X-RDR: a role-based delegation processor for web-based information systems
ACM SIGOPS Operating Systems Review
Privacy-preserving semantic interoperation and access control of heterogeneous databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Semantic access control for information interoperation
Proceedings of the eleventh ACM symposium on Access control models and technologies
A semantic-based access control mechanism using semantic technologies
Proceedings of the 2nd international conference on Security of information and networks
A flexible delegation processor for web-based information systems
Computer Standards & Interfaces
Security enhancement of smart phones for enterprises by applying mobile VPN technologies
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part III
DC proposal: knowledge based access control policy specification and enforcement
ISWC'11 Proceedings of the 10th international conference on The semantic web - Volume Part II
Semantic access control model: a formal specification
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Hi-index | 0.00 |
The Semantic Web, also known as the Web of meaning,is considered the new generation of the Web. Its objectiveis to enable computers and people to work in cooperation.A requisite for this is encoding data in forms that make webcontents (meaning, semantics) more understandable by algorithmicmeans. In this paper, we present the applicationof Semantic Web concepts and technologies to the accesscontrol area. The Semantic Access Control Model (SAC)uses different layers of metadata to take advantage of thesemantics of the different components relevant for the accessdecision. We have developed a practical applicationof this access control model based on a specific language,denominated Semantic Policy Language (SPL), for the descriptionof access criteria. This work demonstrates howthe semantic web concepts and its layers infrastructure mayplay an important role in many relevant fields, such as thecase of access control and authorization fields.