skip to main content
article
Free Access

Secure knowledge management and the semantic web

Published:01 December 2005Publication History
Skip Abstract Section

Abstract

Strengthening security within the domain of shared knowledge is a critical issue, and great challenge, to businesses today. A number of different protocols currently available offer an array of benefits and limitations.

References

  1. Alavi, M. and Leidner, D.E. Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Q. 25, 1, (2001), 107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Berners-Lee, T., Hendler, J., and Lassila, O. The Semantic Web. Scientific American 284, 5 (May 2001), 34--43.Google ScholarGoogle ScholarCross RefCross Ref
  3. Davies, J., Fensel, D., and van Harmelen, F. (Eds.). Towards the Semantic Web: Ontology-Driven Knowledge Management. John Wiley, Chichester, West Sussex, U.K., 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Griffith, T.L., Sawyer, J.E., and Neale, M.A. Virtualness and knowledge in teams: Managing the love triangle of organizations, individuals, and information technology. MIS Q. 27, 2 (2003), 265--287. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Kim, D.J., Agrawal, M., Jayaraman, B., and Rao, H.R. A comparison of B2B e-service solutions. Commun. ACM 46, 12 (Dec. 2003ve) 317--324. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. King, W.R., Marks, P.V., and McCoy, S. The most important issues in knowledge management. Commun. ACM 45, 9 (Sept. 2002), 93--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Nonaka, I. A dynamic theory of organizational knowledge creation. Organization Science 5, 1 (1994), 14--37.Google ScholarGoogle ScholarCross RefCross Ref
  8. Singh, R., Iyer, L., and Salam, A.F. Semantic ebusiness. Intern. J. on Semantic Web IS 1, 1 (2005) 19--35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Thuraisingham, B. Keynote: Secure knowledge management. Presented at the the Workshop on Secure Knowledgement Management, Buffalo, NY, 2004.Google ScholarGoogle Scholar
  10. Tidwell, L.C. and Walther, J.B. Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations. Human Commun. Research, 28, 3 (2002), 317--348.Google ScholarGoogle ScholarCross RefCross Ref
  11. Upadhyaya, S., Rao, H.R., and Padmanabhan, G. Secure knowledge management. Encyclopedia of Knowledge Management. D.G. Schwartz, Ed. Idea Group Reference, 2006.Google ScholarGoogle Scholar
  12. Xu, S. And Zhang, W. PBKM: A secure knowledge management framework. Presented at the Workshop on Secure Knowledge Management, Buffalo, NY, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Secure knowledge management and the semantic web

                      Recommendations

                      Comments

                      Login options

                      Check if you have access through your login credentials or your institution to get full access on this article.

                      Sign in

                      Full Access

                      • Published in

                        cover image Communications of the ACM
                        Communications of the ACM  Volume 48, Issue 12
                        The semantic e-business vision
                        December 2005
                        104 pages
                        ISSN:0001-0782
                        EISSN:1557-7317
                        DOI:10.1145/1101779
                        Issue’s Table of Contents

                        Copyright © 2005 ACM

                        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                        Publisher

                        Association for Computing Machinery

                        New York, NY, United States

                        Publication History

                        • Published: 1 December 2005

                        Permissions

                        Request permissions about this article.

                        Request Permissions

                        Check for updates

                        Qualifiers

                        • article

                      PDF Format

                      View or Download as a PDF file.

                      PDF

                      eReader

                      View online with eReader.

                      eReader

                      HTML Format

                      View this article in HTML Format .

                      View HTML Format