Implementation Model for RDF Access Control using Oracle VPD Security Model: Practical Approach

被引:0
|
作者
Jeong, Dongwon [1 ]
Jeong, Hyejin [1 ]
机构
[1] Kunsan Natl Univ, Kunsan, South Korea
关键词
D O I
10.1109/ICCIT.2008.102
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an implementation model for RDF access control in Oracle, and the model is to improve usability of the RAC model, devised for secure resource management for intelligent service frameworks such as Semantic Web, Semantic Grid, Semantic GIS, and Semantic Sensor Network. The RA C model has been devised based on the standard relational database facility, and thus it does not useful for real application. In other words, RDBMSs provide various and powerful security mechanisms, practical implementation models are required for RDBMSs. The goal of this paper is to develop an implementation model for high usability and applicability of the RA C model. This paper shows a prototype implementation and experiment.
引用
收藏
页码:1101 / 1106
页数:6
相关论文
共 50 条
  • [1] Implementation Model for Access Control using Log Based Security Practical Approach
    Singh, Amritpal
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 290 - 293
  • [2] RDFacl: A Secure Access Control Model Based on RDF Triple
    Kim, Jaehoon
    Park, Seog
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (01): : 41 - 50
  • [3] AN INFERENCE-ENABLED ACCESS CONTROL MODEL FOR RDF ONTOLOGY
    Jing, Yixin
    Jeong, Dongwon
    Baik, Doo-Kwon
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2009, 19 (03) : 339 - 360
  • [4] Implementation of a Security Access Control Model for Inter-Organizational Healthcare Information Systems
    Chi, Hongmei
    Jones, Edward L.
    Zhao, Lang
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 692 - 696
  • [5] Implementation of Access Control Model for Distributed Information Systems Using Usage Control
    Poniszewska-Maranda, Aneta
    SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 54 - 67
  • [6] Security analysis of Mandatory Access Control Model
    Jiang, YX
    Lin, CC
    Yin, H
    Tan, ZX
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5013 - 5018
  • [7] A Service Access Security Control Model in Cyberspace
    Li Qianmu
    Yin Jie
    Hou Jun
    Xu Jian
    Zhang Hong
    Qi Yong
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT I, 2011, 134 (0I): : 434 - +
  • [8] An access control model for a grid environment employing security-as-a-service approach
    Olatunji, E.K.
    Adigun, M.O.
    Jembere, E.
    Lecture Notes in Electrical Engineering, 2015, 313 : 103 - 110
  • [9] The practical implementation of model reference robot control
    Ekrekli, A
    Brookfield, DJ
    MECHATRONICS, 1997, 7 (06) : 549 - 564
  • [10] Improvement and implementation of RBAC access control model
    Information College, Capital University of Economics and Business, Beijing, China
    Proc. - Int. Conf. Manage. e-Commer. e-Govern., ICMeCG, 1600, (110-115):