Rationale for the RBAC96 family of access control models
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Conflict analysis for management policies
Proceedings of the fifth IFIP/IEEE international symposium on Integrated network management V : integrated management in a virtual world: integrated management in a virtual world
Conflicts in Policy-Based Distributed Systems Management
IEEE Transactions on Software Engineering
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Design and implementation of a flexible RBAC-service in an object-oriented scripting language
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A Model for Static Conflict Analysis of Management Policies
BT Technology Journal
An Information-Theoretic Definition of Similarity
ICML '98 Proceedings of the Fifteenth International Conference on Machine Learning
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Approximating Most Specific Concepts in Description Logics with Existential Restrictions
KI '01 Proceedings of the Joint German/Austrian Conference on AI: Advances in Artificial Intelligence
The description logic handbook: theory, implementation, and applications
The description logic handbook: theory, implementation, and applications
Verbs semantics and lexical selection
ACL '94 Proceedings of the 32nd annual meeting on Association for Computational Linguistics
Using information content to evaluate semantic similarity in a taxonomy
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
A tableaux decision procedure for SHOIQ
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
Offline expansion of XACML policies based on p3p metadata
ICWE'05 Proceedings of the 5th international conference on Web Engineering
Business rules for semantics-aware business modelling: overview and open issues
International Journal of Web Engineering and Technology
Journal of Network and Computer Applications
Extending context descriptions in semantics-aware access control
ICISS'06 Proceedings of the Second international conference on Information Systems Security
A graph-based formalism for controlling access to a digital library ontology
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Hi-index | 0.00 |
Security is a crucial concern for commercial and mission critical applications in Web-based environments. Semantic Web-style context descriptions aim at supporting widespread distribution of resources and cooperation of autonomous agents on the Web in a secure way. In this paper, context information associated with Access Control (AC) management policies is defined according to basic operators that can be represented using the Web Ontology Language (OWL). The same primitives are used, in the specification of authorizations, to compose domain scope expressions. Standard inference procedures of Description Logics (DL) can then be used to check the consistency of context information referred to by policy conditions and, moreinterestingly, to pre-process context information for grounding policy propagation and enabling conflict resolution. This work aims at extending the notion of modality conflict in the evaluation of AC policies to take into account semantic Web-style, ontology-based definitions of the entities involved.