Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs
Expressing machine-interpretable statements in the form of subject-predicate-object triples
is a well-established practice for capturing semantics of structured data. However, the …
is a well-established practice for capturing semantics of structured data. However, the …
Access control and the resource description framework: A survey
In recent years we have seen significant advances in the technology used to both publish
and consume structured data using the existing web infrastructure, commonly referred to as …
and consume structured data using the existing web infrastructure, commonly referred to as …
Secure manipulation of linked data
When it comes to publishing data on the web, the level of access control required (if any) is
highly dependent on the type of content exposed. Up until now RDF data publishers have …
highly dependent on the type of content exposed. Up until now RDF data publishers have …
Linked data authorization platform
The expansion of the smart devices, the growing popularity of the social networks, and the
wide spread of the corporate services impose huge amounts of heterogeneous data to be …
wide spread of the corporate services impose huge amounts of heterogeneous data to be …
[PDF][PDF] Linked data with access control
S Kirrane - Diss. National University of Ireland …, 2015 - researchrepository …
The explosion of digital content and the heterogeneity of enterprise content sources have
pushed existing data integration solutions to their boundaries. An alternative solution is to …
pushed existing data integration solutions to their boundaries. An alternative solution is to …
Inference leakage detection for authorization policies over RDF data
T Sayah, E Coquery, R Thion, MS Hacid - … XXIX: 29th Annual IFIP WG 11.3 …, 2015 - Springer
Abstract The Semantic Web technologies include entailment regimes that produce new RDF
data from existing ones. In the presence of access control, once a user has legitimately …
data from existing ones. In the presence of access control, once a user has legitimately …
Towards a Domain-Agnostic Computable Policy Tool
M Falkow, H Santos, DL McGuinness - European Semantic Web …, 2021 - Springer
Policies are often crucial for decision-making in a wide range of domains. Typically they are
written in natural language, which leaves room for different individual interpretations. In …
written in natural language, which leaves room for different individual interpretations. In …
Authorization proxy for sparql endpoints
R Stojanov, M Jovanovik - International Conference on ICT Innovations, 2017 - Springer
A large number of emerging services expose their data using various Application
Programming Interfaces (APIs). Consuming and fusing data form various providers is a …
Programming Interfaces (APIs). Consuming and fusing data form various providers is a …
Applying DAC principles to the RDF graph data model
In this paper we examine how Discretionary Access Control principles, that have been
successfully applied to relational and XML data, can be applied to the Resource Description …
successfully applied to relational and XML data, can be applied to the Resource Description …
Protect your RDF data!
The explosion of digital content and the heterogeneity of enterprise content sources have
pushed existing data integration solutions to their boundaries. Although RDF can be used as …
pushed existing data integration solutions to their boundaries. Although RDF can be used as …