RBAC-based access control for privacy preserving in semantic web

  • Authors:
  • Kyu Il Kim;Won Young Kim;Joon Suk Ryu;Hyuk Jin Ko;Ung Mo Kim;Woo Jun Kang

  • Affiliations:
  • SungKyunKwan University, Suwon, KyungGido, Korea;SungKyunKwan University, Suwon, KyungGido, Korea;SungKyunKwan University, Suwon, KyungGido, Korea;SungKyunKwan University, Suwon, KyungGido, Korea;SungKyunKwan University, Suwon, KyungGido, Korea;Korea Christian University, Seoul, Korea

  • Venue:
  • Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Nowadays, remarkable development of information technologies makes information sharing and distributing possible in smooth water than ever. It enables to obtain information anytime and anywhere and provides technologies for superior services based on situation information. Also, it enables machines to grasp the meaning of information under semantic web technologies and new information paradigm. These technologies have been varied by information approach and acquisition method than ever before. However, illegal attacker behind development that uses better tools gives rise to side effects. Current systems can be intruded by a number of different ways of them. Therefore, system safety and privacy protection is being threatened by the invaders. There is access control technology for database system among the security technologies against this menace. Recently, security technique is carrying out researches of situation intelligence, privacy, and XML access etc. in order to correspond with new computing environments. In this paper, we propose extended Role Based Access Control (RBAC) in semantic web. Extended model can dynamically authorizes user's permission under context component. Also, we propose concept-enforcement model based on semantic web. OWL defines the terms used to describe and represent an area of knowledge. Proposed model enable to access semantic execution by suggested model even though it doesn't correspond with security policy.