7,063 research outputs found

    A formal model for classifying trusted Semantic Web Services

    Get PDF
    Semantic Web Services (SWS) aim to alleviate Web service limitations, by combining Web service technologies with the potential of Semantic Web. Several open issues have to be tackled yet, in order to enable a safe and efficient Web services selection. One of them is represented by trust. In this paper, we introduce a trust definition and formalize a model for managing trust in SWS. The model approaches the selection of trusted Web services as a classification problem, and it is realized by an ontology, which extends WSMO. A prototype is deployed, in order to give a proof of concept of our approach

    Mind the Gap: From Desktop to App

    Get PDF
    In this article we present a new mobile game, edugames4all MicrobeQuest!, that covers core learning objectives from the European curriculum on microbe transmission, food and hand hygiene, and responsible antibiotic use. The game is aimed at 9 to 12 year olds and it is based on the desktop version of the edugames4all platform games. We discuss the challenges and lessons learned transitioning from a desktop based game to a mobile app. We also present the seamless evaluation obtained by integrating the assessment of educa- tional impact of the game into the game mechanics

    Design of a trust system for e-commerce platforms based on quality dimensions for linked open datasets

    Get PDF
    This article describes a proposal about a trust system for e-commerce platform based on semantic web technologies and trust dimensions rules. We try to expose a system that allow to manage communication processes between e-commerce platforms and users in a trustworthy manner. It allows the data flows and transactions gain more trust across the entire process. All of this can be achieved through the inference of rules exposed in the defined ontology, complemented by a cloud-based system with microservices architecture. With the implementation of the system through an e-commerce platform, could consume data from the microservices in order to get inferences about its clients that want to buy or sell something within its system. This system was created based on rules defined by the ontology, as well as the microservices could be used to register information about multiple e-commerce transactions. The result of this work is the Ontology and semantic web rules defined and implemented through protege.info:eu-repo/semantics/publishedVersio

    Neural Networks for the Web Services Classification

    Get PDF
    This article introduces a n-gram-based approach to automatic classification of Web services using a multilayer perceptron-type artificial neural network. Web services contain information that is useful for achieving a classification based on its functionality. The approach relies on word n-grams extracted from the web service description to determine its membership in a category. The experimentation carried out shows promising results, achieving a classification with a measure F=0.995 using unigrams (2-grams) of words (characteristics composed of a lexical unit) and a TF-IDF weight

    Towards automated knowledge-based mapping between individual conceptualisations to empower personalisation of Geospatial Semantic Web

    No full text
    Geospatial domain is characterised by vagueness, especially in the semantic disambiguation of the concepts in the domain, which makes defining universally accepted geo- ontology an onerous task. This is compounded by the lack of appropriate methods and techniques where the individual semantic conceptualisations can be captured and compared to each other. With multiple user conceptualisations, efforts towards a reliable Geospatial Semantic Web, therefore, require personalisation where user diversity can be incorporated. The work presented in this paper is part of our ongoing research on applying commonsense reasoning to elicit and maintain models that represent users' conceptualisations. Such user models will enable taking into account the users' perspective of the real world and will empower personalisation algorithms for the Semantic Web. Intelligent information processing over the Semantic Web can be achieved if different conceptualisations can be integrated in a semantic environment and mismatches between different conceptualisations can be outlined. In this paper, a formal approach for detecting mismatches between a user's and an expert's conceptual model is outlined. The formalisation is used as the basis to develop algorithms to compare models defined in OWL. The algorithms are illustrated in a geographical domain using concepts from the SPACE ontology developed as part of the SWEET suite of ontologies for the Semantic Web by NASA, and are evaluated by comparing test cases of possible user misconceptions

    Data DNA: The Next Generation of Statistical Metadata

    Get PDF
    Describes the components of a complete statistical metadata system and suggests ways to create and structure metadata for better access and understanding of data sets by diverse users

    FEMwiki: crowdsourcing semantic taxonomy and wiki input to domain experts while keeping editorial control: Mission Possible!

