skip to main content
Bibliometrics
Skip Abstract Section
Abstract

A Uniform Resource Identifier (URI) is a compact string of characters for identifying an abstract or physical resource. This document defines the generic syntax of URI, including both absolute and relative forms, and guidelines for their use; it revises and replaces the generic definitions in RFC 1738 and RFC 1808.

RFC Downloads

Cited By

  1. Monaco J What are you searching for? a remote keylogging attack on search engine autocomplete Proceedings of the 28th USENIX Conference on Security Symposium, (959-976)
  2. Antoniazzi F and Viola F RDF Graph Visualization Tools: a Survey Proceedings of the 23rd Conference of Open Innovations Association FRUCT, (27-38)
  3. ACM
    Coulon F, Degueule T, van der Storm T and Combemale B Shape-diverse DSLs: languages without borders (vision paper) Proceedings of the 11th ACM SIGPLAN International Conference on Software Language Engineering, (215-219)
  4. ACM
    Das A, Acar G, Borisov N and Pradeep A The Web's Sixth Sense Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1515-1532)
  5. ACM
    Atzenbeck C, Roßner D and Tzagarakis M Mother Proceedings of the 29th on Hypertext and Social Media, (145-149)
  6. ACM
    Ghali C, Tsudik G and Wood C When encryption is not enough Proceedings of the 4th ACM Conference on Information-Centric Networking, (1-10)
  7. Oliveira J, Delgado C and Assaife A (2017). A recommendation approach for consuming linked open data, Expert Systems with Applications: An International Journal, 72:C, (407-420), Online publication date: 15-Apr-2017.
  8. ACM
    Hassanshahi B and Yap R Android Database Attacks Revisited Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, (625-639)
  9. ACM
    Ghali C, Tsudik G and Wood C (The Futility of) Data Privacy in Content-Centric Networking Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, (143-152)
  10. Jo S and Chung K (2015). Design of access control system for telemedicine secure XML documents, Multimedia Tools and Applications, 74:7, (2257-2271), Online publication date: 1-Apr-2015.
  11. Faubel S and Eberl M The organiser Proceedings of the 2014 International Conference on Posters & Demonstrations Track - Volume 1272, (61-64)
  12. ACM
    Weiher M and Hirschfeld R (2013). Polymorphic identifiers, ACM SIGPLAN Notices, 49:2, (61-72), Online publication date: 5-Feb-2014.
  13. ACM
    Weiher M and Hirschfeld R Polymorphic identifiers Proceedings of the 9th symposium on Dynamic languages, (61-72)
  14. Braun B, Pollak C and Posegga J A Survey on Control-Flow Integrity Means in Web Application Frameworks Proceedings of the 18th Nordic Conference on Secure IT Systems - Volume 8208, (231-246)
  15. ACM
    Würsch M, Giger E and Gall H (2013). Evaluating a query framework for software evolution data, ACM Transactions on Software Engineering and Methodology, 22:4, (1-38), Online publication date: 1-Oct-2013.
  16. Auer S, Lehmann J, Ngonga Ngomo A and Zaveri A Introduction to linked data and its lifecycle on the web Proceedings of the 9th international conference on Reasoning Web: semantic technologies for intelligent data access, (1-90)
  17. Ast M, Wild S and Gaedke M The SWAC approach for sharing a web application's codebase between server and client Proceedings of the 13th international conference on Web Engineering, (84-98)
  18. ACM
    Dionisio J, III W and Gilbert R (2013). 3D Virtual worlds and the metaverse, ACM Computing Surveys, 45:3, (1-38), Online publication date: 1-Jun-2013.
  19. Braun B, Gemein P, Reiser H and Posegga J Control-Flow integrity in web applications Proceedings of the 5th international conference on Engineering Secure Software and Systems, (1-16)
  20. Thimm H (2012). Cloud-Based Collaborative Decision Making, International Journal of Decision Support System Technology, 4:4, (39-59), Online publication date: 1-Oct-2012.
