Implementation Model for RDF Access Control using Oracle VPD Security Model: Practical Approach

被引:0
|
作者
Jeong, Dongwon [1 ]
Jeong, Hyejin [1 ]
机构
[1] Kunsan Natl Univ, Kunsan, South Korea
关键词
D O I
10.1109/ICCIT.2008.102
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an implementation model for RDF access control in Oracle, and the model is to improve usability of the RAC model, devised for secure resource management for intelligent service frameworks such as Semantic Web, Semantic Grid, Semantic GIS, and Semantic Sensor Network. The RA C model has been devised based on the standard relational database facility, and thus it does not useful for real application. In other words, RDBMSs provide various and powerful security mechanisms, practical implementation models are required for RDBMSs. The goal of this paper is to develop an implementation model for high usability and applicability of the RA C model. This paper shows a prototype implementation and experiment.
引用
收藏
页码:1101 / 1106
页数:6
相关论文
共 50 条
  • [41] An approach to programmable RDF-model transformations
    Babkin, E
    Sevastianov, A
    Shutov, A
    Zhdankin, A
    24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 150 - 157
  • [42] Task-based access control model and its implementation
    Hong, Fan
    Zhao, Xiaofei
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2002, 30 (01):
  • [43] A context-sensitive access control model and prototype implementation
    Cholewka, DG
    Botha, RA
    Eloff, JHP
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 341 - 350
  • [44] Research and Implementation of a Four-Dimensional Access Control Model
    Chen, YunQi
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 817 - 821
  • [45] Access Control Model Based on Role and Attribute and Its Implementation
    Qi, Hui
    Luo, Xiong
    Di, Xiaoqiang
    Li, Jinqing
    Yang, Huamin
    Jiang, Zhengang
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 66 - 71
  • [46] Fuzzy model-based control: A practical approach
    Setnes, M.
    Sousa, J.M.
    Computational Intelligence and Applications, 1999, : 261 - 266
  • [47] A Practical Tuning Approach for Multivariable Model Predictive Control
    Turki, Marwa
    Langlois, Nicolas
    Yassine, Adnan
    2017 13TH IEEE INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2017, : 1107 - 1112
  • [48] A Suggested Approach to Practical Unclamping of Model Predictive Control
    Olivier, Laurentz E.
    IFAC PAPERSONLINE, 2017, 50 (02): : 115 - 120
  • [49] The hybrid model for web services security Access control and information flow control
    Kedjar, Saadia
    Tari, Abdelkamel
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 194 - +
  • [50] Security arguments for blind signatures in random oracle model
    Hu, Xiaoming
    Huang, Shangteng
    Journal of Computational Information Systems, 2009, 5 (01): : 75 - 81