A translation approach to portable ontology specifications
Knowledge Acquisition - Special issue: Current issues in knowledge modeling
Role-Based Access Control Models
Computer
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Security models for web-based applications
Communications of the ACM
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
OIL: An Ontology Infrastructure for the Semantic Web
IEEE Intelligent Systems
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
A Policy Language for a Pervasive Computing Environment
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Access-Control Language for Multidomain Environments
IEEE Internet Computing
Driving and Monitoring Provisional Trust Negotiation with Metapolicies
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
Secure Interoperation in a Multidomain Environment Employing RBAC Policies
IEEE Transactions on Knowledge and Data Engineering
Using Semantic Web Technologies to Specify Constraints of RBAC
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
IEEE Intelligent Systems
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
Visual modeling and formal specification of constraints of RBAC using semantic web technology
Knowledge-Based Systems
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
Model based development of access policies
International Journal on Software Tools for Technology Transfer (STTT)
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
Knowledge sharing in virtual enterprises via an ontology-based access control approach
Computers in Industry
A Systematic Review and Comparison of Security Ontologies
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
Analyzing and Managing Role-Based Access Control Policies
IEEE Transactions on Knowledge and Data Engineering
A framework for privacy in social communities
International Journal of Web Based Communities
Security in the Semantic Web using OWL
Information Security Tech. Report
Semantic web policies – a discussion of requirements and research issues
ESWC'06 Proceedings of the 3rd European conference on The Semantic Web: research and applications
Ontology-Based RBAC specification for interoperation in distributed environment
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Rule-Based access control for social networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Rule-based policy representation and reasoning for the semantic web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
Basis for an integrated security ontology according to a systematic review of existing proposals
Computer Standards & Interfaces
Hi-index | 0.00 |
Security and privacy are key concerns on the Internet. Policies representing resource access based on knowledge-oriented descriptions have gained momentum with the emergence of semantic technologies. Traditional access control frameworks were syntactic and error prone, lacking the necessary expressivity and efficiency of a solution where soundness and completeness of the underlying logics in access control descriptions could be critical to harness their potential. In this paper, SecurOntology is presented. SecurOntology encompasses a three-fold strategy: an ontology for access control, a logical declarative framework and a software architecture as a proof-of-concept of the advantages of this solution.