Cite

Chiș-Rațiu, A., & Buchmann, R.A. (2018). Design and Implementation of a Diagrammatic Tool for Creating RDF graphs. PrOse@PoE, available at: https://www.semanticscholar.org/paper/Design-and-Implementation-of-a-Diagrammatic-Tool-Chis-Ratiu-Buchmann/2d820b6cae16f3b68280a9af27d6fceaf735e7fe, accessed on 20 February 2023. Search in Google Scholar

Clark, R.K., Greenberg I.B., Boucher P.K., Lund T.F., Neumann P.G., Wells D.M., & Jenson E.D. (2003). Effects of Multilevel Security on Real-Time Applications. Proceedings of 9th Annual Computer Security Applications, Orlando. Search in Google Scholar

Franck, M., Montagnat, J., & Zucker. C.F. (2013). A survey of RDB to RDF translation approaches and tools. Available at: https://hal.science/file/index/docid/903568/filename/Michel_Montagnat_Faron_2013__A_survey_of_RDB_to_RDF_translation_approaches_and_tools.pdf, accessed 20 February 2023. Search in Google Scholar

Mileo, A. et al. (2012). Protect your RDF data! Conference: Joint International Conference on Semantic Technology. Search in Google Scholar

Pădure, S. (2023). Corporative Database Security. Available at: https://security.ase.md/publ/ro/pubro34/16.pdf, accessed on 23 March 2023. Search in Google Scholar

Shiraishi, N. (2003). The Security of the Semantic Web - Secrecy, Trust and Rationality. Available at: https://www.w3.org/People/n-shiraishi/work/Security-of-RDF.html accessed on 22 April 2023. Search in Google Scholar

World Wide Web Consortium (W3C). (2023). Availale at: https://www.w3.org, accessed on 20 February 2023. Search in Google Scholar

Zalhan, P., Silaghi, G., & Buchmann, R.A. (2019). Marrying Big Data with Smart Data in Sensor Stream Processing. 28th International Conference On Information Systems Development, Toulon, France, available at: https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1299&context=isd2014 Search in Google Scholar

www.microsoft.com Search in Google Scholar

www.microsoft.com/ro-ro/trust-center?ms.offieurl=trustcenter&rtc=1 Search in Google Scholar