum on microbe transmission, food and hand hygiene, and responsible antibiotic use. The game is aimed at 9 to 12 year olds and it is based on the desktop version of the edugames4all platform games. We discuss the challenges and lessons learned transitioning from a desktop based game to a mobile app. We also present the seamless evaluation obtained by integrating the assessment of educa- tional impact of the game into the game mechanics
Recommended from our members
A trust based methodology for web service selection
In this paper, we propose a methodology for addressing trust in Semantic Web Services (SWS) - based applications. The aim is to enhance the capability-driven selection provided by current SWS frameworks with the introduction of trust-based selection criteria. We present an ontology - Web Services Trust Ontology (WSTO) - that models the context of a trust-based interaction and enables the participants to describe semantically their trust requirements and guarantees. WSTO makes use of WSMO as reference ontology for representing Web Services and embodies the problem of finding the most "trusted" Web service as a classification problem. To test our methodology, we implemented a specific module within IRS-III - a WSMO-based SWS broker - and deployed a prototype application based on a use case scenario
Design of a trust system for e-commerce platforms based on quality dimensions for linked open datasets
This article describes a proposal about a trust system for e-commerce platform based on semantic web technologies and trust dimensions rules. We try to expose a system that allow to manage communication processes between e-commerce platforms and users in a trustworthy manner. It allows the data flows and transactions gain more trust across the entire process. All of this can be achieved through the inference of rules exposed in the defined ontology, complemented by a cloud-based system with microservices architecture. With the implementation of the system through an e-commerce platform, could consume data from the microservices in order to get inferences about its clients that want to buy or sell something within its system. This system was created based on rules defined by the ontology, as well as the microservices could be used to register information about multiple e-commerce transactions. The result of this work is the Ontology and semantic web rules defined and implemented through protege.info:eu-repo/semantics/publishedVersio
Neural Networks for the Web Services Classification
This article introduces a n-gram-based approach to automatic classification of Web services using a multilayer perceptron-type artificial neural network. Web services contain information that is useful for achieving a classification based on its functionality. The approach relies on word n-grams extracted from the web service description to determine its membership in a category. The experimentation carried out shows promising results, achieving a classification with a measure F=0.995 using unigrams (2-grams) of words (characteristics composed of a lexical unit) and a TF-IDF weight
Towards automated knowledge-based mapping between individual conceptualisations to empower personalisation of Geospatial Semantic Web
Geospatial domain is characterised by vagueness, especially in the semantic disambiguation of the concepts in the domain, which makes defining universally accepted geo- ontology an onerous task. This is compounded by the lack of appropriate methods and techniques where the individual semantic conceptualisations can be captured and compared to each other. With multiple user conceptualisations, efforts towards a reliable Geospatial Semantic Web, therefore, require personalisation where user diversity can be incorporated. The work presented in this paper is part of our ongoing research on applying commonsense reasoning to elicit and maintain models that represent users' conceptualisations. Such user models will enable taking into account the users' perspective of the real world and will empower personalisation algorithms for the Semantic Web. Intelligent information processing over the Semantic Web can be achieved if different conceptualisations can be integrated in a semantic environment and mismatches between different conceptualisations can be outlined. In this paper, a formal approach for detecting mismatches between a user's and an expert's conceptual model is outlined. The formalisation is used as the basis to develop algorithms to compare models defined in OWL. The algorithms are illustrated in a geographical domain using concepts from the SPACE ontology developed as part of the SWEET suite of ontologies for the Semantic Web by NASA, and are evaluated by comparing test cases of possible user misconceptions
Data DNA: The Next Generation of Statistical Metadata
Describes the components of a complete statistical metadata system and suggests ways to create and structure metadata for better access and understanding of data sets by diverse users
FEMwiki: crowdsourcing semantic taxonomy and wiki input to domain experts while keeping editorial control: Mission Possible!
Highly specialized professional communities of practice (CoP) inevitably need to operate across geographically dispersed area - members frequently need to interact and share professional content. Crowdsourcing using wiki platforms provides a novel way for a professional community to share ideas and collaborate on content creation, curation, maintenance and sharing. This is the aim of the Field Epidemiological Manual wiki (FEMwiki) project enabling online collaborative content sharing and interaction for field epidemiologists around a growing training wiki resource. However, while user contributions are the driving force for content creation, any medical information resource needs to keep editorial control and quality assurance. This requirement is typically in conflict with community-driven Web 2.0 content creation. However, to maximize the opportunities for the network of epidemiologists actively editing the wiki content while keeping quality and editorial control, a novel structure was developed to encourage crowdsourcing â a support for dual versioning for each wiki page enabling maintenance of expertreviewed pages in parallel with user-updated versions, and a clear navigation between the related versions. Secondly, the training wiki content needs to be organized in a semantically-enhanced taxonomical navigation structure enabling domain experts to find information on a growing site easily. This also provides an ideal opportunity for crowdsourcing. We developed a user-editable collaborative interface crowdsourcing the taxonomy live maintenance to the community of field epidemiologists by embedding the taxonomy in a training wiki platform and generating the semantic navigation hierarchy on the fly. Launched in 2010, FEMwiki is a real world service supporting field epidemiologists in Europe and worldwide. The crowdsourcing success was evaluated by assessing the number and type of changes made by the professional network of epidemiologists over several months and demonstrated that crowdsourcing encourages user to edit existing and create new content and also leads to expansion of the domain taxonomy
Knowledge society arguments revisited in the semantic technologies era
In the light of high profile governmental and international efforts to realise the knowledge society, I review the arguments made for and against it from a technology standpoint. I focus on advanced knowledge technologies with applications on a large scale and in open- ended environments like the World Wide Web and its ambitious extension, the Semantic Web. I argue for a greater role of social networks in a knowledge society and I explore the recent developments in mechanised trust, knowledge certification, and speculate on their blending with traditional societal institutions. These form the basis of a sketched roadmap for enabling technologies for a knowledge society
Ontology-based Access Control in Open Scenarios: Applications to Social Networks and the Cloud
La integraciĂł d'Internet a la societat actual ha fet possible compartir fĂ cilment grans quantitats d'informaciĂł electrĂČnica i recursos informĂ tics (que inclouen maquinari, serveis informĂ tics, etc.) en entorns distribuĂŻts oberts. Aquests entorns serveixen de plataforma comuna per a usuaris heterogenis (per exemple, empreses, individus, etc.) on es proporciona allotjament d'aplicacions i sistemes d'usuari personalitzades; i on s'ofereix un accĂ©s als recursos compartits des de qualsevol lloc i amb menys esforços administratius. El resultat Ă©s un entorn que permet a individus i empreses augmentar significativament la seva productivitat.
