IJISA Vol. 4, No. 12, 8 Nov. 2012
Cover page and Table of Contents: PDF (size: 1425KB)
Semantic, Role, Ontology, OWL, Description Logic
Communication is the most common but an intricate activity that we perform every day. Sender sends message, discussions, greetings, gestures, emotics and texts through numerous channels, (e.g. e-mail, messengers, social networks and so on) intending the receiver to understand. The means of personal or group communication has been radically changed over last decade. Geographical, ethnicity, nationality, race, religion are no more hindrance for the sake of social communication. Forms of communication, event, gathering, greetings almost have altered into virtual society. But this hi-tech society has still yet enough room to strengthen its semantic nature. We have made an endeavor to conglomerate the socio-psycho-technical aspect of so-called social networks which could be more realistic, logically inferable and convincible towards people to claim its analogousness with real society. Our devised SN is able to eliminate some weird problems that we face in current SNs, imperfect relationship assignment policies and possibility of data interference among desired and intruder groups.
Fausto Giunchiglia, Md. Saddam Hossain Mukta, Mir Tafseer Nayeem, Khandaker Tabin Hasan, "Semantic Enabled Role Based Social Network", International Journal of Intelligent Systems and Applications(IJISA), vol.4, no.12, pp.1-11, 2012. DOI:10.5815/ijisa.2012.12.01
[1]Danah M. Boyd and Nicole Ellison, “Social network sites: Definition, history, and scholarship.” J. Computer-Mediated Communication, 13(1):210–230, 2007.
[2]Catherine Dwyer, Starr Hiltz, and Katia Passerini, “Trust and privacy concern within social networking sites: A comparison of facebook and myspace.” Americas Conference on Information Systems, 2007.
[3]C. W. Bachman and M. Daya, “The role concept in data models”. In Proceedings of the Third International Conference on Very Large Data Bases (VLDB),IEEE Computer Society., (2):464476, June 1977.
[4]Linda Banwell and Graham Coulson,“ Users and user study methodology”:the jubilee project. Inf. Res., 9(2), 2003.
[5]T. Gruber, “A translation approach to portable ontology specifications”, Knowledge Acquisition, 5(2):199–220, June 1993.
[6]Saikat Guha, Kevin Tang and Paul Francis, “Noyb: privacy in online social networks”. In WOSP 08: Proceedings of the first workshop on Online social networks, New York, NY, USA, 2008. ACM., page pages 4954, 2008.
[7]PostgreSQL. See at http://www.postgresql.org/.
[8]Effie Law, Virpi Roto, Arnold P. O. S. Vermeeren, Joke Kort, and Marc Hassenzahl, “Towards a shared definition of user experience”. In CHI ’08: CHI ’08 extended abstracts on Human factors in computing systems, pages 2395–2398, New York, NY, USA, 2008. ACM.
[9]Jianguo Li, Yong Tang, Chengjie Mao, Hanjiang Lai, and Jun Zhu, “Role based access control for social network sites”. In Pervasive Computing(JCPC), 2009 Joint Conferences on, pages 389 –394, 2009.
[10]Claudio Masolo, Laure Vieu, Emanuele Bottazzi, Carola Catenacci, Roberta Ferrario, Aldo Gangemi, and Nicola Guarino, “Social roles and their descriptions”. In KR, pages 267–277, 2004.
[11]N.F. Noyn and Mcguiness D. L, “Ontology development 101: A guide to creating your first ontology”. In Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report SMI-2001-0880, 2001.
[12]Alexander Richter and Michael Koch, “Functions of social networking services”. In MultikonferenzWirtschaftsinformatik, 2008.
[13]Jasper A. Schelling, “Social network visualization”. PhD thesis, 2007.
[14]Friedrich Steimann, “The role data model revisited”. Applied Ontology, 2(2):89–103, 2007.
[15]OWL Web Ontology Language Guide, - See at http://www.w3.org/TR/2004/REC-owl-guide 20040210/#DisjointClasses
[16]Fausto Giunchiglia, Biswanath Dutta, Vincenzo Maltese, “Faceted Lightweight Ontologies”. Conceptual Modeling: Foundations and Applications 2009: 36-51.
[17]Jena A Semantic Web Framework for JAVA. See at http://jena.sourceforge.net/index.html.
[18]SPARQL Query Language for RDF. See athttp://www.w3.org /TR/rdfsparql-query/
[19]Spring Framework. See at http://static.springsource.org/spring/docs/2.0.x/reference/mvc.htm
[20]F. Beato, M. Kohlweiss, and K. Wouters. “Enforcing access control in social networks”. Hot Pets, (2):199–220, June 2009.
[21]Michael A. Hogg, Deborah J. Terry, Katherine M. White. “A Tale of Two Theories: A Critical Comparison of Identity Theory with Social Identity Theory”. Social Psychology Quarterly, Vol. 58, No. 4 (Dec., 1995), pp. 255-269
[22]David K. Marcus, “Interpersonal Feedback :A Social Relations Perspective.” International journal of group psychotherapy, 56 (2) 2006.
[23]Google+. See at http://www.plus.google.com
[24]Facebook. See at http://facebook.com
[25]Orkut. See at http://www.orkut.com/
[26]MySpace. See at http://www.myspace.com/
[27]Fausto Giunchiglia, Maurizio Marchese, Ilya Zaihrayeu: Encoding Classifications into Lightweight Ontologies. J. Data Semantics 8: 57-81 (2007).
[28]Fausto Giunchiglia, Rui Zhang, Bruno Crispo- “RelBAC: Relation Based Access Control”, Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid. (SKG 2008) Beijing, China, December 2008, pages 3-11.
[29]Fausto Giunchiglia, Rui Zhang, Bruno Crispo, “Ontology Driven Community Access Control “, Proceedings of the Trust and Privacy on the Social and Semantic Web Workshop. (SPOT 2009) Heraklion, Greece, June 2009.
[30]See at http://www.inf.unibz.it/~franconi/dl/course/dlhb/dlhb-02.pdf
[31]Dr. Brian Matthews , “Semantic web technologies”. See at http://www.jisc.ac.uk/uploaded_documents/jisctsw_05_02bpdf.pdf
[32]Md. Saddam Hossain Mukta, Khandakar Tabin Hasan, Sazzad Hossain, “Ontology driven role based social network”, International Conference on Informatics, Electronics and vision, pp:908-913, May 17-18, Dahaka, Bangladesh.
[33]See at http://www.cs.ox.ac.uk/ian.horrocks/Publications/download/2007/BaHS07a.pdf