1,034 Hits in 6.1 sec

Fine-Grained Access Control for RDF Data on Mobile Devices [chapter]

Owen Sacco, Matteo Collina, Gregor Schiele, Giovanni Emanuele Corazza, John G. Breslin, Manfred Hauswirth
2013 Lecture Notes in Computer Science  
Existing approaches for fine-grained access control for RDF data suffer from high overhead, making them ill-suited for mobile devices.  ...  In this paper we propose a new approach to realise fine-grained access control for mobile devices.  ...  RDF stores) for mobile devices. However, current storage systems such as RDF on the Go [8] do not offer efficient support for fine-grained access control for the data contained in them.  ... 
doi:10.1007/978-3-642-41230-1_40 fatcat:gglhz7u3svbglexehrn3etcdaq

Ubiquitous access control for SPARQL endpoints

Luca Costabello, Serena Villata, Nicolas Delaforge, Fabien Gandon
2012 Proceedings of the 21st international conference companion on World Wide Web - WWW '12 Companion  
We present and evaluate a context-aware access control framework for SPARQL endpoints queried from mobile.  ...  [5] provide a fine-grained access control framework on top of RDF repositories coupled with a high level specification language translated into a SPARQL/SerQL/SQL query to enforce the policy.  ...  OUR PROPOSAL Our system relies on two complementary lightweight vocabularies, S4AC 3 for access control, and PRISSMA 4 for modelling the mobile context.  ... 
doi:10.1145/2187980.2188090 dblp:conf/www/CostabelloVDG12 fatcat:2cvlbbdigzazrosbqrrfrvk6ti

Transparent Mobile Querying of Online RDF Sources Using Semantic Indexing and Caching [chapter]

William Van Woensel, Sven Casteleyn, Elien Paret, Olga De Troyer
2011 Lecture Notes in Computer Science  
In this paper, we present a mobile query service for the efficient and transparent querying of large amounts of small online RDF sources.  ...  Due to advancements in mobile technology and connectivity, mobile devices have become fully-fledged web clients.  ...  Both SCOUT and the developed query service are based on Android OS 2.2. We employ a fine-tuned version of the androjena library to access, manipulate and query RDF data on the mobile device.  ... 
doi:10.1007/978-3-642-24434-6_14 fatcat:l73tnvgjx5e35btmlomxtutv74


Luca Costabello, Serena Villata, Nicolas Delaforge, Fabien Gandon
2012 Proceedings of the 23rd ACM conference on Hypertext and social media - HT '12  
We present Shi3ld, a context-aware access control framework for consuming the Web of Data from mobile devices.  ...  Alice data is forbidden because Access Conditions evaluation leads to a false answer with Bob's context (Bob is near Alice's boss).  ...  For the implementation details of Shi3ld and its evaluation, see [3] .  ... 
doi:10.1145/2309996.2310049 dblp:conf/ht/CostabelloVDG12 fatcat:3ah437stavfhbcq5ucq3j7dfhy

Social Semantic Network-Based Access Control [chapter]

Serena Villata, Luca Costabello, Fabien Gandon, Catherine Faron-Zucker, Michel Buffa
2013 Lecture Notes in Social Networks  
Finally, we report on the other existing approaches coupling semantics and access control in the context of social networks.  ...  are pros and cons of introducing semantics in social networks access control.  ...  [23] present a fine-grained access control framework on top of RDF repositories.  ... 
doi:10.1007/978-3-7091-0894-9_6 dblp:series/lnsn/VillataCGFB13 fatcat:v2mutdfmlzf4xofihqghhusbwy

"Context-aware access control and presentation for linked data" by Luca Costabello with Prateek Jain as coordinator

Luca Costabello
2015 ACM SIGWEB Newsletter  
An early version of a context-aware access control system for Linked Data has been published at the Linked Data on the Web Workshop (LDOW), co-located with WWW 2012 [Costabello 2012b ].  ...  Shi3ld for SPARQL, as presented in this thesis, appears in a 2012 paper presented at the European Conference on Artificial Intelligence (ECAI), [Costabello 2012a].  ...  [Flouris 2010 ] present a fine-grained access control framework on top of RDF repositories.  ... 
doi:10.1145/2749279.2749282 fatcat:rtsg57v7fbcb7egtdfnyfvb6wu

CAKE – Distributed Environments for Context-Aware Systems [chapter]

Jörg Cassens, Felix Schmitt, Michael Herczeg
2013 Lecture Notes in Computer Science  
and application programming interface and that caters for privacy concerns by giving users access to personal context aware environments that share information selectively with other users' context aware  ...  We describe related work on context middleware and the niche CAKE is targeting. We also argue for taking privacy concerns into account and outline how our framework addresses such issues.  ...  The authors wish to thank their students for their contributions in designing and implementing CAKE: David Bouck-Standen, Tim Dubbels, Bjørn Eberhardt, Eva Jehle, Sandro Kock, Alexander Schulze and Daniel  ... 
doi:10.1007/978-3-319-03647-2_24 fatcat:5o5ywsgjjrbnzp6hafu77klyim

