Implementation Model for RDF Access Control using Oracle VPD Security Model: Practical Approach

被引:0
|
作者
Jeong, Dongwon [1 ]
Jeong, Hyejin [1 ]
机构
[1] Kunsan Natl Univ, Kunsan, South Korea
关键词
D O I
10.1109/ICCIT.2008.102
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an implementation model for RDF access control in Oracle, and the model is to improve usability of the RAC model, devised for secure resource management for intelligent service frameworks such as Semantic Web, Semantic Grid, Semantic GIS, and Semantic Sensor Network. The RA C model has been devised based on the standard relational database facility, and thus it does not useful for real application. In other words, RDBMSs provide various and powerful security mechanisms, practical implementation models are required for RDBMSs. The goal of this paper is to develop an implementation model for high usability and applicability of the RA C model. This paper shows a prototype implementation and experiment.
引用
收藏
页码:1101 / 1106
页数:6
相关论文
共 50 条
  • [31] A semantic search conceptual model and application in security access control
    Wen, Kunmei
    Lu, Zhengding
    Li, Ruixuan
    Sun, Xiaolin
    Wang, Zhigang
    SEMANTIC WEB - ASWC 2006, PROCEEDINGS, 2006, 4185 : 366 - 376
  • [32] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10
  • [33] Service Security Architecture and Access Control Model for Cloud Computing
    Yan Danfeng
    Yang Fangchun
    Yeap, Tet
    CHINA COMMUNICATIONS, 2011, 8 (06) : 44 - 50
  • [34] A meta-model of access control in a fibred security language
    Barker S.
    Boella G.
    Gabbay D.M.
    Genovese V.
    Studia Logica, 2009, 92 (3) : 437 - 477
  • [35] A Security Model for Access Control in Graph-Oriented Databases
    Morgado, Claudia
    Baioco, Gisele Busichia
    Basso, Tania
    Moraes, Regina
    2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018), 2018, : 135 - 142
  • [36] Two-stage access control model for XML security
    Sun, W
    Liu, DX
    Wang, T
    DIGITAL LIBRARIES: IMPLEMENTING STRATEGIES AND SHARING EXPERIENCES, PROCEEDINGS, 2005, 3815 : 479 - 480
  • [37] A flexible access control model for multimedia medical image security
    Tzelepi, S
    Pangalos, G
    ADVANCES IN MUTLIMEDIA INFORMATION PROCESSING - PCM 2001, PROCEEDINGS, 2001, 2195 : 1030 - 1035
  • [38] A mandatory access control policy model for information security requirements
    Leiwo, J
    Gamage, C
    Zheng, YL
    PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 527 - 538
  • [39] Stability robustness and practical implementation of an internal model control structure
    Zazueta, S
    Alvarez, J
    EUROPEAN JOURNAL OF CONTROL, 2000, 6 (03) : 268 - 278
  • [40] A Practical Model Driven Approach for Designing Security Aware RESTful Web APIs Using SOFL
    Emeka, Busalire Onesmus
    Hidaka, Soichiro
    Liu, Shaoying
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (05) : 986 - 1000