118,078 Hits in 4.2 sec

Rules and Ontology Based Data Access [chapter]

Guohui Xiao, Martin Rezk, Mariano Rodríguez-Muro, Diego Calvanese
2014 Lecture Notes in Computer Science  
To the best of our knowledge, this results in the first system supporting all of the following W3C standards: the OWL 2 QL ontology language, R2RML mappings, SWRL rules with linear recursion, and SPARQL  ...  In OBDA an ontology defines a high level global vocabulary for user queries, and such vocabulary is mapped to (typically relational) databases.  ...  This paper is supported by the EU under the large-scale integrating project (IP) Optique (Scalable End-user Access to Big Data), grant agreement n. FP7-318338.  ... 
doi:10.1007/978-3-319-11113-1_11 fatcat:uqm6evalvjfy3ffrn4qpfxem54

Collaborative management of web ontology data with flexible access control

Jie Lu, Chao Wang, Guangquan Zhang, Jun Ma
2010 Expert systems with applications  
The implementation of the rule-based access control mechanism and related testing are also discussed. Ontologies have been recognized as an essential layer of the emerging semantic web [5, 20] .  ...  This model adds rules into the robinet system to utilise the semantics of ontology for controlling the access to ontology data.  ...  Acknowledgements The authors sincerely thank all reviewers for their valuable comments and suggestions.  ... 
doi:10.1016/j.eswa.2009.11.050 fatcat:7y3vbyvhwrglnbc5m6szdpxtau

Providing Ontology-Based Access Control for Cloud Data by Exploiting Subsumption Property among Domains of Access Control

Auxilia Michael, Raja Kothandaraman, Kannan Kaliyan
2019 International Journal of Intelligent Engineering and Systems  
In this paper, Ontology-Based Access Control is proposed.  ...  The experimental results show that the number of rules to be stored in Policy Base is reduced and reasoning time is also considerably reduced because of applying subsumption property and hence access decision  ...  Policy Base includes the explicit access control rules defined by the system data owner through security administrates.  ... 
doi:10.22266/ijies2019.0630.27 fatcat:3nznfxa3fbatjerasozewbadq4

Ontology-based Access Control Management: Two Use Cases

Malik Imran-Daud, David Sanchez, Alexandre Viejo
2016 Proceedings of the 8th International Conference on Agents and Artificial Intelligence  
Ontology-based Access Control Management: Two Use Cases.  ...  To palliate this problem, we propose a generic ontology-based solution to manage the access control that can greatly simplify and speed up the definition of rules in complex scenarios and that can also  ...  and ICWT TIN2012-32757) and by the Government of Catalonia (under grant 2014 SGR 537).  ... 
doi:10.5220/0005777902440249 dblp:conf/icaart/Daud0V16 fatcat:2qyufua66vardj3jaw6n2qswom

Ontology Centric Access Control Mechanism for Enabling Data Protection in Cloud

M. Auxilia, K. Raja
2016 Indian Journal of Science and Technology  
Ontology Handler makes an inference request to ontology base and receives inference response.  ...  For reducing the number of statements and rules in policy base, subsumption property is used. This reduces the space and time complexity.  ...  Steps to assign and dis-assign user capabilities  ... 
doi:10.17485/ijst/2016/v9i23/95148 fatcat:gapmkzomh5dyvdnkx3ghzwvely

Using OWL and SWRL to represent and reason with situation-based access control policies

Dizza Beimel, Mor Peleg
2011 Data & Knowledge Engineering  
Within the SitBAC knowledge framework, scenarios of data access are represented as formal Web Ontology language (OWL)-based Situation classes, formulating data-access rule classes.  ...  A set of data-access rule classes makes up the organization's data-access policy.  ...  These abstractions can be used to model data-access scenarios and thereby enable the modeling of data-access rules.  ... 
doi:10.1016/j.datak.2011.03.006 fatcat:l7majtvszrg7zmcw4tuhltowju

An Advanced Query and Result Rewriting Mechanism for Information Retrieval Purposes from RDF Datasources [chapter]

Efthymios Chondrogiannis, Vassiliki Andronikou, Efstathios Karanastasis, Theodora Varvarigou
2015 Communications in Computer and Information Science  
• Semantic Web Applications -Need access to existing (real or virtual) RDF datasources -Use different Model and Vocabularies Ontology Patterns & Mapping Rules Ontology Pattern -Uniquely determines  ...  a graph-based representation of the corresponding data -Example: [s1] PropA [s2] ↔ [s1] PropB [s2] [s2] : Data Transformation ?  ... 
doi:10.1007/978-3-319-24543-0_3 fatcat:ats67bzfwjen7l5vbsy7qsdmma

Access control management for e-Healthcare in cloud environment

Lili Sun, Jianming Yong, Jeffrey Soar
2014 EAI Endorsed Transactions on Scalable Information Systems  
This paper addresses existing access control methods and presents a semantic based access control model which considers semantic relations among different entities in cloud computing environment.  ...  This work shows how the semantic web technology provides efficient solutions for the management of complex and distributed data in heterogeneous systems, and it can be used in the medical information systems  ...  Semantic web technologies are based knowledge bases. It aims to first annotate data via common ontology, then interlink data on the web and allow one to query this web of knowledge.  ... 
doi:10.4108/sis.1.2.e3 fatcat:jkhmx6no4bh4ve4wqbdegiwfwm

