Role-Based Access Control Models
Computer
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A scenario-driven role engineering process for functional RBAC roles
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Access Control and Trust in the Use of Widely Distributed Services
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
DAML-S: Web Service Description for the Semantic Web
ISWC '02 Proceedings of the First International Semantic Web Conference on The Semantic Web
Task-role-based access control model
Information Systems
First experiences using XACML for access control in distributed systems
Proceedings of the 2003 ACM workshop on XML security
Java Reflection in Action (In Action series)
Java Reflection in Action (In Action series)
Computer Security 2e
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Semantic access control for information interoperation
Proceedings of the eleventh ACM symposium on Access control models and technologies
Privacy Preserving Trust Authorization Framework Using XACML
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Role-based access control for data service integration
Proceedings of the 3rd ACM workshop on Secure web services
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Building Trustworthy Semantic Webs
Building Trustworthy Semantic Webs
Overriding of Access Control in XACML
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
XACML Policy Integration Algorithms
ACM Transactions on Information and System Security (TISSEC)
A Critique of the ANSI Standard on Role-Based Access Control
IEEE Security and Privacy
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control"
IEEE Security and Privacy
Query Rewriting for Access Control on Semantic Web
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
An Introduction to Authorization Conflict Problem in RDF Access Control
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
Soa security
Enabling advanced and context-dependent access control in RDF stores
ISWC'07/ASWC'07 Proceedings of the 6th international The semantic web and 2nd Asian conference on Asian semantic web conference
Aletheia--Improving Industrial Service Lifecycle Management by Semantic Data Federations
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Controlling access to RDF graphs
FIS'10 Proceedings of the Third future internet conference on Future internet
Role-based modelling of interactions in database applications
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Hi-index | 0.00 |
Information integration across company borders becomes increasingly important for the success of product lifecycle management in industry and complex supply chains. Semantic technologies are about to play a crucial role in this integrative process. However, cross-company data exchange requires mechanisms to enable fine-grained access control definition and enforcement, preventing unauthorized leakage of confidential data across company borders. Currently available semantic repositories are not sufficiently equipped to satisfy this important requirement. This paper presents an infrastructure for controlled sharing of semantic data between cooperating business partners. First, we motivate the need for access control in semantic data federations by a case study in the industrial service sector. Furthermore, we present an architecture for controlling access to semantic repositories that is based on our newly developed SemForce security service. Finally, we show the practical feasibility of this architecture by an implementation and several performance experiments.