{"id":"https://openalex.org/W2019361180","doi":"https://doi.org/10.1109/cisim.2010.5643507","title":"Security enforcement using PKI in Semantic Web","display_name":"Security enforcement using PKI in Semantic Web","publication_year":2010,"publication_date":"2010-10-01","ids":{"openalex":"https://openalex.org/W2019361180","doi":"https://doi.org/10.1109/cisim.2010.5643507","mag":"2019361180"},"language":"en","primary_location":{"id":"doi:10.1109/cisim.2010.5643507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisim.2010.5643507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100651635","display_name":"Suresh Kumar","orcid":"https://orcid.org/0000-0002-8927-001X"},"institutions":[{"id":"https://openalex.org/I4210093800","display_name":"Voluntary Health Association Of India","ror":"https://ror.org/00nezvm77","country_code":"IN","type":"nonprofit","lineage":["https://openalex.org/I4210093800"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Suresh Kumar","raw_affiliation_strings":["CSE, A. I. T. G, New Delhi, India","(CSE), A. I. T. - G, New Delhi, India"],"affiliations":[{"raw_affiliation_string":"CSE, A. I. T. G, New Delhi, India","institution_ids":["https://openalex.org/I4210093800"]},{"raw_affiliation_string":"(CSE), A. I. T. - G, New Delhi, India","institution_ids":["https://openalex.org/I4210093800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033827193","display_name":"Rakesh Kr. Prajapati","orcid":"https://orcid.org/0000-0001-9719-6342"},"institutions":[{"id":"https://openalex.org/I4210093800","display_name":"Voluntary Health Association Of India","ror":"https://ror.org/00nezvm77","country_code":"IN","type":"nonprofit","lineage":["https://openalex.org/I4210093800"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rakesh Kr. Prajapati","raw_affiliation_strings":["CSE/IT, I. T. S. Engineering College, Noida, India","(CSE/IT), ITS Engineering College, Gr. Noida, India"],"affiliations":[{"raw_affiliation_string":"CSE/IT, I. T. S. Engineering College, Noida, India","institution_ids":["https://openalex.org/I4210093800"]},{"raw_affiliation_string":"(CSE/IT), ITS Engineering College, Gr. Noida, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101816461","display_name":"Manjeet Singh","orcid":"https://orcid.org/0000-0002-5117-0830"},"institutions":[{"id":"https://openalex.org/I55124831","display_name":"J.C. Bose University of Science & Technology, YMCA","ror":"https://ror.org/014jqnm52","country_code":"IN","type":"education","lineage":["https://openalex.org/I55124831"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manjeet Singh","raw_affiliation_strings":["CSE, YMCA University of Sciences and Technology, Faridabad, India","(CSE), YMCA U S & T, Faridabad, India"],"affiliations":[{"raw_affiliation_string":"CSE, YMCA University of Sciences and Technology, Faridabad, India","institution_ids":["https://openalex.org/I55124831"]},{"raw_affiliation_string":"(CSE), YMCA U S & T, Faridabad, India","institution_ids":["https://openalex.org/I55124831"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030616890","display_name":"\u0410\u0441\u043e\u043a \u0414\u0435","orcid":"https://orcid.org/0000-0002-8366-7024"},"institutions":[{"id":"https://openalex.org/I4210093800","display_name":"Voluntary Health Association Of India","ror":"https://ror.org/00nezvm77","country_code":"IN","type":"nonprofit","lineage":["https://openalex.org/I4210093800"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Asok De","raw_affiliation_strings":["ECE, A. I. T. G, New Delhi, India","(CSE), A. I. T. - G, New Delhi, India"],"affiliations":[{"raw_affiliation_string":"ECE, A. I. T. G, New Delhi, India","institution_ids":["https://openalex.org/I4210093800"]},{"raw_affiliation_string":"(CSE), A. I. T. - G, New Delhi, India","institution_ids":["https://openalex.org/I4210093800"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100651635"],"corresponding_institution_ids":["https://openalex.org/I4210093800"],"apc_list":null,"apc_paid":null,"fwci":5.5929,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.95424335,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"392","last_page":"397"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7798067331314087},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.6681803464889526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6591071486473083},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.6384391188621521},{"id":"https://openalex.org/keywords/root-certificate","display_name":"Root