Filters








47,088 Hits in 7.1 sec

A Role and Attribute Based Access Control System Using Semantic Web Technologies [chapter]

Lorenzo Cirio, Isabel F. Cruz, Roberto Tamassia
On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops  
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attributes.  ...  A Description Logic (DL) reasoner is used to classify both users and resources, and verify the consistency of the access control policies.  ...  Introduction In this paper, we present an access control system for context-aware environments designed and built using Semantic Web technologies.  ... 
doi:10.1007/978-3-540-76890-6_53 dblp:conf/otm/CirioCT07 fatcat:c2akv5ziyzalnien46gm7jiscq

Access control management for e-Healthcare in cloud environment

Lili Sun, Jianming Yong, Jeffrey Soar
2014 EAI Endorsed Transactions on Scalable Information Systems  
We have enriched the research for semantic web technology with role-based access control that is able to be applied in the field of medical information system or e-Healthcare system.  ...  This paper addresses existing access control methods and presents a semantic based access control model which considers semantic relations among different entities in cloud computing environment.  ...  Here, semantic web technologies could play a greater important role as we will present in this paper. Semantic web technologies are based knowledge bases.  ... 
doi:10.4108/sis.1.2.e3 fatcat:jkhmx6no4bh4ve4wqbdegiwfwm

Semantic Security for E-Health: A Case Study in Enhanced Access Control

Yang Lu, Richard O. Sinnott
2015 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)  
We show how approaches based upon ontology-based policy specification overcome many of the current security challenges facing the development of such systems and enhance access control by leveraging existing  ...  In this paper we argue that semantic technologies have unique benefits for specification and enforcement of security policies that cross organisation boundaries.  ...  The INPDR is supported by a grant from the European Union Directorate General for Health and Consumers (DG-SANCO) and a range of clinical partner organizations.  ... 
doi:10.1109/uic-atc-scalcom-cbdcom-iop.2015.90 dblp:conf/uic/LuS15 fatcat:krvsyldu7fdwjener5iaibiq2i

Building a Distributed Semantic-aware Security Architecture [chapter]

Jan Kolter, Rolf Schillinger, Günther Pernul
2007 IFIP International Federation for Information Processing  
Focusing on an attributebased access control approach, we present an access control model that facilitates semantic attribute matching and ontology mapping.  ...  Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects.  ...  We would like to thank our project partners for helpful comments and stimulating discussions.  ... 
doi:10.1007/978-0-387-72367-9_34 fatcat:qw6fdux76fh2pbiiziw5vlvkiu

A semantic access control model for grid services

Junzhou Luo, Xiaopeng Wang, Aibo Song
2005 Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005.  
The new access control model will exploit semantic web technologv, and use machine reasoning about the messages and policies at a semantic level.  ...  In order to protect each compaq's sensitive data and services, access control is therefore necessary and important, In this paper, we present a new approach to authorize and udminisrrate access requests  ...  with semantic web technology.  ... 
doi:10.1109/cscwd.2005.194196 dblp:conf/cscwd/LuoWS05 fatcat:xj6te73ur5ht3fbrsbiafr66oa

Delegated Authorization Framework for EHR Services using Attribute Based Encryption

Maithilee Joshi, Karuna Pande Joshi, Tim Finin
2019 IEEE Transactions on Services Computing  
We present a novel, centralized, attribute-based authorization mechanism that uses Attribute Based Encryption (ABE) and allows for delegated secure access of patient records.  ...  Hence there is a need to develop a proper authorization delegation mechanism for safe, secure and easy to use cloud-based EHR Service management.  ...  ACKNOWLEDGMENTS This work was conducted using the Protege resource, which is supported by grant GM10331601 from the National Institute of General Medical Sciences of the United States National Institutes  ... 
doi:10.1109/tsc.2019.2917438 fatcat:ddn7lo6wjfhspf5dmunwloorga

Attribute - Semantic Based Access Control Policy Model for IoT

2019 International Journal of Engineering and Advanced Technology  
To solve these issues, this work design a model which calculate final trust value based on semantic information dynamically referring to ontology. a access control policy is also designed on semantic role  ...  The semantic technology is used for high level reasoning of the context situation  ...  PROPOSED ATTRIBUTE -SEMANTIC ROLE BASED CONTROL The access control mechanism is to control any subject accessing the object, so that resource use is restricted from illegal use and managed effectively.  ... 
doi:10.35940/ijeat.a1124.1291s419 fatcat:mhnfoqxk7jefvadcyiycuu3wjq

Semantic security: specification and enforcement of semantic policies for security-driven collaborations