Com ja s'ha dit, l'intercanvi de recursos en entorns oberts proporciona importants avantatges per als diferents usuaris, perĂČ, tambĂ© augmenta significativament les amenaces a la seva privacitat. Les dades electrĂČniques compartides poden ser explotades per tercers (per exemple, entitats conegudes com "Data Brokers"). MĂ©s concretament, aquestes organitzacions poden agregar la informaciĂł compartida i inferir certes caracterĂstiques personals sensibles dels usuaris, la qual cosa pot afectar la seva privacitat.
Una manera de del.liar aquest problema consisteix a controlar l'accés dels usuaris als recursos potencialment sensibles. En concret, la gestió de control d'accés regula l'accés als recursos compartits d'acord amb les credencials dels usuaris, el tipus de recurs i les preferÚncies de privacitat dels propietaris dels recursos/dades.
La gestiĂł eficient de control d'accĂ©s Ă©s crucial en entorns grans i dinĂ mics. D'altra banda, per tal de proposar una soluciĂł viable i escalable, cal eliminar la gestiĂł manual de regles i restriccions (en la qual, la majoria de les solucions disponibles depenen), atĂšs que aquesta constitueix una pesada cĂ rrega per a usuaris i administradors . Finalment, la gestiĂł del control d'accĂ©s ha de ser intuĂŻtiu per als usuaris finals, que en general no tenen grans coneixements tĂšcnics.La integraciĂłn de Internet en la sociedad actual ha hecho posible compartir fĂĄcilmente grandes cantidades de informaciĂłn electrĂłnica y recursos informĂĄticos (que incluyen hardware, servicios informĂĄticos, etc.) en entornos distribuidos abiertos. Estos entornos sirven de plataforma comĂșn para usuarios heterogĂ©neos (por ejemplo, empresas, individuos, etc.) donde se proporciona alojamiento de aplicaciones y sistemas de usuario personalizadas; y donde se ofrece un acceso ubicuo y con menos esfuerzos administrativos a los recursos compartidos. El resultado es un entorno que permite a individuos y empresas aumentar significativamente su productividad.
Como ya se ha dicho, el intercambio de recursos en entornos abiertos proporciona importantes ventajas para los distintos usuarios, no obstante, tambiĂ©n aumenta significativamente las amenazas a su privacidad. Los datos electrĂłnicos compartidos pueden ser explotados por terceros (por ejemplo, entidades conocidas como âData Brokersâ). MĂĄs concretamente, estas organizaciones pueden agregar la informaciĂłn compartida e inferir ciertas caracterĂsticas personales sensibles de los usuarios, lo cual puede afectar a su privacidad.
Una manera de paliar este problema consiste en controlar el acceso de los usuarios a los recursos potencialmente sensibles. En concreto, la gestiĂłn de control de acceso regula el acceso a los recursos compartidos de acuerdo con las credenciales de los usuarios, el tipo de recurso y las preferencias de privacidad de los propietarios de los recursos/datos.
La gestiĂłn eficiente de control de acceso es crucial en entornos grandes y dinĂĄmicos. Por otra parte, con el fin de proponer una soluciĂłn viable y escalable, es necesario eliminar la gestiĂłn manual de reglas y restricciones (en la cual, la mayorĂa de las soluciones disponibles dependen), dado que Ă©sta constituye una pesada carga para usuarios y administradores. Por Ășltimo, la gestiĂłn del control de acceso debe ser intuitivo para los usuarios finales, que por lo general carecen de grandes conocimientos tĂ©cnicos.Thanks to the advent of the Internet, it is now possible to easily share vast amounts of electronic information and computer resources (which include hardware, computer services, etc.) in open distributed environments. These environments serve as a common platform for heterogeneous users (e.g., corporate, individuals etc.) by hosting customized user applications and systems, providing ubiquitous access to the shared resources and requiring less administrative efforts; as a result, they enable users and companies to increase their productivity.
Unfortunately, sharing of resources in open environments has significantly increased the privacy threats to the users. Indeed, shared electronic data may be exploited by third parties, such as Data Brokers, which may aggregate, infer and redistribute (sensitive) personal features, thus potentially impairing the privacy of the individuals.
A way to palliate this problem consists on controlling the access of users over the potentially sensitive resources. Specifically, access control management regulates the access to the shared resources according to the credentials of the users, the type of resource and the privacy preferences of the resource/data owners.
The efficient management of access control is crucial in large and dynamic environments such as the ones described above. Moreover, in order to propose a feasible and scalable solution, we need to get rid of manual management of rules/constraints (in which most available solutions rely) that constitutes a serious burden for the users and the administrators. Finally, access control management should be intuitive for the end users, who usually lack technical expertise, and they may find access control mechanism more difficult to understand and rigid to apply due to its complex configuration settings
- âŠ