    Get PDF
    Highly specialized professional communities of practice (CoP) inevitably need to operate across geographically dispersed area - members frequently need to interact and share professional content. Crowdsourcing using wiki platforms provides a novel way for a professional community to share ideas and collaborate on content creation, curation, maintenance and sharing. This is the aim of the Field Epidemiological Manual wiki (FEMwiki) project enabling online collaborative content sharing and interaction for field epidemiologists around a growing training wiki resource. However, while user contributions are the driving force for content creation, any medical information resource needs to keep editorial control and quality assurance. This requirement is typically in conflict with community-driven Web 2.0 content creation. However, to maximize the opportunities for the network of epidemiologists actively editing the wiki content while keeping quality and editorial control, a novel structure was developed to encourage crowdsourcing – a support for dual versioning for each wiki page enabling maintenance of expertreviewed pages in parallel with user-updated versions, and a clear navigation between the related versions. Secondly, the training wiki content needs to be organized in a semantically-enhanced taxonomical navigation structure enabling domain experts to find information on a growing site easily. This also provides an ideal opportunity for crowdsourcing. We developed a user-editable collaborative interface crowdsourcing the taxonomy live maintenance to the community of field epidemiologists by embedding the taxonomy in a training wiki platform and generating the semantic navigation hierarchy on the fly. Launched in 2010, FEMwiki is a real world service supporting field epidemiologists in Europe and worldwide. The crowdsourcing success was evaluated by assessing the number and type of changes made by the professional network of epidemiologists over several months and demonstrated that crowdsourcing encourages user to edit existing and create new content and also leads to expansion of the domain taxonomy

    Knowledge society arguments revisited in the semantic technologies era

    No full text
    In the light of high profile governmental and international efforts to realise the knowledge society, I review the arguments made for and against it from a technology standpoint. I focus on advanced knowledge technologies with applications on a large scale and in open- ended environments like the World Wide Web and its ambitious extension, the Semantic Web. I argue for a greater role of social networks in a knowledge society and I explore the recent developments in mechanised trust, knowledge certification, and speculate on their blending with traditional societal institutions. These form the basis of a sketched roadmap for enabling technologies for a knowledge society

    Ontology-based Access Control in Open Scenarios: Applications to Social Networks and the Cloud

