A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Role and Attribute Based Access Control System Using Semantic Web Technologies
[chapter]
On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attributes. ...
A Description Logic (DL) reasoner is used to classify both users and resources, and verify the consistency of the access control policies. ...
Introduction In this paper, we present an access control system for context-aware environments designed and built using Semantic Web technologies. ...
doi:10.1007/978-3-540-76890-6_53
dblp:conf/otm/CirioCT07
fatcat:c2akv5ziyzalnien46gm7jiscq
Access control management for e-Healthcare in cloud environment
2014
EAI Endorsed Transactions on Scalable Information Systems
We have enriched the research for semantic web technology with role-based access control that is able to be applied in the field of medical information system or e-Healthcare system. ...
This paper addresses existing access control methods and presents a semantic based access control model which considers semantic relations among different entities in cloud computing environment. ...
Here, semantic web technologies could play a greater important role as we will present in this paper. Semantic web technologies are based knowledge bases. ...
doi:10.4108/sis.1.2.e3
fatcat:jkhmx6no4bh4ve4wqbdegiwfwm
Semantic Security for E-Health: A Case Study in Enhanced Access Control
2015
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)
We show how approaches based upon ontology-based policy specification overcome many of the current security challenges facing the development of such systems and enhance access control by leveraging existing ...
In this paper we argue that semantic technologies have unique benefits for specification and enforcement of security policies that cross organisation boundaries. ...
The INPDR is supported by a grant from the European Union Directorate General for Health and Consumers (DG-SANCO) and a range of clinical partner organizations. ...
doi:10.1109/uic-atc-scalcom-cbdcom-iop.2015.90
dblp:conf/uic/LuS15
fatcat:krvsyldu7fdwjener5iaibiq2i
Building a Distributed Semantic-aware Security Architecture
[chapter]
2007
IFIP International Federation for Information Processing
Focusing on an attributebased access control approach, we present an access control model that facilitates semantic attribute matching and ontology mapping. ...
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. ...
We would like to thank our project partners for helpful comments and stimulating discussions. ...
doi:10.1007/978-0-387-72367-9_34
fatcat:qw6fdux76fh2pbiiziw5vlvkiu
A semantic access control model for grid services
2005
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005.
The new access control model will exploit semantic web technologv, and use machine reasoning about the messages and policies at a semantic level. ...
In order to protect each compaq's sensitive data and services, access control is therefore necessary and important, In this paper, we present a new approach to authorize and udminisrrate access requests ...
with semantic web technology. ...
doi:10.1109/cscwd.2005.194196
dblp:conf/cscwd/LuoWS05
fatcat:xj6te73ur5ht3fbrsbiafr66oa
Delegated Authorization Framework for EHR Services using Attribute Based Encryption
2019
IEEE Transactions on Services Computing
We present a novel, centralized, attribute-based authorization mechanism that uses Attribute Based Encryption (ABE) and allows for delegated secure access of patient records. ...
Hence there is a need to develop a proper authorization delegation mechanism for safe, secure and easy to use cloud-based EHR Service management. ...
ACKNOWLEDGMENTS This work was conducted using the Protege resource, which is supported by grant GM10331601 from the National Institute of General Medical Sciences of the United States National Institutes ...
doi:10.1109/tsc.2019.2917438
fatcat:ddn7lo6wjfhspf5dmunwloorga
Attribute - Semantic Based Access Control Policy Model for IoT
2019
International Journal of Engineering and Advanced Technology
To solve these issues, this work design a model which calculate final trust value based on semantic information dynamically referring to ontology. a access control policy is also designed on semantic role ...
The semantic technology is used for high level reasoning of the context situation ...
PROPOSED ATTRIBUTE -SEMANTIC ROLE BASED CONTROL The access control mechanism is to control any subject accessing the object, so that resource use is restricted from illegal use and managed effectively. ...
doi:10.35940/ijeat.a1124.1291s419
fatcat:mhnfoqxk7jefvadcyiycuu3wjq
Semantic security: specification and enforcement of semantic policies for security-driven collaborations
2009
Studies in Health Technology and Informatics
In this paper we present results of the JISC funded Advanced Grid Authorisation through Semantic Technologies (AGAST) project (www.nesc.ac.uk/hub/projects/agast) and show how semantic-based approaches ...