Access Control Framework for Social Network System using Ontology

Vipin Kumar, Sachin Kumar
2013 International Journal of Computer Applications  
information in a knowledge base ontology  ...  To protect such kind for huge or big data or information need more secured and flexible access control model.  ...  [17] present an approach towards combining rule-based and ontology-based policies in pervasive environments. Demchenko et al.  ... 
doi:10.5120/13728-1524 fatcat:2wifzeax4nbo5ex2suvnbiffou

A semantic security framework and context-aware role-based access control ontology for smart spaces

Shohreh Hosseinzadeh, Seppo Virtanen, Natalia Díaz-Rodríguez, Johan Lilius
2016 Proceedings of the International Workshop on Semantic Big Data - SBD '16  
We model our access control scheme using ontological techniques and Web Ontology Language (OWL), and implement it via CLIPS rules.  ...  We propose a) a security framework, and b) a context-aware role-based access control scheme.  ...  Access control ontology and rules To represent and classify knowledge, there are two different approaches: data-driven and knowledge-driven.  ... 
doi:10.1145/2928294.2928300 dblp:conf/sigmod/HosseinzadehVRL16 fatcat:igaqqwzsqfhifpckgc5zdbnru4

Semantic-Based Authorization: Need for Context

Mouiad AL-Wahah, Csilla Farkas
2019 International Journal for Digital Society (IJDS)  
In our framework, access authorization decision is made based on the context of the request and the resources.  ...  We use Description Logic (DL) and Logic Programming (LP) technologies for implementing Context-Based Access Control (CBAC).  ...  CBAC ontology The context-based access control model, or CBAC model, consists of a set of rules and each rule is given by the following definition: 𝑟𝑢𝑙𝑒 = 𝑟, 𝑟𝑡, 𝑟𝑠, 𝑠𝑐, 𝑟𝑜, 𝑟𝑑, 𝑑𝑒, 𝑔𝑐  ... 
doi:10.20533/ijds.2040.2570.2019.0180 fatcat:7tbtzipdv5cvdgp3wulmpdebza

A Semantic Context-Based Model for MobileWeb Services Access Control

Haibo Shen, Yu Cheng
2011 International Journal of Computer Network and Information Security  
As well as, this paper specifies access control policies as rules over ontologies representing the concepts introduced in the SCBAC model, and uses semantic web rule language (SWRL) to form policy rule  ...  and infer those rules by JESS inference engine.  ...  The Knowledge Base (KB) is a data repository of domain ontology.  ... 
doi:10.5815/ijcnis.2011.01.03 fatcat:hbdiefizcbgo3ju3abp5w6xxoa

Ontology-based Security Context Reasoning for Power IoT-Cloud Security Service

Chang Choi, Junho Choi
2019 IEEE Access  
Therefore, an effective response method that can respond to security intrusions intelligently while using an access control technique based on ontology reasoning is required.  ...  technologies being actively studied in the field of intelligent systems, and malicious code detection technologies based on an intelligent access control model, text mining, and natural language processing  ...  Rule-based reasoning generates a service by conducting the reasoning for data that satisfy a certain rule among the input data based on rules between certain data as defined by the user.  ... 
doi:10.1109/access.2019.2933859 fatcat:nkjzroorsjewrisrwfkctmdc2i

LIoPY: A Legal Compliant Ontology to Preserve Privacy for the Internet of Things

Faiza Loukil, Chirine Ghedira-Guegan, Khouloud Boukadi, Aicha Nabila Benharkat
2018 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)  
We implemented and evaluated our privacy ontology based on a healthcare scenario.  ...  Our proposed ontology aims both at making the smart devices more autonomous and able to infer data access rights and enforcing the privacy policy compliance at the execution level.  ...  Our reasoning process is based on a set of SWRL rules and ontology classes to infer privacy policies for different possible data sharing cases in the real world.  ... 
doi:10.1109/compsac.2018.10322 dblp:conf/compsac/LoukilGBB18 fatcat:y4kewaubfngsdfalaihnqbyx4i

Ontology-Based Matching of Security Attributes for Personal Data Access in e-Health [chapter]

Ioana Ciuciu, Brecht Claerhout, Louis Schilders, Robert Meersman
2011 Lecture Notes in Computer Science  
The approach is validated in an e-Health scenario for the access of patient data for diabetes patient monitoring and disease management.  ...  by the central (Master Policy Decision Point) vocabulary based on a security ontology and its domain-specific extensions which provides semantic reasoning services.  ...  The approach is based on the DOGMA ontology which enables semantic reasoning and on the -RIDL mapping generator which performs the mapping based on ontology-based data matching strategies.  ... 
doi:10.1007/978-3-642-25106-1_13 fatcat:vvcs5jqf4fbo5p3xejdo7q4m7m
« Previous Showing results 1 — 15 out of 118,078 results