IJRIT International Journal of Research in Information Technology, Volume 1, Issue 11, November, 2013, Pg. 495-500

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

A Simple Distributed Identification Protocol for Triplestores 1

E. Arun Kumar Goud , M. Janga Reddy 1

2

2

M.Tech student, Department of CSE, CMR institute of Technology, Dist. R.R, Hyderabad, AP, India Email-id: [email protected],

Professor and principal, Department of CSE, CMR institute of Technology, Dist. R.R, Hyderabad, AP and India Email-id: [email protected]

Abstract OAuth is an open standard for authorization. OAuth provides a method for clients to access server resources on behalf of a resource owner. It also provides a process for end-users to authorize third-party access such as games, and productivity applications access to user online private data to their server resources without sharing their credentials, using user-agent redirections. In this paper defines a simple identification protocol dedicated to triplestores which is universal and appropriate for the distributed environment. We propose a mechanism based on the HTTP standard, extended with OAuth Protocol and Semantic Web ontology. One can optionally adopt Transport Layer Security protocol. Here we present a scalable method that permits user authentication and authorization to triple stores with data integrity and confidentiality.

Keywords-- Authentication, authorization, access control list, triple store.

Full text: https://sites.google.com/a/ijrit.com/papers/home/V1I11129.pdf

IJRIT

1

A Simple Distributed Identification Protocol for ... - IJRIT

Email-id: [email protected]. Abstract. OAuth is an open standard for authorization. OAuth provides a method for clients to access server resources on ...

34KB Sizes 1 Downloads 316 Views

Recommend Documents

A Simple Distributed Identification Protocol for Triplestores - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 11, ... OAuth is associate degree open customary for authorization.

A Simple Distributed Identification Protocol for Triplestores - IJRIT
social network graph victimisation existing techniques. .... III. Distributed Identification Mechanism for Triplestores. This part we discuss the idea of using the ...

A Simple Distributed Identification Protocol for Triplestores - IJRIT
applications access to user online private data to their server resources without sharing their credentials, using user-agent redirections. In this paper defines a simple ... the employment and unleash of specific information, like money or medical d

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
The infrastructure less and the dynamic nature .... faster convergence, it employs a unique method of maintaining information regarding the shortest distance to.

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
CGSR Cluster head Gateway Switch Routing protocol [9] is a multichannel operation ..... protocols of mobile ad-hoc networks”, International Journal of Computer ...

A distributed spectrum handoff MSRV protocol for the ...
wireless spectrums access for the secondary users (SUs) while primary users (PUs) are ... protocol achieves 20% throughput and 13.7% average service time improvement in ...... secure architecture (UFSA) for authentication of cloud services.

A Secure Distributed Anonymous Routing Protocol for ...
for the session, and the signature of the original received message. b. Forward the new ..... and Digital Pseudonyms. Communications of the ACM, vol. 24, no.

CRN Survey and A Simple Sequential MAC Protocol for ... - CiteSeerX
COMSATS Institute of Information Technology. Abbottabad, Pakistan [email protected]. Tahir Maqsood. Computer Science Department. COMSATS Institute of ...

Research Article A simple and efficient protocol for ... - Semantic Scholar
entire diversity in DNA sequence that exists. Recent developments of marker technology have made great progress towards faster, cheaper, and reliable. There.

A Simple Distributed Power Control Algorithm for ...
the following advantages: 1) the operations of each SU are simple and ... It is proved that, the CR network with this simple algorithm ...... Wireless Commun., vol.

Secure Adhoc Routing Protocol for Privacy Preservation - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 9, .... Communication anonymity in data management has been discussed ..... “Rumor riding: anonymizing unstructured peer-to-peer systems,” IEEE Trans.

Dynamic Auditing Protocol for Data Storage and ... - IJRIT
(TPA) to verify the correctness of the dynamic data stored in cloud. Here the .... analyze the audits (verification) performed by the verifier (TPA) and get a better ...

Sigma-F Protocol Access Control for Real Time System - IJRIT
Key Words- Access control protocol; Scheduling; Real Time System; Response Time. 1. Introduction. The Real Time ... database locks etc. A job may need some ...

Sigma-F Protocol Access Control for Real Time System - IJRIT
Key Words- Access control protocol; Scheduling; Real Time System; Response Time. 1. Introduction. The Real Time ... database locks etc. A job may need some ...

Identification of Enablers of Poka-Yoke: A Review - IJRIT
Keywords: Indian Manufacturing Industries, Poka-Yoke, Quality, ... method is to eliminate human errors in manufacturing process and management as a result of ...

Secure Adhoc Routing Protocol for Privacy Preservation - IJRIT
In this particular paper, we define stronger privacy requirements relating to ..... “Rumor riding: anonymizing unstructured peer-to-peer systems,” IEEE Trans.

Dynamic Auditing Protocol for Data Storage and ... - IJRIT
Authentication Forwarding Mechanisms to scale the usability of the servers by ... the broad range of both internal and external threats for data integrity [11].

Identification of Enablers of Poka-Yoke: A Review - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 8, ... application of this tool, errors are removed in production system before they produce ... Chase and Stewart state that Poka-Yoke involves a three steps process

A Lane Departure eparture eparture Identification based on ... - IJRIT
Self-clustering algorithm, fuzzy C-mean and fuzzy rules were used to ..... linear regression, Computer Vision and Image Understanding 99 (2005) 359–383.

a novel pattern identification scheme using distributed ...
Jul 6, 2009 - macroblock temporal redundancy (ITR) (see Fig 1) which is static in successive frames. Indeed, few bits are used to signal zero residual error and zero motion for ITR to decoder, which is obviously significant when a sequence is encoded

A Scalable Distributed QoS Multicast Routing Protocol
Protocol. Shigang Chen. Department of Computer & Information Science & Engineering ... the system requirements; it relies only on the local state stored at each router. ... routing algorithms that search a selected subset of the network to find feasi

Fault Tolerance in Distributed System - IJRIT
Fault-tolerant describes a computer system or component designed so that, in the event that a component fails, a backup component or procedure can immediately ... millions of computing devices are working altogether and these millions of ...

Fault Tolerance in Distributed System - IJRIT
Fault Tolerance is an important issue in Distributed Computing. ... The partial failure is the key problem of the distributed system, .... architecture and design.