Open Access Open Access  Restricted Access Subscription Access

Control Algorithm to The Semantic D ata Security in Computer Networks


Affiliations
1 King AbdulAziz University, Northern Border University, Jeddah, Saudi Arabia
2 Technical University of Ostrava, Arar, Saudi Arabia
 

In this paper we will talk about information technology semantic , which plays an important role in many areas of human activity and therefore the task of data security semantic is very important for information technology and will consider this research to support the idea of data semantic cards safety of RDF tri- called safety data. Also with the security of confidential data labels in different security levels in different departments have different ranges and variety of use of user data. There are ongoing contacts with the idea of safety data on the labels of three diverse In this research has identified the main rules to control user access to the data by comparing the levels of access to the user ( the security levels triple ) Based on these rules and advanced algorithms will do read and modify data RDF triple.

Keywords

Data Security, Computer Networks, Information Technology.
User
Notifications
Font Size

Abstract Views: 211

PDF Views: 0




  • Control Algorithm to The Semantic D ata Security in Computer Networks

Abstract Views: 211  |  PDF Views: 0

Authors

Al-Shredei Khaled Sadeq
King AbdulAziz University, Northern Border University, Jeddah, Saudi Arabia
Mohamad A. A. Al-Rababah
Technical University of Ostrava, Arar, Saudi Arabia
Nour E. Oweis
Technical University of Ostrava, Arar, Saudi Arabia

Abstract


In this paper we will talk about information technology semantic , which plays an important role in many areas of human activity and therefore the task of data security semantic is very important for information technology and will consider this research to support the idea of data semantic cards safety of RDF tri- called safety data. Also with the security of confidential data labels in different security levels in different departments have different ranges and variety of use of user data. There are ongoing contacts with the idea of safety data on the labels of three diverse In this research has identified the main rules to control user access to the data by comparing the levels of access to the user ( the security levels triple ) Based on these rules and advanced algorithms will do read and modify data RDF triple.

Keywords


Data Security, Computer Networks, Information Technology.