Temporal logic (vol. 1): mathematical foundations and computational aspects
Temporal logic (vol. 1): mathematical foundations and computational aspects
Role-Based Access Control Models
Computer
Developing time-oriented database applications in SQL
Developing time-oriented database applications in SQL
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Temporal hierarchies and inheritance semantics for GTRBAC
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Time Granularities in Databases, Data Mining and Temporal Reasoning
Time Granularities in Databases, Data Mining and Temporal Reasoning
Role-based Security for Configurable Distributed Control Systems
WORDS '01 Proceedings of the Sixth International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS'01)
Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce
Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce
Role-Based Access Control
Ontological Engineering
A Semantic Web Primer
Properties of Role-Based Access Control in a Teaching Management System
IEICE - Transactions on Information and Systems
Hi-index | 0.00 |
This paper presents a description of an access control list (ACL) used to conduct role-based access control (RBAC), with particular emphasis on temporal constraints using extensible markup language (XML) and Web ontology language (OWL). It is natural to use OWL for describing ACL because OWL is based on set theory. Set theory is useful in this case because RBAC maps privileges naturally to users from the viewpoint of users' functions. Comparison of XML and OWL in terms of their use as an ACL is described. A teaching management model is used to illustrate examples of these implementations.