R O Sinnott, T Doherty, N Gray, J Lusted
2009 Studies in Health Technology and Informatics  
In this paper we present results of the JISC funded Advanced Grid Authorisation through Semantic Technologies (AGAST) project (www.nesc.ac.uk/hub/projects/agast) and show how semantic-based approaches  ...  Supporting finer-grained access control is often essential for domains where the specification and subsequent enforcement of authorization policies is needed.  ...  Semantic Web and Semantic-based Security The semantic web is an intended successor to the current web.  ... 
pmid:19593058 fatcat:ol7qblybyjdepphdlmvo5rtasm

Secure knowledge management: confidentiality, trust, and privacy

E. Bertino, L.R. Khan, R. Sandhu, B. Thuraisingham
2006 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Index Terms-Data mining, privacy, role-based access control (RBAC), secure knowledge management, security policy, semantic web, trust negotiation (TN), usage control (UCON).  ...  In particular, certain access-control techniques will be investigated, and trust management as well as privacy control for knowledge management will be explored.  ...  His seminal paper on role-based access control (RBAC) introduced the RBAC96 model, which evolved into the 2004 National Institute of Standards and Technology/American National Standards Institute (NIST  ... 
doi:10.1109/tsmca.2006.871796 fatcat:pnqtkbbuazaipeqlo3iz4isdri

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

Isma Farah Siddiqui, Scott Uk-Jin Lee
2016 Journal of Internet Computing and services  
To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML  ...  In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML.  ...  The architecture of XACML mechanism is flexible to incorporate access control solutions from Attribute Based Access Control (ABAC), Role Based Access Control (RBAC) or Policy Based Access Control (PBAC  ... 
doi:10.7472/jksii.2016.17.5.09 fatcat:6tww6xnrejaidiopeuugpfcwyi

Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment

Atul Verma, Gaurav Kant Shankhdhar, Manuj Darbari
2017 International Journal of Applied Information Systems  
Providers to cloud computing including Amazon, Google, Microsoft, Rachspace and Terremark have all contributed at a high end for this bulk storage technology.  ...  To deal with the security issues in cloud computing this paper discusses some concepts like ontology, web semantics, and message passing within or between cloud components.  ...  We use Semantic Web technologies to represent our policies and to reason over contextual attributes and user role attributes to determine outcomes of access control requests.  ... 
doi:10.5120/ijais2017451648 fatcat:3pmjj6c4cbg57fd4mxx3v26uf4

A metadata‐based access control model for web services

Mariemma I. Yagüe, Antonio Maña, Javier Lopez
2005 Internet Research  
Purpose -Provide a secure solution for web services (WS). A new interoperable and distributed access control for WS is presented.  ...  The system provides content-based access control and a secure, decentralized and dynamic solution for authorization that facilitates the management of complex systems and enhances the overall security  ...  Role-based access control is commonly accepted as the most appropriate paradigm for the implementation of access control in complex scenarios. RBAC can be considered a mature and flexible technology.  ... 
doi:10.1108/10662240510577095 fatcat:uazmctdkbfajnims6tobm67j3i

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model

Ji-Moon Chung
2015 Indian Journal of Science and Technology  
This research proposes a configuration model of future Internet applications based on semantic web technology for logical system and adaptation to standardization theory as the conceptual model of neutral  ...  The need for future Internet applications based on semantic web technology should ensure the growth of industrial technologies by developing practical ones.  ...  The Basic Design Procedure The distributed component model for the access and use of the Web environment, using the Internet standard protocol for remote web objects in XML-based Web services are reusable  ... 
doi:10.17485/ijst/2015/v8i20/79311 fatcat:cwufqk4iirgatac6lspby2anqq

Access Control Framework for Social Network System using Ontology

Vipin Kumar, Sachin Kumar
2013 International Journal of Computer Applications  
In order to protect OSN, in this paper an innovative or dynamic access control framework for social networking systems using semantic web ontology has been proposed which addresses the protection of semantic-rich  ...  information in a knowledge base ontology  ...  Discretionary Access Control (DAC) [5], Mandatory Access Control (MAC)[5], Role-Based Access Control (RBAC) [6, 7] , Attribute-Based Access Control (ABAC) [8] , etc.  ... 
doi:10.5120/13728-1524 fatcat:2wifzeax4nbo5ex2suvnbiffou

Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies

Torsten Priebe, Wolfgang Dobmeier, Christian Schläger, Nora Kamprath
2007 Journal of Software  
Index Terms-Security, attribute-based access control, authorization and authentication infrastructures, attribute management, semantic web, ontologies.  ...  Using the approach presented, policy management at the different sites of a federation is simplified by a semantic attribute management facility.  ...  the International Conference on Information and Knowledge Management (CIKM), and the International Workshop on Web Semantics (WebS).  ... 
doi:10.4304/jsw.2.1.27-38 fatcat:hilav6dqafbj3ji6iehnapw5j4
« Previous Showing results 1 — 15 out of 47,088 results