A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Role-Based Access Control Models
Computer
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Modeling users in role-based access control
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Design and implementation of an access control processor for XML documents
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
On specifying security policies for web documents with an XML-based language
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Spinning the Semantic Web: Bringing the World Wide Web to Its Full Potential
Spinning the Semantic Web: Bringing the World Wide Web to Its Full Potential
An Authorization Model for a Distributed Hypertext System
IEEE Transactions on Knowledge and Data Engineering
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
Agents, trust, and information access on the semantic web
ACM SIGMOD Record
Concept-level access control for the Semantic Web
Proceedings of the 2003 ACM workshop on XML security
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
Ontology guided XML security engine
Journal of Intelligent Information Systems - Special issue: Database and applications security
Hi-index | 0.00 |
Security and privacy are important components of the Semantic Web; the need for research in this area is widely recognized. In this paper we propose a model that regulates access control on ontologies developed for the Semantic Web. Based on the Role Graph Model, our work models the ontology resources as directed, acyclic graphs, incorporating the basic features of the OWL Lite language. We also show how the privileges are propagated and how we can use constraints to deny access to resources in the Semantic Web, an environment where information can be easily accessed through logic inferences.