  21. ACM
    Zhang C, Cheng C and Ji Y Architecture design for social web of things Proceedings of the 1st International Workshop on Context Discovery and Data Mining, (1-7)
  22. Ahn G, Jin J and Shehab M (2012). Policy-driven role-based access management for ad-hoc collaboration, Journal of Computer Security, 20:2-3, (223-257), Online publication date: 1-Mar-2012.
  23. Khandelwal A, Jacobi I and Kagal L Linked rules Proceedings of the 5th international conference on Web reasoning and rule systems, (108-123)
  24. Auer S, Lehmann J and Ngomo A Introduction to linked data and its lifecycle on the web Proceedings of the 7th international conference on Reasoning web: semantic technologies for the web of data, (1-75)
  25. ACM
    Chun W, Lee T and Choi T YANAIL Proceedings of the 6th International Conference on Future Internet Technologies, (8-12)
  26. Segec P and Kovacikova T (2011). A survey of open source products for building a SIP communication platform, Advances in Multimedia, 2011, (5-5), Online publication date: 1-Jan-2011.
  27. ACM
    Mokhov S, Paquet J and Tong X A type system for hybrid intensional-imperative programming support in GIPSY Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering, (101-107)
  28. Yang X, Moore P and Chong S (2009). Intelligent products, Computers in Industry, 60:3, (184-194), Online publication date: 1-Apr-2009.
  29. ACM
    Bar-Yossef Z, Keidar I and Schonfeld U (2009). Do not crawl in the DUST, ACM Transactions on the Web, 3:1, (1-31), Online publication date: 1-Jan-2009.
  30. ACM
    Hillenbrand M, Götze J and Müller P Contract-first service development within the Venice service grid Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, (48-54)
  31. ACM
    Xie Y, Yu F, Achan K, Panigrahy R, Hulten G and Osipkov I (2008). Spamming botnets, ACM SIGCOMM Computer Communication Review, 38:4, (171-182), Online publication date: 1-Oct-2008.
  32. ACM
    Xie Y, Yu F, Achan K, Panigrahy R, Hulten G and Osipkov I Spamming botnets Proceedings of the ACM SIGCOMM 2008 conference on Data communication, (171-182)
  33. Balakrichenan S and Becker M An autonomic ENUM implementation in network simulator-2 Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, (1-10)
  34. ACM
    Lee A, Winslett M, Basney J and Welch V (2008). The Traust Authorization Service, ACM Transactions on Information and System Security, 11:1, (1-33), Online publication date: 1-Feb-2008.
  35. Kostopoulos G and Koufopavlou O NASS-IMS bundled authentication study through core network concepts Proceedings of the 3rd international conference on Mobile multimedia communications, (1-6)
  36. ACM
    Främling K, Ala-Risku T, Kärkkäinen M and Holmström J (2007). Design patterns for managing product life cycle information, Communications of the ACM, 50:6, (75-79), Online publication date: 1-Jun-2007.
