dc.contributor.author |
Dellas, NL |
en |
dc.contributor.author |
Koutsoloukas, EA |
en |
dc.contributor.author |
Lioudakis, GV |
en |
dc.contributor.author |
Kaklamani, DI |
en |
dc.contributor.author |
Venieris, IS |
en |
dc.date.accessioned |
2014-03-01T02:44:24Z |
|
dc.date.available |
2014-03-01T02:44:24Z |
|
dc.date.issued |
2007 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/31798 |
|
dc.subject |
Ontology |
en |
dc.subject |
Performance |
en |
dc.subject |
Reasoning |
en |
dc.subject |
Rule engines |
en |
dc.subject.other |
Laws and legislation |
en |
dc.subject.other |
Real time systems |
en |
dc.subject.other |
Telecommunication |
en |
dc.subject.other |
JESS rules |
en |
dc.subject.other |
Mobile and wireless communications |
en |
dc.subject.other |
Ontology modeling |
en |
dc.subject.other |
Perfor mance comparison |
en |
dc.subject.other |
Performance |
en |
dc.subject.other |
Policy-based systems |
en |
dc.subject.other |
Reasoning |
en |
dc.subject.other |
Rule engines |
en |
dc.subject.other |
Technological solutions |
en |
dc.subject.other |
User privacy |
en |
dc.subject.other |
Ontology |
en |
dc.title |
A performance comparison of ontology reasoning and rule engines |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/ISTMWC.2007.4299267 |
en |
heal.identifier.secondary |
4299267 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/ISTMWC.2007.4299267 |
en |
heal.publicationDate |
2007 |
en |
heal.abstract |
Even though ontology modeling and policy based systems were originally created for different problem spaces it became obvious in the course of time that they can both be useful tools to express restrictions in a real life situation into technically enforceable rules. One of such situations where both ontology reasoning and rule engines can be applied as technological solutions is the design of an information system that enforces restrictions related to user privacy protection. During the design of such a system, privacy related restrictions could be expressed either as rules into an ontology describing the privacy world of a user, or as a set of straightforward Jess rules. A performance comparison of the two approaches is presented in this paper. |
en |
heal.journalName |
2007 16th IST Mobile and Wireless Communications Summit |
en |
dc.identifier.doi |
10.1109/ISTMWC.2007.4299267 |
en |