Mandatory security in object-oriented database systems
OOPSLA '89 Conference proceedings on Object-oriented programming systems, languages and applications
Role-Based Access Control Models
Computer
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Design of LDV: A Multilevel Secure Relational Database Management
IEEE Transactions on Knowledge and Data Engineering
Information Flow Control in Object-Oriented Systems
IEEE Transactions on Knowledge and Data Engineering
Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures
IEEE Transactions on Knowledge and Data Engineering
Enhancing the Controlled Disclosure of Sensitive Information
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Concept-level access control for the Semantic Web
Proceedings of the 2003 ACM workshop on XML security
Policy-based dissemination of partial web-ontologies
Proceedings of the 2005 workshop on Secure web services
Query Rewriting for Access Control on Semantic Web
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
A Secure Mediator for Integrating Multiple Level Access Control Policies
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
An Introduction to Authorization Conflict Problem in RDF Access Control
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
Semantics-aware security policy specification for the semantic web data
International Journal of Information and Computer Security
An inference control algorithm for RDF(S) repository
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Enabling advanced and context-dependent access control in RDF stores
ISWC'07/ASWC'07 Proceedings of the 6th international The semantic web and 2nd Asian conference on Asian semantic web conference
Access control in personal localized semantic information spaces
ruSMART/NEW2AN'10 Proceedings of the Third conference on Smart Spaces and next generation wired, and 10th international conference on Wireless networking
Controlling access to RDF graphs
FIS'10 Proceedings of the Third future internet conference on Future internet
NEW2AN'11/ruSMART'11 Proceedings of the 11th international conference and 4th international conference on Smart spaces and next generation wired/wireless networking
Use of metadata for access control and version management in RDF database
KES'11 Proceedings of the 15th international conference on Knowledge-based and intelligent information and engineering systems - Volume Part I
OAuth+UAO: a distributed identification mechanism for triplestores
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
Context-dependent views to axioms and consequences of Semantic Web ontologies
Web Semantics: Science, Services and Agents on the World Wide Web
Access control for RDF graphs using abstract models
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Cloud-Centric assured information sharing
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Access Control on Semantic Web Data Using Query Rewriting
International Journal of Organizational and Collective Intelligence
Secure federation of semantic information services
Decision Support Systems
Semantic Web - Linked Data for science and education
Hi-index | 0.00 |
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing eXtensible Markup Language (XML) documents, do not provide sufficient protection for RDF data. Our security model incorporates RDF and RDF Schema (RDFS) entailments. RDF protection objects are represented as RDF-patterns that are mapped to RDF and RDFS statements to determine their security requirements. We develop methods to assign security classification to entailed statements and to detect unauthorized inferences. We propose a two-level conflict resolution strategy. Simple conflict resolution addresses the problem when more than one pattern can be mapped to the same RDF statement, resulting in conflicting classification. Inference conflict resolution addresses inconsistencies that occur due to entailment.