  37. Agosti M, Di Nunzio G and Ferro N The importance of scientific data curation for evaluation campaigns Proceedings of the 1st international conference on Digital libraries: research and development, (157-166)
  38. Krishna M Retaining Semantics in Relational Databases by Mapping them to RDF Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (303-306)
  39. Zhao Y, Serafini L and Giunchiglia F Autonomous ontology Proceedings of the First Asian conference on The Semantic Web, (646-652)
  40. ACM
    Lagoze C, Krafft D, Cornwell T, Dushay N, Eckstrom D and Saylor J Metadata aggregation and "automated digital libraries" Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries, (230-239)
  41. ACM
    Mattmann C, Crichton D, Medvidovic N and Hughes S A software architecture-based framework for highly distributed and data intensive scientific applications Proceedings of the 28th international conference on Software engineering, (721-730)
  42. ACM
    Kannan N and Hussain T Live URLs Proceedings of the 15th international conference on World Wide Web, (879-880)
  43. O’Sullivan J, Edmond D and ter Hofstede A The price of services Proceedings of the Third international conference on Service-Oriented Computing, (564-569)
  44. Giereth M On partial encryption of RDF-Graphs Proceedings of the 4th international conference on The Semantic Web, (308-322)
  45. ACM
    Thorne C Exploiting an evolutionary accident in web3D communications to integrate application components ACM SIGGRAPH 2005 Web program, (1-es)
  46. Lee S, Kim S and Jeong H How to evaluate the effectiveness of URL normalizations Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues, (228-237)
  47. Dreger H, Kreibich C, Paxson V and Sommer R Enhancing the accuracy of network-based intrusion detection with host-based context Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, (206-221)
  48. ACM
    Agosti M, Ferro N and Orio N Annotating illuminated manuscripts Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries, (121-130)
  49. Lee S, Kim S and Hong S On URL normalization Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (1076-1085)
  50. Leicher A and Süß J Augmenting UML models for composition conflict analysis Proceedings of the 8th international conference, held as part of the joint European Conference on Theory and Practice of Software conference on Fundamental Approaches to Software Engineering, (127-140)
  51. ACM
    Ahmedi L Making XPath reach for the web-wide links Proceedings of the 2005 ACM symposium on Applied computing, (1714-1721)
  52. Xing W, Dikaiakos M, Yang H, Sphyris A and Eftichidis G A grid-enabled digital library system for natural disaster metadata Proceedings of the 2005 European conference on Advances in Grid Computing, (516-526)
  53. ACM
    Thiemann P (2005). An embedded domain-specific language for type-safe server-side web scripting, ACM Transactions on Internet Technology, 5:1, (1-46), Online publication date: 1-Feb-2005.
  54. ACM
    Safavi-Naini R, Sheppard N and Uehara T Import/export in digital rights management Proceedings of the 4th ACM workshop on Digital rights management, (99-110)
  55. Ossenbruggen J, Nack F and Hardman L (2004). That Obscure Object of Desire, IEEE MultiMedia, 11:4, (38-48), Online publication date: 1-Oct-2004.
  56. Marchiori M Towards a People's Web Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, (320-326)
  57. ACM
    Pan K, Whitehead E and Ge G Hypertext versioning for embedded link models Proceedings of the fifteenth ACM conference on Hypertext and hypermedia, (195-204)
  58. ACM
    Kim W and Karp A Customizable description and dynamic discovery for web services Proceedings of the 5th ACM conference on Electronic commerce, (142-151)
  59. ACM
    Eiron N, McCurley K and Tomlin J Ranking the web frontier Proceedings of the 13th international conference on World Wide Web, (309-318)
  60. Lüttich K, Mossakowski T and Krieg-Brückner B Ontologies for the semantic web in CASL Proceedings of the 17th international conference on Recent Trends in Algebraic Development Techniques, (106-125)
  61. Tanasa D and Trousse B (2004). Advanced Data Preprocessing for Intersites Web Usage Mining, IEEE Intelligent Systems, 19:2, (59-65), Online publication date: 1-Mar-2004.
  62. Kikuchi T, Noro M, Yamazaki K, Sunahara H and Shimojo S Lifeline Communication System in the Internet Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
  63. Minami M, Morikawa H and Aoyama T The Design of Naming-Based Service Composition System for Ubiquitous Computing Applications Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
  64. ACM
    Pfeiffer S, Parker C and Schremmer C Annodex Proceedings of the 5th ACM SIGMM international workshop on Multimedia information retrieval, (87-93)
  65. ACM
    Guth S, Neumann G and Strembeck M Experiences with the enforcement of access rights extracted from ODRL-based digital contracts Proceedings of the 3rd ACM workshop on Digital rights management, (90-102)
  66. ACM
    Lei Y, Motta E and Domingue J Design of customized web applications with OntoWeaver Proceedings of the 2nd international conference on Knowledge capture, (54-61)
  67. ACM
    Eiron N and McCurley K Untangling compound documents on the web Proceedings of the fourteenth ACM conference on Hypertext and hypermedia, (85-94)
  68. ACM
    Bull L, Stanski P and Squire D Content extraction signatures using XML digital signatures and custom transforms on-demand Proceedings of the 12th international conference on World Wide Web, (170-177)
  69. Zittrain J and Edelman B (2003). Internet Filtering in China, IEEE Internet Computing, 7:2, (70-77), Online publication date: 1-Mar-2003.
