{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T01:34:19Z","timestamp":1648517659021},"reference-count":17,"publisher":"International Academy Publishing (IAP)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.9.5.1217-1222","type":"journal-article","created":{"date-parts":[[2014,5,13]],"date-time":"2014-05-13T02:38:58Z","timestamp":1399948738000},"source":"Crossref","is-referenced-by-count":1,"title":["The Application of SWRL Based Ontology Inference for Privacy Protection"],"prefix":"10.17706","volume":"9","author":[{"given":"Qiang","family":"Ge","sequence":"first","affiliation":[]},{"given":"Guohua","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Zhiqiu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Changbo","family":"Ke","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2014,5,1]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSECP.2003.1253567","article-title":"Privacy on the Web: Facts, challenges, and solutions","volume":"1","author":"Bouguettaya","year":"2003","unstructured":"[1] Bouguettaya ARA, Eltoweissy MY, \"Privacy on the Web: Facts, challenges, and solutions\", Security &Privacy, Vol. 1, pp. 40-49, 2003.","journal-title":"Security &Privacy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293455"},{"key":"ref3","volume-title":"\"SWRL based semantic relevant discovery and its application on ontology mapping and integration\" DSc","author":"Wenying","year":"2006","unstructured":"[4] Wenying GUO, \"SWRL based semantic relevant discovery and its application on ontology mapping and integration\", DSc, Zhejiang University, Zhejiang, China, 2006."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.01.010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.7.1.176-185"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1006\/knac.1993.1008"},{"key":"ref7","volume-title":"Formal Ontology and Information Systems","author":"Guarino","year":"1998","unstructured":"[9] Guarino N, Formal Ontology and Information Systems, IOS Press, 1998."},{"key":"ref8","volume-title":"Ontology development 101","author":"Noy","year":"2001","unstructured":"[10] Noy NF, McGuinness DL, Ontology development 101: A guide to creating your first ontology, Stanford University, 2001."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2009.5410467"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.55"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.71"},{"key":"ref12","first-page":"218","article-title":"Privacy Aware Engineering: A Case Study","volume":"4","author":"Ye","year":"2009","unstructured":"[14] Ye X, Zhu Z, Peng Y, Xie F, \"Privacy Aware Engineering: A Case Study\", Journal of Software, Vol. 4, pp. 218-225, 2009.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref13","first-page":"335","article-title":"Security for daml web services: Annotation and matchmaking","volume-title":"Second International Semantic Web Conference","author":"Denker","year":"2003","unstructured":"[16] Denker G, Kagal L, Finin T, Paolucci M, Sycara K, \"Security for daml web services: Annotation and matchmaking\", Second International Semantic Web Conference, pp. 335-350, 2003."},{"key":"ref14","first-page":"229","article-title":"The prot\u00e9g\u00e9 OWL Plugin: An Open Development Environment for Semantic Web applications","volume-title":"Third International Semantic Web Conference","author":"Knublauch","year":"2004","unstructured":"[18] Knublauch H, Fergerson RW, Noy NF, Musen MA, \"The prot\u00e9g\u00e9 OWL Plugin: An Open Development Environment for Semantic Web applications\", Third International Semantic Web Conference, pp. 229-243, 2004."},{"key":"ref15","article-title":"Jess","volume-title":"Action","author":"Friedman","year":"2003","unstructured":"[19] Friedman E, Jess In Action: Rule-Based Systems in Java, Manning Publications Co., 2003."},{"issue":"8","key":"ref16","first-page":"27","article-title":"Reasoning with semantic web technologies in ubiquitous computing environment.","volume":"3","author":"Guo","year":"2008","unstructured":"[20] Guo W Y. Reasoning with semantic web technologies in ubiquitous computing environment. Journal of Software, 2008, 3(8): 27-33.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"issue":"8","key":"ref17","first-page":"1","article-title":"Forward of Special Issue on \"Mobile System, Agent Technology, and Web Services\".","volume":"3","author":"Hung","year":"2008","unstructured":"[21] Hung J C. Forward of Special Issue on \"Mobile System, Agent Technology, and Web Services\". Journal of Software, 2008, 3(8): 1-2.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T11:32:51Z","timestamp":1565436771000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/11117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,1]]},"references-count":17,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2014,5,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.9.5.1217-1222","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,5,1]]}}}