Citation: | XUE Jin-rong, ZHENG Jun, AN Qiu-sheng. RDF(S) repository privacy protection via inference control[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2014, 23(4): 495-501. |
[1] |
Lassila O, Swick R. Resource description framework(RDF): Model and syntax specification. Recommendation, W3C [EB/OL]. (1998-10-11). http://www.w3.org/TR/REC-rdf-syntax/.
|
[2] |
Brickley D, Guha R. Resource description framework(RDF) Schema specification 1.0. Candidate recommendation, W3C[EB/OL]. (2000-08-20). http://www.w3.org/TR/2000/CR-rdf-schema20000327/.
|
[3] |
Broekstra J. Storage, querying and inferencing for semantic web languages[M]. Amsterdam: Department of Mathematics and Computer Science, Vrije Universiteit Amsterdam, 2005.
|
[4] |
Shi Yiyi. RDF closure generation technology research based on the forward chaining strategy[J]. Computer Science, 2008, 35(4):336-337. (in Chinese)
|
[5] |
Lu Jianjiang, Wang Jinpeng, Zhang Yafei, et al. An inference control algorithm for RDF(S) repository[C]//Proceedings of the Intelligence and Security Informatics, Chengdu, China: Springer, 2007:262-268.
|
[6] |
Papakonstantinou V, Michou M, Fundulaki I, et al. Access control for RDF graphs using abstract models[C]// Proceedings of the 17th ACM symposium on Access Control Models and Technologies, Newark, New Jersey, USA: ACM, 2012:103-112.
|
[7] |
Zoi Kaoudi, Manolis Koubarakis. Distributed RDFS reasoning over structured overlay networks[M]. Berlin: Springer, 2013,
|
[8] |
Zuo Xiaoling, Li Weijian, Liu Yongcai. Discrete mathematics[M]. Shanghai: Shanghai Science and Technology Press, 1982. (in Chinese)
|
[9] |
Zhi Huilai, Zhi Dongjie, Liu Zongtian. Research on conversion from conjunctive normal form to disjunctive normal form[J]. Computer Engineering and Applications, 2012, 48(2):15-17. (in Chinese)
|
[10] |
Zhang Dedong, Li Renpu, Zhao Yongsheng. High-efficient algorithm for normal form conversion of discernibility function[J]. Application Research of Computers, 2010, 27(3):879-882.
|