Role-Based Access Control Models
Computer
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
On specifying security policies for web documents with an XML-based language
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
An authorization model for temporal and derived data: securing information portals
ACM Transactions on Information and System Security (TISSEC)
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Consensus Ontologies: Reconciling the Semantics of Web Pages and Agents
IEEE Internet Computing
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
An infrastructure for managing secure update operations on XML data
Proceedings of the eighth ACM symposium on Access control models and technologies
XML access control using static analysis
Proceedings of the 10th ACM conference on Computer and communications security
Policy-based dissemination of partial web-ontologies
Proceedings of the 2005 workshop on Secure web services
Privacy-preserving semantic interoperation and access control of heterogeneous databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Secure resource description framework: an access control model
Proceedings of the eleventh ACM symposium on Access control models and technologies
Semantic access control for information interoperation
Proceedings of the eleventh ACM symposium on Access control models and technologies
Using semantic rules to determine access control for web services
Proceedings of the 15th international conference on World Wide Web
Ubiquitous computing environments and its usage access control
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Improving the security of a networking semantic service oriented architecture
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
Access control management for ubiquitous computing
Future Generation Computer Systems
Query Rewriting for Access Control on Semantic Web
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
An Introduction to Authorization Conflict Problem in RDF Access Control
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
Evaluating the validity of data instances against ontology evolution over the Semantic Web
Information and Software Technology
Semantics-aware security policy specification for the semantic web data
International Journal of Information and Computer Security
XML secure views using semantic access control
Proceedings of the 2010 EDBT/ICDT Workshops
Security issues for the use of semantic web in e-commerce
BIS'07 Proceedings of the 10th international conference on Business information systems
WISE'07 Proceedings of the 2007 international conference on Web information systems engineering
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Access control policies for semantic networks
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Temporal authorizations scheme for XML document
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
DC proposal: knowledge based access control policy specification and enforcement
ISWC'11 Proceedings of the 10th international conference on The semantic web - Volume Part II
Towards secure XML document with usage control
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
Specifying an access control model for ontologies for the semantic web
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
RBAC-based access control for privacy preserving in semantic web
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
A semantic context-aware access control in pervasive environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Secure and efficient information sharing in multi-university E-Learning environments
ICWL'07 Proceedings of the 6th international conference on Advances in web based learning
Protecting disseminative information in E-Learning
ICWL'07 Proceedings of the 6th international conference on Advances in web based learning
Ontology based hybrid access control for automatic interoperation
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Access Control on Semantic Web Data Using Query Rewriting
International Journal of Organizational and Collective Intelligence
A semantic authorization model for pervasive healthcare
Journal of Network and Computer Applications
Hi-index | 0.00 |
Recently, the notion of the Semantic Web has been introduced to define a machine-interpretable web targeted for automation, integration and reuse of data across different applications. Under the Semantic Web, web pages are annotated by concepts that are formally defined in ontologies along with the relationships among them. As information pertaining to different concepts has varying access control requirements, in this paper, we propose an access control model for the semantic web that is capable of specifying authorizations over concepts defined in ontologies and enoforcing them upon data instances annotated by the concepts. It is important to note that semantic relationships among concepts play a key role in making access control decisions. This is because, based on the relationship, one may infer information contained in one concept node from that of the other. Therefore, we first identify the important domain-independent relationships among concepts, categorize them and propose propagation policies based on these categories of relationships. In particular, we allow propagation of authorizations based on the semantic relationships among concepts to prevent illegal inferences. We then show how concept-level security polices can be represented in an OWL-based access control language. Finally, we demonstrate how users' requests can be handled under our access control model. Our concept-level model is especially suitable for the specification and administration of access control over semantically related web data under the Semantic Web even if they conform to different DTDs or use different tag names.