Secured Ontology Matching Using Graph Matching

被引:0
作者
Shenoy, K. Manjula [1 ]
Shet, K. C. [2 ]
Acharya, U. Dinesh [1 ]
机构
[1] Manipal Univ, MIT, Dept Comp Sci & Engn, Manipal, Karnataka, India
[2] NITK, Dept Comp Engn, Mangalore, India
来源
ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2 | 2013年 / 177卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's market evolution and high volatility of business requirements put an increasing emphasis on the ability for systems to accommodate the changes required by new organizational needs while maintaining security objectives satisfiability. This is all the more true in case of collaboration and interoperability between different organizations and thus between their information systems. Ontology mapping has been used for interoperability and several mapping systems have evolved to support the same. Usual solutions do not take care of security. That is almost all systems do a mapping of ontologies which are unsecured. We have developed a system for mapping secured ontologies using graph similarity concept. Here we give no importance to the strings that describe ontology concepts, properties etc. Because these strings may be encrypted in the secured ontology. Instead we use the pure graphical structure to determine mapping between various concepts of given two secured ontologies. The paper also gives the measure of accuracy of experiment in a tabular form in terms of precision, recall and F-measure.
引用
收藏
页码:11 / +
页数:3
相关论文
共 18 条
  • [1] Agrawal R, 2000, P SIGMOD 2000
  • [2] [Anonymous], 1999, J ACM
  • [3] Choi N, 2006, SIGMOD RECORD 2006
  • [4] Clifton C, 2004, P DMKD 2004
  • [5] DOAN A, 2002, P WWW 2002
  • [6] Ehrig Marc., 2004, GI JAHRESTAGUNG
  • [7] KALFOGLOU Y, 2003, KNOWLEDGE ENG REV, V18
  • [8] Li J, 2004, P PERMIS 2004
  • [9] Melnik S, 2007, P ICDE 2007
  • [10] MELNIK S, 2002, P ICDE 2002