Abstract
The explosion of digital content and the heterogeneity of enterprise content sources have resulted in a pressing need for advanced tools and technologies, to support enterprise content search and analysis. Semantic technology and linked data may be the long term solution to this growing problem. Our research explores the application of access control to a knowledge discovery platform. In order to ensure integrated information is only accessible to authorised individuals, existing access control policies need to be associated with the data. Through in-depth analysis we aim to propose an access control model and enforcement framework which can be used to represent and enforce various access models both inside and outside the enterprise. Furthermore, through experimentation we plan to develop a methodology which can be used as a guideline for the lifting of distributed access control policies from the individual data sources to a linked data network.
Chapter PDF
Similar content being viewed by others
References
Javanmardi, S., Amini, M., Jalili, R., GanjiSaffar, Y.: SBAC: A Semantic Based Access Control Model. In: 11th Nordic Workshop on Secure IT-systems (NordSec 2006), Linkping, Sweden (2006)
Ryutov, T., Kichkaylo, T., Neches, R.: Access Control Policies for Semantic Networks. In: 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 150–157. IEEE (July 2009)
Amini, M., Jalili, R.: Multi-level authorisation model and framework for distributed semantic-aware environments. IET Information Security 4(4), 301 (2010)
Qin, L., Atluri, V.: Concept-level access control for the Semantic Web. In: Proceedings of the 2003 ACM Workshop on XML Security - XMLSEC 2003, Number Cimic, p. 94. ACM Press (2003)
Bonatti, P.A., De Coi, J.L., Olmedilla, D., Sauro, L.: Rule-Based Policy Representations and Reasoning. In: Bry, F., Małuszyński, J. (eds.) Semantic Techniques for the Web. LNCS, vol. 5500, pp. 201–232. Springer, Heidelberg (2009)
Peffers, K., Tuunanen, T., Rothenberger, M.: A design science research methodology for information systems research. Management Information Systems 24, 45–77 (2007)
Checkland, P., Holwell, S.: Action Research: Its Nature and Validity. Systemic Practice and Action Research 11(1), 9–21 (1998)
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control: a multi-dimensional view. In: Tenth Annual Computer Security Applications Conference, pp. 54–62 (1994)
Thomas, R., Sandhu, R.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. Database Security, 166–181 (1998)
McCollum, C., Messing, J., Notargiacomo, L.: Beyond the pale of MAC and DAC-defining new forms of access control. In: Proceedings of 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 1990, pp. 190–200. IEEE (1990)
Yague, M., Maña, A., López, J., Troya, J.: Applying the semantic web layers to access control. In: Proceedings of 14th International Workshop on Database and Expert Systems Applications, 2003, pp. 622–626. IEEE (2003)
Bradshaw, J., Dutfield, S., Benoit, P., Woolley, J.: KAoS: Toward an industrial-strength open agent architecture. In: Software Agents, pp. 375–418 (1997)
Kagal, L., Finin, T.: A policy language for a pervasive computing environment. In: Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 63–74. IEEE Comput. Soc. (2003)
Kolovski, V., Hendler, J., Parsia, B.: Analyzing web access control policies. In: Proceedings of the 16th International Conference on World Wide Web WWW 2007, p. 677 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kirrane, S. (2011). DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement. In: Aroyo, L., et al. The Semantic Web – ISWC 2011. ISWC 2011. Lecture Notes in Computer Science, vol 7032. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25093-4_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-25093-4_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25092-7
Online ISBN: 978-3-642-25093-4
eBook Packages: Computer ScienceComputer Science (R0)