certificate","score":0.6309667825698853},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.5452204346656799},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.5077425241470337},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41881343722343445},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.4108225405216217},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3697832226753235},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3686063289642334},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12655824422836304}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7798067331314087},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.6681803464889526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6591071486473083},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.6384391188621521},{"id":"https://openalex.org/C62057728","wikidata":"https://www.wikidata.org/wiki/Q7366568","display_name":"Root certificate","level":5,"score":0.6309667825698853},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.5452204346656799},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.5077425241470337},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41881343722343445},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.4108225405216217},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3697832226753235},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3686063289642334},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12655824422836304},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisim.2010.5643507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisim.2010.5643507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2011607875","https://openalex.org/W2031721128","https://openalex.org/W2033342379","https://openalex.org/W2111192172","https://openalex.org/W2127683114","https://openalex.org/W2133353026","https://openalex.org/W2135558551","https://openalex.org/W2165809473","https://openalex.org/W4256108954","https://openalex.org/W6653275617"],"related_works":["https://openalex.org/W2277273755","https://openalex.org/W2188945435","https://openalex.org/W2506604349","https://openalex.org/W1709311896","https://openalex.org/W1612032142","https://openalex.org/W1490824585","https://openalex.org/W4244357787","https://openalex.org/W2910761843","https://openalex.org/W84721766","https://openalex.org/W2170764533"],"abstract_inverted_index":{"The":[0,15,38],"communication":[1,56,144,153],"technology":[2],"is":[3,168,241],"developing":[4],"in":[5,27,141,158,170],"internet":[6,55,157],"to":[7,29,59,70,111,116,130,186,233,244],"use":[8,112],"WWW":[9],"through":[10],"wired":[11],"and":[12,52,102,177,225,248],"wireless":[13,142],"networks.":[14],"electronic":[16],"authentication":[17,124],"system":[18,69,167],"based":[19,114],"on":[20,134,156,238],"PKI":[21,67,86,128,143,166],"(public":[22],"key":[23,253],"infrastructure)":[24],"was":[25],"developed":[26],"order":[28],"guarantee":[30],"the":[31,66,214,228],"stability":[32],"of":[33,36,43,54,122,154,165,189,198],"client-server":[34],"type":[35],"applications.":[37],"efficiency":[39],"decreases":[40],"when":[41],"some":[42],"user":[44,155],"node":[45],"becomes":[46],"mobile":[47],"terminal,":[48],"making":[49,201],"this":[50,62],"capacity,":[51],"speeds":[53],"have":[57,206],"gone":[58],"degrade.":[60],"In":[61],"paper,":[63],"we":[64],"propose":[65],"security":[68,139,199,226],"authenticate":[71,131],"Semantic":[72],"Web":[73,79],"service":[74,80],"providers":[75],"as":[76,78,217,219],"well":[77,218],"consumers.":[81],"We":[82,148,205,231],"consider":[83],"a":[84,126,190,242],"secure":[85,152],"infrastructure":[87],"that":[88,235],"has":[89,108],"four":[90],"main":[91],"components,":[92],"they":[93],"are":[94,183],"Certification":[95],"Authority,":[96],"Registration":[97],"authority,":[98],"certificate":[99,103,180,191,194],"revocation":[100,175],"list":[101],"validation":[104,195],"authority.":[105],"Each":[106],"component":[107],"specified":[109],"functionalities":[110],"XML":[113],"message":[115],"multi":[117],"purpose":[118],"communication.":[119],"Mobile":[120],"nature":[121],"user's":[123],"requires":[125],"distributed":[127],"server":[129],"requesting":[132],"application":[133],"internet.":[135],"Mobility":[136],"attains":[137],"different":[138],"issues":[140],"for":[145,210,213,227],"remote":[146],"users.":[147],"can":[149],"not":[150,169],"assume":[151],"open":[159],"environment":[160],"till":[161],"all":[162],"basic":[163],"components":[164],"safe":[171],"condition.":[172],"CRL":[173],"(certificate":[174],"list),":[176],"OCSP":[178],"(online":[179],"status":[181,188],"protocol)":[182],"common":[184],"method":[185],"check":[187],"online.":[192],"Digital":[193],"resolves":[196],"problem":[197],"by":[200],"real-time":[202,223],"verification":[203],"possible.":[204],"addressed":[207],"here":[208],"it":[209],"dependability":[211],"aspects":[212],"semantic":[215,229,239],"web":[216,240,250],"data":[220],"quality,":[221],"integrity":[222],"processing":[224],"web.":[230],"need":[232],"ensure":[234],"our":[236],"work":[237],"subject":[243],"unauthorized":[245],"/":[246],"intrusions":[247],"malicious":[249],"applications":[251],"during":[252],"exchange.":[254]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