Supporting finer-grained access control is often essential for domains where the specification and subsequent enforcement of authorization policies is needed. ...
Semantic Web and Semantic-based Security The semantic web is an intended successor to the current web. ...
pmid:19593058
fatcat:ol7qblybyjdepphdlmvo5rtasm
Secure knowledge management: confidentiality, trust, and privacy
2006
IEEE transactions on systems, man and cybernetics. Part A. Systems and humans
Index Terms-Data mining, privacy, role-based access control (RBAC), secure knowledge management, security policy, semantic web, trust negotiation (TN), usage control (UCON). ...
In particular, certain access-control techniques will be investigated, and trust management as well as privacy control for knowledge management will be explored. ...
His seminal paper on role-based access control (RBAC) introduced the RBAC96 model, which evolved into the 2004 National Institute of Standards and Technology/American National Standards Institute (NIST ...
doi:10.1109/tsmca.2006.871796
fatcat:pnqtkbbuazaipeqlo3iz4isdri
Access Control as a Service for Information Protection in Semantic Web based Smart Environment
2016
Journal of Internet Computing and services
To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML ...
In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML. ...
The architecture of XACML mechanism is flexible to incorporate access control solutions from Attribute Based Access Control (ABAC), Role Based Access Control (RBAC) or Policy Based Access Control (PBAC ...
doi:10.7472/jksii.2016.17.5.09
fatcat:6tww6xnrejaidiopeuugpfcwyi
Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment
2017
International Journal of Applied Information Systems
Providers to cloud computing including Amazon, Google, Microsoft, Rachspace and Terremark have all contributed at a high end for this bulk storage technology. ...
To deal with the security issues in cloud computing this paper discusses some concepts like ontology, web semantics, and message passing within or between cloud components. ...
We use Semantic Web technologies to represent our policies and to reason over contextual attributes and user role attributes to determine outcomes of access control requests. ...
doi:10.5120/ijais2017451648
fatcat:3pmjj6c4cbg57fd4mxx3v26uf4
A metadata‐based access control model for web services
2005
Internet Research
Purpose -Provide a secure solution for web services (WS). A new interoperable and distributed access control for WS is presented. ...
The system provides content-based access control and a secure, decentralized and dynamic solution for authorization that facilitates the management of complex systems and enhances the overall security ...
Role-based access control is commonly accepted as the most appropriate paradigm for the implementation of access control in complex scenarios. RBAC can be considered a mature and flexible technology. ...
doi:10.1108/10662240510577095
fatcat:uazmctdkbfajnims6tobm67j3i
A Study of Future Internet Applications based on Semantic Web Technology Configuration Model
2015
Indian Journal of Science and Technology
This research proposes a configuration model of future Internet applications based on semantic web technology for logical system and adaptation to standardization theory as the conceptual model of neutral ...
The need for future Internet applications based on semantic web technology should ensure the growth of industrial technologies by developing practical ones. ...
The Basic Design Procedure The distributed component model for the access and use of the Web environment, using the Internet standard protocol for remote web objects in XML-based Web services are reusable ...
doi:10.17485/ijst/2015/v8i20/79311
fatcat:cwufqk4iirgatac6lspby2anqq
Access Control Framework for Social Network System using Ontology
2013
International Journal of Computer Applications
In order to protect OSN, in this paper an innovative or dynamic access control framework for social networking systems using semantic web ontology has been proposed which addresses the protection of semantic-rich ...
information in a knowledge base ontology ...
Discretionary Access Control (DAC) [5], Mandatory Access Control (MAC)[5], Role-Based Access Control (RBAC) [6, 7] , Attribute-Based Access Control (ABAC) [8] , etc. ...
doi:10.5120/13728-1524
fatcat:2wifzeax4nbo5ex2suvnbiffou
Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies
2007
Journal of Software
Index Terms-Security, attribute-based access control, authorization and authentication infrastructures, attribute management, semantic web, ontologies. ...
Using the approach presented, policy management at the different sites of a federation is simplified by a semantic attribute management facility. ...
the International Conference on Information and Knowledge Management (CIKM), and the International Workshop on Web Semantics (WebS). ...
doi:10.4304/jsw.2.1.27-38
fatcat:hilav6dqafbj3ji6iehnapw5j4
« Previous
Showing results 1 — 15 out of 47,088 results