Advertisement

Enabling Data Integration Using MIPMap

  • Giorgos Stoilos
  • Despoina Trivela
  • Vasilis Vassalos
  • Tassos Venetis
  • Yannis Xarchakos
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10649)

Abstract

In previous work we have analysed the infrastructure of the Human Brain Project Medical Informatics Platform focusing on the challenges related to dataintegration based on a visual data exchange tool, called MIPMap. In this paper we present new MIPMap features that enhance the integration process and data access.

Notes

Acknowledgment

The research leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 720270 (HBP SGA1).

References

  1. 1.
    Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Massachusetts (1995)MATHGoogle Scholar
  2. 2.
    Ashburner, J., Friston, K.J.: Diffeomorphic registration using geodesic shooting and Gauss-Newton optimisation. NeuroImage 55(3), 954–967 (2011)CrossRefGoogle Scholar
  3. 3.
    Astrova, I., Kalja, A.: Automatic transformation of sql relational databases to owl ontologies. WEBIST 2(2008), 131–136 (2008)Google Scholar
  4. 4.
    Dadjoo, M., Kheirkhah, E.: An approach for transforming of relational databases to owl ontology. arXiv preprint arXiv:1502.05844 (2015)
  5. 5.
    Das, S., Sundara, S., Cyganiak, R.: R2RML: RDB to RDF mapping language (2012)Google Scholar
  6. 6.
    Eleftherios, F.: Extending a data integration tool with ontologies. Thesis report in Master of Science in Information Systems, Athens University of Economics and Business, October 2016Google Scholar
  7. 7.
    Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)CrossRefGoogle Scholar
  8. 8.
    García-Crespo, Á., Gómez-Berbís, J.M., Colomo-Palacios, R., Alor-Hernández, G.: Securontology: a semantic web access control framework. Comput. Stand. Interfaces 33(1), 42–49 (2011)CrossRefGoogle Scholar
  9. 9.
    Jain, A., Farkas, C.: Secure resource description framework: an access control model. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, pp. 121–129. ACM (2006)Google Scholar
  10. 10.
    Li, N., Mitchell, J.C.: Datalog with constraints: a foundation for trust management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, vol. 2562, pp. 58–73. Springer, Heidelberg (2003). doi: 10.1007/3-540-36388-2_6 CrossRefGoogle Scholar
  11. 11.
    Marnette, B., et al.: ++Spicy: an OpenSource Tool for second-generation schema mapping and data exchange. PVLDB 4(12), 1438–1441 (2011)Google Scholar
  12. 12.
    Motik, B., Grau, B.C., Horrocks, I., Wu, Z., Fokoue, A., Lutz, C.: OWL 2 Web Ontology Language Profiles. W3C Recommendation, 27 October 2009Google Scholar
  13. 13.
    Quoc Viet Nguyen, H., Luong, X.H., Miklós, Z., Quan, T.T., Aberer, K.: Collaborative schema matching reconciliation. In: Meersman, R., Panetto, H., Dillon, T., Eder, J., Bellahsene, Z., Ritter, N., De Leenheer, P., Dou, D. (eds.) OTM 2013. LNCS, vol. 8185, pp. 222–240. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-41030-7_14 CrossRefGoogle Scholar
  14. 14.
    Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web. Technical report, Stanford InfoLab (1999)Google Scholar
  15. 15.
    Reddivari, P., Finin, T., Joshi, A.: Policy-based access control for an RDF store. In: Proceedings of the Policy Management for the Web Workshop, vol. 120, pp. 78–83 (2005)Google Scholar
  16. 16.
    Rodríguez-Muro, M., Kontchakov, R., Zakharyaschev, M.: Ontology-based data access: Ontop of databases. In: Alani, H., Kagal, L., Fokoue, A., Groth, P., Biemann, C., Parreira, J.X., Aroyo, L., Noy, N., Welty, C., Janowicz, K. (eds.) ISWC 2013. LNCS, vol. 8218, pp. 558–573. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-41335-3_35 CrossRefGoogle Scholar
  17. 17.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRefGoogle Scholar
  18. 18.
    Shields, B., Molloy, O., Lyons, G., Duggan, J.: Using semantic rules to determine access control for web services. In: Proceedings of the 15th International Conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, 23–26 May 2006, pp. 913–914 (2006)Google Scholar
  19. 19.
    Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: a comparison of KAoS, Rei, and Ponder. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419–437. Springer, Heidelberg (2003). doi: 10.1007/978-3-540-39718-2_27 CrossRefGoogle Scholar
  20. 20.
    Venetis, T., Stoilos, G., Stamou, G.: Query extensions and incremental query rewriting for OWL 2 QL ontologies. J. Data Semant. 3(1), 1–23 (2014)CrossRefGoogle Scholar
  21. 21.
    Venetis, T., Vassalos, V.: Data integration in the human brain project. In: Ashish, N., Ambite, J.-L. (eds.) DILS 2015. LNCS, vol. 9162, pp. 28–36. Springer, Cham (2015). doi: 10.1007/978-3-319-21843-4_3 CrossRefGoogle Scholar
  22. 22.
    Vysniauskas, E., Nemuraite, L.: Transforming ontology representation from owl to relational database. Inform. Technol. Control 35(3) (2015)Google Scholar
  23. 23.
    Zhang, C.J., Chen, L., Jagadish, H.V., Cao, C.C.: Reducing uncertainty of schema matching via crowdsourcing. Proc. VLDB Endowment 6(9), 757–768 (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Giorgos Stoilos
    • 1
  • Despoina Trivela
    • 1
  • Vasilis Vassalos
    • 1
  • Tassos Venetis
    • 1
  • Yannis Xarchakos
    • 1
  1. 1.Department of InformaticsAthens University of Economics and BusinessAthensGreece

Personalised recommendations