  70. Shirmohammadi S, Ding L and Georganas N (2003). An Approach for Recording Multimedia Collaborative Sessions, Multimedia Tools and Applications, 19:2, (135-154), Online publication date: 1-Feb-2003.
  71. ACM
    Kraft R Designing a distributed access control processor for network services on the Web Proceedings of the 2002 ACM workshop on XML security, (36-52)
  72. ACM
    Imamura T, Clark A and Maruyama H A stream-based implementation of XML encryption Proceedings of the 2002 ACM workshop on XML security, (11-17)
  73. Hoschek W The Web Service Discovery Architecture Proceedings of the 2002 ACM/IEEE conference on Supercomputing, (1-15)
  74. ACM
    Carroll J Unparsing RDF/XML Proceedings of the 11th international conference on World Wide Web, (454-461)
  75. ACM
    Kindberg T Implementing physical hyperlinks using ubiquitous identifier resolution Proceedings of the 11th international conference on World Wide Web, (191-199)
  76. Barbeau M Mobile, distributed, and pervasive computing Handbook of wireless networks and mobile computing, (581-600)
  77. Kitcharoensakkul S and Wuwongse V (2001). Unified Versioning Using Resource Description Framework, Annals of Software Engineering, 11:1, (259-297), Online publication date: 7-Nov-2001.
  78. Grütter R and Eikemeier C Development of a simple ontology definition language (SOntoDL) and its application to a medical information service on the world wide web Proceedings of the First International Conference on Semantic Web Working, (587-597)
  79. Goad C Describing computation within RDF Proceedings of the First International Conference on Semantic Web Working, (361-380)
  80. Klein M and Fensel D Ontology versioning on the semantic web Proceedings of the First International Conference on Semantic Web Working, (75-91)
  81. Gritzalis D, Moulinos K, Iliadis J, Lambrinoudakis C and Xarhoulacos S PyTHIA Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (1-17)
  82. Cheng P (2001). An architecture for the internet key exchange protocol, IBM Systems Journal, 40:3, (721-746), Online publication date: 1-Mar-2001.
  83. Dyreson C Towards a temporal world-wide web Proceedings of the 12th Australasian database conference, (169-175)
  84. McLean C and Riddick F Simulation in the international IMS MISSION project Proceedings of the 32nd conference on Winter simulation, (1539-1548)
  85. ACM
    de La Beaujardière J, Mitchell H, Raskin R and Rao A The NASA Digital Earth Testbed Proceedings of the 8th ACM international symposium on Advances in geographic information systems, (47-53)
  86. ACM
    Iliadis J, Spinellis D, Gritzalis D, Preneel B and Katsikas S Evaluating certificate status information mechanisms Proceedings of the 7th ACM conference on Computer and Communications Security, (1-8)
  87. IEEE Intelligent Systems staff (2000). The Semantic Web And Its Languages, IEEE Intelligent Systems, 15:6, (67-73), Online publication date: 1-Nov-2000.
  88. ACM
    Whitehead J (2000). As we do write, ACM SIGWEB Newsletter, 9:2-3, (8-18), Online publication date: 1-Jun-2000.
  89. ACM
    Fielding R and Taylor R Principled design of the modern Web architecture Proceedings of the 22nd international conference on Software engineering, (407-416)
  90. José R and Davies N Scalable and Flexible Location-Based Services for Ubiquitous Information Access Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, (52-66)
  91. Whitehead E and Goland Y WebDAV Proceedings of the sixth conference on European Conference on Computer Supported Cooperative Work, (291-310)
  92. ACM
    Anderson K Supporting industrial hyperwebs Proceedings of the 21st international conference on Software engineering, (573-582)
  93. ACM
    Whitehead E Control choices and network effects in hypertext systems Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots: returning to our diverse roots, (75-82)
Contributors
  • Palo Alto Research Center Incorporated

Recommendations