Abstract
Developing secure semantic e-business applications requires focusing first on securing the Semantic Web, knowledge management, and e-business processes.
- Agrawal, R, and Srikant, R. Privacy-preserving data mining. In Proceedings of the ACM SIGMOD Conference, (Dallas, TX, May 2000). Google ScholarDigital Library
- Atallah, M. et al. Secure supply-chain protocols. In Proceedings of the International Conference on Electronic Commerce, 2003.Google Scholar
- Berners-Lee, T. et al. Hendler, J. and Lassila, O. The Semantic Web. Scientific American, 284, 5. (May 2001) 34--43.Google Scholar
- Bertino, E. et al. Access control for XML documents. Data and Knowledge Engineering, (2002).Google Scholar
- Bertino, E. et al. Secure third-party publication of XML documents. IEEE Trans. on Knowledge and Data Eng. (Oct. 2004). Google ScholarDigital Library
- Carminati, B. et al. Specifying security policies in RDF. In Proceedings of the DEXA Workshop, 2004.Google Scholar
- Hassler, V. Security Fundamentals for E-Commerce. Artech House, UK, 2000. Google ScholarDigital Library
- Morey, D. et al., Eds. Knowledge Management. MIT Press, 2001.Google Scholar
- Singh, R. et al. Semantic e-business. Intern. J. on Semantic Web and Information Systems (2004).Google Scholar
- Thuraisingham, B. Data mining, national security, privacy and civil liberties. SIGKDD Explorations, 2002. Google ScholarDigital Library
- Thuraisingham, B. Security standards for the Semantic Web. Computer Standards and Interface J. (Mar. 2005). Google ScholarDigital Library
Index Terms
- Directions for security and privacy for semantic e-business applications
Recommendations
Semantic business process space for intelligent management of sales order business processes
A company's competitiveness relies heavily on its business processes and accurate knowledge to execute its business processes with agility and efficiency. Business Process Management (BPM) initially promised to provide the business world with suitable ...
From information security to...business security?
This short opinion paper argues that information security, the discipline responsible for protecting a company's information assets against business risks, has now become such a crucial component of good Corporate Governance, that it should rather be ...
Secure Enterprise Interoperability Ontology for Semantic Integration of Business to Business Applications
3PGCIC '13: Proceedings of the 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet ComputingWith the ever growing number of products that are targeted at solving a particular problem, rather than addressing all the requirements, which might otherwise be met with a multipurpose product, that need to be integrated in an enterprise business ...
Comments