Filters








28,786 Hits in 3.7 sec

Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs [chapter]

Romuald Thion, Stéphane Coulondre
2006 Lecture Notes in Computer Science  
Thanks to conceptual graphs, we can provide a consistent graphical formalism for role-based access control policies, able to deal with specificities of this model such as role hierarchy and constraints  ...  This paper focused on two aspects of access control: graphical representation and reasoning. Access control policies describe which operations on resources are granted to users.  ...  Representation and reasonings on RBAC policies with conceptual graphs In section 2, we described the role-based access control model and basic outlines of grph rules chaining.  ... 
doi:10.1007/11787181_31 fatcat:tct6covkezdqdmxmnlvpouy324

Expressive security policy rules using Layered Conceptual Graphs

Madalina Croitoru, Liang Xiao, David Dupplaw, Paul Lewis
2008 Knowledge-Based Systems  
We propose a Conceptual Graphs based language that will allow us to represent the structure of information and to employ reasoning for consistency checking.  ...  We motivate our choice of language by the gained expressivity, the potential for depicting policy associations rigourously and by associated reasoning capabilities.  ...  We also to thank Javier Vincente Robledo, Srinandan Dasmahapatra, Andrew Peet, Horacio Gonzalez-Velez and Alex Gibb for useful feedback on earlier versions of this paper.  ... 
doi:10.1016/j.knosys.2007.11.006 fatcat:briioohumrhxflvxypfabnvvai

A knowledgeable security model for distributed health information systems

Liang Xiao, Bo Hu, Madalina Croitoru, Paul Lewis, Srinandan Dasmahapatra
2010 Computers & security  
While the decision making needs to rely on different clinical expertise, the HealthAgents system leveraged a domain ontology to align different sub-domain vocabularies and we have experimented with a process  ...  brain tumour diagnosis and treatment.  ...  Knowledge-intensive case-based reasoning in creek. In: Advances in case-based reasoning, 7th European conference, ECCBR 2004, proceedings, volume 3155 of lecture notes in artificial intelligence.  ... 
doi:10.1016/j.cose.2009.08.002 fatcat:luknvpstkrghfkcrsqpylhv6qu

An architecture for specification and enforcement of temporal access control constraints using OWL

Hassan Takabi, Minsoo Kim, James B.D. Joshi, Michael B. Spring
2009 Proceedings of the 2009 ACM workshop on Secure web services - SWS '09  
One important issue in the Semantic Web environment is access control.  ...  Integrating Role-Based Access Control (RBAC) models, which have been accepted as a powerful approach to security management, with the Semantic Web helps to reduce the complexity of Web security management  ...  To the best of our knowledge, there is no work on time based access control policies that we address in this paper.  ... 
doi:10.1145/1655121.1655127 dblp:conf/sws/TakabiKJS09 fatcat:osp7uabkc5dhbdjlerbx6rcnpq

Using OWL and SWRL to represent and reason with situation-based access control policies

Dizza Beimel, Mor Peleg
2011 Data & Knowledge Engineering  
Situation-Based Access Control (SitBAC) is a conceptual model that allows for modeling healthcare scenarios of data-access requests; thus it can be used to formulate data-access policies, where health  ...  We evaluated the ability of the SitBAC knowledge framework to provide correct responses by representing and reasoning with real-life healthcare scenarios.  ...  Related Works In this Section, we discuss access-control models in general and context-based access-control models in particular, with a focus on DL-based access-control frameworks.  ... 
doi:10.1016/j.datak.2011.03.006 fatcat:l7majtvszrg7zmcw4tuhltowju

A Semantic Framework for Enabling Radio Spectrum Policy Management and Evaluation [chapter]

Henrique Santos, Alice Mulvehill, John S. Erickson, James P. McCusker, Minor Gordon, Owen Xie, Samuel Stouffer, Gerard Capraro, Alex Pidwerbetsky, John Burgess, Allan Berlinsky, Kurt Turck (+2 others)
2020 Lecture Notes in Computer Science  
The framework utilizes a novel policy representation using OWL and PROV-O along with a domain-specific reasoning implementation that mixes GeoSPARQL, OWL reasoning, and knowledge graph traversal to evaluate  ...  incoming spectrum access requests and explain how applicable policies were used.  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those the authors and do not necessarily reflect the views of AFRL.  ... 
doi:10.1007/978-3-030-62466-8_30 fatcat:fsmdm2wr7rhqjmtbypuwtrehnm

Dynamic Access Control to Semantics-Aware Streamed Process Logs

Marcello Leida, Paolo Ceravolo, Ernesto Damiani, Rasool Asal, Maurizio Colombo
2019 Journal on Data Semantics  
Our approach is based on the novel idea of dynamic enforcement: we incrementally build dynamic filters for each process instance, based on the applicable access control policy and on the current prefix  ...  A major challenge of this scenario is reconciling the requirements of privacy and access control with the need to continuously monitor and assess the business process.  ...  Along the years, many AC models like access control lists (ACL), capability lists and role-based access control (RBAC) have been proposed.  ... 
doi:10.1007/s13740-019-00106-2 fatcat:32kr2t762zczfgvwqh27o3w6lq

