A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Concept-level access control for the Semantic Web
Proceedings of the 2003 ACM workshop on XML security
Policy-based dissemination of partial web-ontologies
Proceedings of the 2005 workshop on Secure web services
Secure resource description framework: an access control model
Proceedings of the eleventh ACM symposium on Access control models and technologies
Controlling access to RDF graphs
FIS'10 Proceedings of the Third future internet conference on Future internet
Use of metadata for access control and version management in RDF database
KES'11 Proceedings of the 15th international conference on Knowledge-based and intelligent information and engineering systems - Volume Part I
OAuth+UAO: a distributed identification mechanism for triplestores
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
Access control for RDF graphs using abstract models
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
Hi-index | 0.00 |
In this paper, related with RDF security, we introduce an RDF triple based access control model considering explicit and implicit authorization propagation. Since RDF Schema represents ontology hierarchy of upper and lower classes or properties, our access control model supports the explicit authorization propagation where an authorization specified against an upper concept is propagated to lower concepts by inheritance. In addition, we consider the implicit authorization propagation where an authorization specified against an lower concept is propagated to upper concepts by RDF inference. RDF Semantics, which is recommended by W3C, guides some primary RDF inference rules related with subClassOf and subPropertyOf where lower concepts are interpreted into upper concepts. Based on these two contrary propagations, we introduce an authorization conflict problem in RDF access control.