Controlling Access to RDF Graphs

  • Giorgos Flouris
  • Irini Fundulaki
  • Maria Michou
  • Grigoris Antoniou
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6369)


One of the current barriers towards realizing the huge potential of Future Internet is the protection of sensitive information, i.e., the ability to selectively expose (or hide) information to (from) users depending on their access privileges. Given that RDF has established itself as the de facto standard for data representation over the Web, our work focuses on controlling access to RDF data. We present a high-level access control specification language that allows fine-grained specification of access control permissions (at triple level) and formally define its semantics. We adopt an annotation-based enforcement model, where a user can explicitly associate data items with annotations specifying whether the item is accessible or not. In addition, we discuss the implementation of our framework, propose a set of dimensions that should be considered when defining a benchmark to evaluate the different access control enforcement models and present the results of our experiments conducted on different Semantic Web platforms.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Friend of a friend,
  2. 2.
    Jena A Semantic Web Framework for Java,
  3. 3.
  4. 4.
    Sesame: RDF Schema Querying and Storage,
  5. 5.
  6. 6.
    Abel, F., De Coi, J.L., Henze, N., Wolf Koesling, A., Krause, D., Olmedilla, D.: Enabling Advanced and Context-Dependent Access Control in RDF Stores. In: ISWC/ASWC (2007)Google Scholar
  7. 7.
    Brickley, D., Guha, R.V.: RDF Vocabulary Description Language 1.0: RDF Schema (2004),
  8. 8.
    Broekstra, J., Kampman, A.: SeRQL: A Second Generation RDF Query Language. In: Workshop on Semantic Web Storage and Retrieval (2003)Google Scholar
  9. 9.
    Broekstra, J., Kampman, A., van Harmelen, F.: Sesame: A Generic Architecture for Storing and Querying RDF and RDF Schema. In: Horrocks, I., Hendler, J. (eds.) ISWC 2002. LNCS, vol. 2342, p. 54. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  10. 10.
    Carroll, J.J., Bizer, C., Hayes, P.J., Stickler, P.: Named Graphs. J. Web Semantics 3(4) (2005)Google Scholar
  11. 11.
    Dietzold, S., Auer, S.: Access Control on RDF Triple Store from a Semantic Wiki Perspective. In: ESWC Workshop on Scripting for the Semantic Web (2006)Google Scholar
  12. 12.
    Queiroz Dividino, R., Sizov, S., Staab, S., Schueler, B.: Querying for Provenance, Trust, Uncertainty and Other Meta Knowledge in RDF. Journal of Web Semantics 7(3) (2009)Google Scholar
  13. 13.
    Knechtel, M., Baader, F., Penaloza, R.: A Generic Approach for Large-Scale Ontological Reasoning in the Presence of Access Restrictions to the Ontology’s Axioms. In: Bernstein, A., Karger, D.R., Heath, T., Feigenbaum, L., Maynard, D., Motta, E., Thirunarayan, K. (eds.) ISWC 2009. LNCS, vol. 5823, pp. 49–64. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  14. 14.
    McBride, B., Manola, F., Miller, E.: RDF Primer (February 2004),
  15. 15.
    Flouris, G., Fundulaki, I., Pediaditis, P., Theoharis, Y., Christophides, V.: Coloring RDF Triples to Capture Provenance. In: Bernstein, A., Karger, D.R., Heath, T., Feigenbaum, L., Maynard, D., Motta, E., Thirunarayan, K. (eds.) ISWC 2009. LNCS, vol. 5823, pp. 196–212. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  16. 16.
    Fundulaki, I., Marx, M.: Specifying access control policies for XML documents with XPath. In: SACMAT (2004)Google Scholar
  17. 17.
    Jain, A., Farkas, C.: Secure Resource Description Framework. In: SACMAT (2006)Google Scholar
  18. 18.
    Kim, J., Jung, K., Park, S.: An Introduction to Authorization Conflict Problem in RDF Access Control. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008, Part II. LNCS (LNAI), vol. 5178, pp. 583–592. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  19. 19.
    Perez, J., Arenas, M., Gutierrez, C.: Semantics and Complexity of SPARQL. In: Cruz, I., Decker, S., Allemang, D., Preist, C., Schwabe, D., Mika, P., Uschold, M., Aroyo, L.M. (eds.) ISWC 2006. LNCS, vol. 4273, pp. 30–43. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  20. 20.
    Prud’hommeaux, E., Seaborne, A.: SPARQL Query Language for RDF (January 2008),
  21. 21.
  22. 22.
  23. 23.
    Reddivari, P., Finin, T., Joshi, A.: Policy-Based Access Control for an RDF Store. In: Semantic Web for Collaborative Knowledge Acquisition (2007)Google Scholar
  24. 24.
    Schmidt, M., Hornung, T., Lausen, G., Pinkel, C.: SP2Bench: A SPARQL Performance Benchmark. Technical report, arXiv:0806.4627v1 cs.DB (2008)Google Scholar
  25. 25.
    Seaborne, A., Manjunath, G.: SPARQL/Update: A language for updating RDF graphs. Technical report, Hewlett-Packard (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Giorgos Flouris
    • 1
  • Irini Fundulaki
    • 1
  • Maria Michou
    • 1
  • Grigoris Antoniou
    • 1
    • 2
  1. 1.Institute of Computer Science, FORTHGreece
  2. 2.Computer Science DepartmentUniversity of CreteGreece

Personalised recommendations