Connecting Mobile Users Through Mobile Social Networks

Faisal Alkhateeb, Ahmed M. Manasrah, Iyad Abu Doush, Eslam Al Maghayreh
2012 International Journal of Interactive Mobile Technologies  
We also propose a privacy control policy for mobile social networks.  ...  In this paper, we present a mobile service for joining groups across communities.  ...  To this end, we proposed a fine-grain privacy policy for restricting or granting access to specific data on mobile social networks.  ... 
doi:10.3991/ijim.v6i4.2224 fatcat:353m4yd22fbiphzigvjeflu7h4

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

Isma Farah Siddiqui, Scott Uk-Jin Lee
2016 Journal of Internet Computing and services  
The proposed XACML as a Service (XACMLaaS) approach offers fine-grained access control for protecting information within smart environment.  ...  In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML.  ...  The proposed approach of XACMLaaS targets fine-grained access control for smart device data using defined set of layer components.  ... 
doi:10.7472/jksii.2016.17.5.09 fatcat:6tww6xnrejaidiopeuugpfcwyi

Mobile Applications for Public Sector: Balancing Usability and Security

Yurij Natchetoi, Konstantin Beznosov, Viktor Kaufman
2009 Zenodo  
While mobile devices have many known limitations, assuring complex fine-grained security policies poses an additional challenge to quality mobile services and raises usability concerns.  ...  We address these challenges by means of a novel approach to authentication and gradual multi-factor authorization for access to sensitive data.  ...  Relatively slow and intermittent connectivity prevents traditional approaches used to enforce fine-grained access control that relies on authorization verification on each access to the central server.  ... 
doi:10.5281/zenodo.3264356 fatcat:jallsfkkardcjbzwfkiyfquuzq

ACM HotMobile 2013 poster

Prajit Kumar Das, Dibyajyoti Ghosh, Anupam Joshi, Tim Finin
2013 ACM SIGMOBILE Mobile Computing and Communications Review  
We describe a method to carry out energy efficient privacy preservation on a mobile smartphone.  ...  Our work is based on a study of an Android smartphone's component-wise energy consumption pattern and is based on a three-fold approach to ensure efficient execution of privacy policies, based on user  ...  The resulting system provides fine-grained, context-dependent control to sensitive user data [2] .  ... 
doi:10.1145/2542095.2542114 fatcat:rnl5iyt5frbjdo3ptpbuhf4ery

Yarta: A Middleware for Managing Mobile Social Ecosystems [chapter]

Alessandra Toninelli, Animesh Pathak, Valérie Issarny
2011 Lecture Notes in Computer Science  
With the increased prevalence of advanced mobile devices (the so-called "smart" phones), interest has grown in mobile social ecosystems, where users not only access traditional Web-based social networks  ...  and context raises the need for middleware support for the development of mobile social applications.  ...  Controlling Access to MSE Knowledge Yarta provides a flexible and powerful support for access control, which can be fine-tuned based on the social preferences of the user.  ... 
doi:10.1007/978-3-642-20754-9_22 fatcat:elfquphbkrbqrfrjjd2ismkouq

A Linked Data Framework for Android [chapter]

Maria-Elena Roşoiu, Jérôme David, Jérôme Euzenat
2015 Lecture Notes in Computer Science  
We present an API that provides data access in RDF, both within mobile devices and from the outside world.  ...  Mobile devices are becoming major repositories of personal information. Still, they do not provide a uniform manner to deal with data from both inside and outside the device.  ...  So, our next step is to provide a more fine grained and structured access to data through SPARQL querying. This promises to raise the issue of computation, and thus energy, cost on mobile platform.  ... 
doi:10.1007/978-3-662-46641-4_15 fatcat:mq5wavn6vbckjjtjze5m32v5am

Weaving a Distributed, Semantic Social Network for Mobile Users [chapter]

Sebastian Tramp, Philipp Frischmuth, Natanael Arndt, Timofey Ermilov, Sören Auer
2011 Lecture Notes in Computer Science  
The problem is currently solved only for centralized proprietary platforms (such as Google mail, contacts & calendar) as well as data-silo-like social networks (e.g. Facebook).  ...  In this paper we present the architecture as well as the implementation of a mobile Social Semantic Web framework, which weaves a distributed social network based on semantic technologies.  ...  This work was supported by a grant from the European Union's 7th Framework Programme provided for the project LOD2 (GA no. 257943).  ... 
doi:10.1007/978-3-642-21034-1_14 fatcat:4zcyifb3rbh7lfiarmhkw2hffe

Metadata Design for Introspection-Capable Reconfigurable Systems [chapter]

Vangelis Gazis, Nancy Alonistioti, Lazaros Merakos
2004 Lecture Notes in Computer Science  
Global vision consensus on the next generation of wireless mobile cornmunications, broadly termed 4G, sketches a hybrid infrastructure, comprising different wireless access systems in a complementary manner  ...  W e proceed to identify existing metadata standards that are candidate for the representation of reconfiguration metadata, discussing and evaluating their suitability.  ...  Considering that the observed proliferation of wireless access technologies is likely to persist and that future mobile devices will need to support multiple dissimilar wireless access standards, the mobile  ... 
doi:10.1007/978-3-540-24693-0_113 fatcat:p6b2v53hkbhhtfzqau6wmdxxei
« Previous Showing results 1 — 15 out of 1,034 results