Khaled Sadeq Al-shredei, Mohamad A. A. Al-Rababah and Nour E. Oweis
King AbdulAziz University, Northern Border University, Jeddah, Saudi Arabia Technical University of Ostrava, Faculty of Electrical Engineering and
Computer Science, Arar, Saudi Arabia
Article Received on :
Article Accepted on :
Article Published :
In this paper we will talk about information technology semantic , which plays an important role in many areas of human activity and therefore the task of data security semantic is very important for information technology and will consider this research to support the idea of data semantic cards safety of RDF tri- called safety data. Also with the security of confidential data labels in different security levels in different departments have different ranges and variety of use of user data. There are ongoing contacts with the idea of safety data on the labels of three diverse In this research has identified the main rules to control user access to the data by comparing the levels of access to the user ( the security levels triple ) Based on these rules and advanced algorithms will do read and modify data RDF triple.
KEYWORDS: Data security, Computer networks, Information technologyCopy the following to cite this article: |
Copy the following to cite this URL: |