    Get PDF
    La integraciĂł d'Internet a la societat actual ha fet possible compartir fĂ cilment grans quantitats d'informaciĂł electrĂČnica i recursos informĂ tics (que inclouen maquinari, serveis informĂ tics, etc.) en entorns distribuĂŻts oberts. Aquests entorns serveixen de plataforma comuna per a usuaris heterogenis (per exemple, empreses, individus, etc.) on es proporciona allotjament d'aplicacions i sistemes d'usuari personalitzades; i on s'ofereix un accĂ©s als recursos compartits des de qualsevol lloc i amb menys esforços administratius. El resultat Ă©s un entorn que permet a individus i empreses augmentar significativament la seva productivitat. Com ja s'ha dit, l'intercanvi de recursos en entorns oberts proporciona importants avantatges per als diferents usuaris, perĂČ, tambĂ© augmenta significativament les amenaces a la seva privacitat. Les dades electrĂČniques compartides poden ser explotades per tercers (per exemple, entitats conegudes com "Data Brokers"). MĂ©s concretament, aquestes organitzacions poden agregar la informaciĂł compartida i inferir certes caracterĂ­stiques personals sensibles dels usuaris, la qual cosa pot afectar la seva privacitat. Una manera de del.liar aquest problema consisteix a controlar l'accĂ©s dels usuaris als recursos potencialment sensibles. En concret, la gestiĂł de control d'accĂ©s regula l'accĂ©s als recursos compartits d'acord amb les credencials dels usuaris, el tipus de recurs i les preferĂšncies de privacitat dels propietaris dels recursos/dades. La gestiĂł eficient de control d'accĂ©s Ă©s crucial en entorns grans i dinĂ mics. D'altra banda, per tal de proposar una soluciĂł viable i escalable, cal eliminar la gestiĂł manual de regles i restriccions (en la qual, la majoria de les solucions disponibles depenen), atĂšs que aquesta constitueix una pesada cĂ rrega per a usuaris i administradors . Finalment, la gestiĂł del control d'accĂ©s ha de ser intuĂŻtiu per als usuaris finals, que en general no tenen grans coneixements tĂšcnics.La integraciĂłn de Internet en la sociedad actual ha hecho posible compartir fĂĄcilmente grandes cantidades de informaciĂłn electrĂłnica y recursos informĂĄticos (que incluyen hardware, servicios informĂĄticos, etc.) en entornos distribuidos abiertos. Estos entornos sirven de plataforma comĂșn para usuarios heterogĂ©neos (por ejemplo, empresas, individuos, etc.) donde se proporciona alojamiento de aplicaciones y sistemas de usuario personalizadas; y donde se ofrece un acceso ubicuo y con menos esfuerzos administrativos a los recursos compartidos. El resultado es un entorno que permite a individuos y empresas aumentar significativamente su productividad. Como ya se ha dicho, el intercambio de recursos en entornos abiertos proporciona importantes ventajas para los distintos usuarios, no obstante, tambiĂ©n aumenta significativamente las amenazas a su privacidad. Los datos electrĂłnicos compartidos pueden ser explotados por terceros (por ejemplo, entidades conocidas como “Data Brokers”). MĂĄs concretamente, estas organizaciones pueden agregar la informaciĂłn compartida e inferir ciertas caracterĂ­sticas personales sensibles de los usuarios, lo cual puede afectar a su privacidad. Una manera de paliar este problema consiste en controlar el acceso de los usuarios a los recursos potencialmente sensibles. En concreto, la gestiĂłn de control de acceso regula el acceso a los recursos compartidos de acuerdo con las credenciales de los usuarios, el tipo de recurso y las preferencias de privacidad de los propietarios de los recursos/datos. La gestiĂłn eficiente de control de acceso es crucial en entornos grandes y dinĂĄmicos. Por otra parte, con el fin de proponer una soluciĂłn viable y escalable, es necesario eliminar la gestiĂłn manual de reglas y restricciones (en la cual, la mayorĂ­a de las soluciones disponibles dependen), dado que Ă©sta constituye una pesada carga para usuarios y administradores. Por Ășltimo, la gestiĂłn del control de acceso debe ser intuitivo para los usuarios finales, que por lo general carecen de grandes conocimientos tĂ©cnicos.Thanks to the advent of the Internet, it is now possible to easily share vast amounts of electronic information and computer resources (which include hardware, computer services, etc.) in open distributed environments. These environments serve as a common platform for heterogeneous users (e.g., corporate, individuals etc.) by hosting customized user applications and systems, providing ubiquitous access to the shared resources and requiring less administrative efforts; as a result, they enable users and companies to increase their productivity. Unfortunately, sharing of resources in open environments has significantly increased the privacy threats to the users. Indeed, shared electronic data may be exploited by third parties, such as Data Brokers, which may aggregate, infer and redistribute (sensitive) personal features, thus potentially impairing the privacy of the individuals. A way to palliate this problem consists on controlling the access of users over the potentially sensitive resources. Specifically, access control management regulates the access to the shared resources according to the credentials of the users, the type of resource and the privacy preferences of the resource/data owners. The efficient management of access control is crucial in large and dynamic environments such as the ones described above. Moreover, in order to propose a feasible and scalable solution, we need to get rid of manual management of rules/constraints (in which most available solutions rely) that constitutes a serious burden for the users and the administrators. Finally, access control management should be intuitive for the end users, who usually lack technical expertise, and they may find access control mechanism more difficult to understand and rigid to apply due to its complex configuration settings
    • 

    corecore