Access control and the Resource Description Framework: A survey

Sabrina Kirrane, Alessandra Mileo, Stefan Decker, Bernardo Cuenca Grau
2016 Semantic Web Journal  
This paper provides an overview of the various access control models, standards and policy languages, and the different access control enforcement strategies for the Resource Description Framework (the  ...  However, in order to support the next generation of e-business applications on top of Linked Data suitable forms of access control need to be put in place.  ...  The XACML policies together with a reasoning engine, allows for deductive reasoning based on the OWL vocabulary.  ... 
doi:10.3233/sw-160236 fatcat:4b4el2ueozdtvjlzswlsd4p6my

A Semantic Search Conceptual Model and Application in Security Access Control [chapter]

Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun, Zhigang Wang
2006 Lecture Notes in Computer Science  
We build a security ontology based on Role-Based Access Control (RBAC) policy. A semantic search system Onto-SSSE is implemented based on the model.  ...  We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilities.  ...  Role-based access-control (RBAC) models show clear advantages over traditional discretionary and mandatory access control models with regard to these requirements.  ... 
doi:10.1007/11836025_37 fatcat:tb4xatvxunczvne63q3qbyscoy

Managing security policies in a distributed environment using eXtensible markup language (XML)

Nathan N. Vuong, Geoffrey S. Smith, Yi Deng
2001 Proceedings of the 2001 ACM symposium on Applied computing - SAC '01  
An example is given using our proposed concepts with Java 1 and Role-Based Access Control (RBAC) policies.  ...  In light of the growth of the Internet, much research has been done on application-level distributed authorization systems.  ...  Role-Based Access Control (RBAC) Role-Based Access Control (RBAC), a policy neutral access control mechanism, is widely known as being an inherently easier and less error-prone way of administrating access  ... 
doi:10.1145/372202.372386 dblp:conf/sac/VuongSD01 fatcat:plss43fxanalxaee2fppqonbwi

An Authorization Framework using Building Information Models

N. Skandhakumar, J. Reid, E. Dawson, R. Drogemuller, F. Salim
2012 Computer journal  
With a view to addressing these requirements we present a survey of relevant spatiotemporal access control models, focusing on features applicable to building information models and highlighting capability  ...  By placing processes in a spatial context, decision-making can be improved, with positive flow-on effects for security and efficiency.  ...  More details on Airports of the Future and its participants can be found at www.airportsofthefuture.qut.edu.au.  ... 
doi:10.1093/comjnl/bxs098 fatcat:pgqaf3thrzcurao55id5c3kh5q

Role templates for content-based access control

Luigi Giuri, Pietro Iglio
1997 Proceedings of the second ACM workshop on Role-based access control - RBAC '97  
This paper proposes a role-based access control model that provides special mechanisms for the definition of content-based access control policies.  ...  More precisely, this model defines the concept of parameterized privilege to restrict the access on subsets of objects, and the concept of role template to support composition and encapsulation of parameterized  ...  Role-based Access Control This section provides the basic concepts for rolebased access control using the model presented in [BAL90] as groundwork.  ... 
doi:10.1145/266741.266773 dblp:conf/rbac/GiuriI97 fatcat:bubemncllbf5fehfx7g3u3qvqm

Access Control and Privacy in Location-Aware Services forMobile Organizations

M.L. Damiani, E. Bertino
2006 7th International Conference on Mobile Data Management (MDM'06)  
To enable a controlled and privacy preserving access to such applications, a comprehensive conceptual framework for an access control system enhanced with location privacy is presented.  ...  In mobile organizations such as enterprises operating on field, healthcare organizations and military and civilian coalitions, individuals, because of the role they have, may need to access common information  ...  Finally, we plan to develop encryption-based access control techniques specifically tailored to space-based access control policies. Figure 1 . 1 Role hierarchy (a) and role extents (b).  ... 
doi:10.1109/mdm.2006.26 dblp:conf/mdm/DamianiB06 fatcat:i3kvcxoy2zdbbn6yxc7sxejqj4

Graph-based reasoning in collaborative knowledge management for industrial maintenance

Bernard Kamsu-Foguem, Daniel Noyes
2013 Computers in industry (Print)  
Problem solving will include knowledge reasoning based on the conceptual graphs (CG) formalism [16] .  ...  The conceptual graph operations allow the representation of derivation rules, and the effective application of these rules, access to a set of facts with constraints [54] .  ... 
doi:10.1016/j.compind.2013.06.013 fatcat:cd2c3pjfezgrtpfr6kssmzfizi

Context Awareness in Mobile Computing Environments

Christos B. Anagnostopoulos, Athanasios Tsounis, Stathes Hadjiefthymiades
2006 Wireless personal communications  
Proximity selection is primarily based on the user location context.  ...  Obviously, high-level representation of context (i.e., context modeled by logic-based data representations) cannot be directly acquired or disseminated from sensors.  ...  The latter methodology is based on mapping contextual information into concepts (e.g., predicates or formulae in first-order logic) and on associating each compatibility relation with a conceptual role  ... 
doi:10.1007/s11277-006-9187-6 fatcat:5buup4kstrhindvy74ddbpdyoe
« Previous Showing results 1 — 15 out of 28,786 results