Ontology Based Access Control

被引:0
|
作者
Can, Ozgu [1 ]
Unalir, Murat Osman [1 ]
机构
[1] Ege Univ, Muhendislik Fak, Bilgisayar Muhendisligi Bolumu, TR-35100 Izmir, Turkey
来源
PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI | 2010年 / 16卷 / 02期
关键词
Access Control; Semantic web; Ontology; Policy;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As computer technologies become pervasive, the need for access control mechanisms grow. The purpose of an access control is to limit the operations that a computer system user can perform. Thus, access control ensures to prevent an activity which can lead to a security breach. For the success of Semantic Web, that allows machines to share and reuse the information by using formal semantics for machines to communicate with other machines, access control mechanisms are needed. Access control mechanism indicates certain constraints which must be achieved by the user before performing an operation to provide a secure Semantic Web. In this work, unlike traditional access control mechanisms, an "Ontology Based Access Control" mechanism has been developed by using Semantic Web based policies. In this mechanism, ontologies are used to model the access control knowledge and domain knowledge is used to create policy ontologies.
引用
收藏
页码:197 / 206
页数:10
相关论文
共 50 条
  • [31] Knowledge sharing in virtual enterprises via an ontology-based access control approach
    Chen, Tsung-Yi
    COMPUTERS IN INDUSTRY, 2008, 59 (05) : 502 - 519
  • [32] Comparative Analysis of Ontology Based Data Access Control and Security Enhancement in Healthcare Application
    Renuka, Suthan
    Guruprakash, Chirathally Dyamanna
    OPTOELECTRONICS INSTRUMENTATION AND DATA PROCESSING, 2024, 60 (02) : 297 - 307
  • [33] Ontology-based access control model for security policy reasoning in cloud computing
    Choi, Chang
    Choi, Junho
    Kim, Pankoo
    JOURNAL OF SUPERCOMPUTING, 2014, 67 (03): : 711 - 722
  • [34] Ontology-based access control model for security policy reasoning in cloud computing
    Chang Choi
    Junho Choi
    Pankoo Kim
    The Journal of Supercomputing, 2014, 67 : 711 - 722
  • [35] An Ontology-Based Approach to Context-Aware Access Control for Software Services
    Kayes, A. S. M.
    Han, Jun
    Colman, Alan
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2013, PT I, 2013, 8180 : 410 - 420
  • [36] Graphical Interface for Ontology Mapping with Application to Access Control
    Drozdowicz, Michal
    Alwazir, Motasem
    Ganzha, Maria
    Paprzycki, Marcin
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2017, PT I, 2017, 10191 : 46 - 55
  • [37] Knowledge Sharing Model in Collaborative Product Design Based on Role-based Access Control and Ontology
    Xu Heng
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 331 - 335
  • [38] Ontology-Based Data Access Systems
    Kogalovsky, M. R.
    PROGRAMMING AND COMPUTER SOFTWARE, 2012, 38 (04) : 167 - 182
  • [39] Ontology Based Access to Exploration Data at Statoil
    Kharlamov, Evgeny
    Hovland, Dag
    Jimenez-Ruiz, Ernesto
    lanti, DaviDe
    Lie, Hallstein
    Pinkel, Christoph
    Rezk, Martin
    Skjaeveland, Martin G.
    Thorstensen, Evgenij
    Xiao, Guohui
    Zheleznyakov, Dmitriy
    Horrocks, Ian
    SEMANTIC WEB - ISWC 2015, PT II, 2015, 9367 : 93 - 112
  • [40] Ontology-Based Data Access: A Survey
    Xiao, Guohui
    Calvanese, Diego
    Kontchakov, Roman
    Lembo, Domenico
    Poggi, Antonella
    Rosati, Riccardo
    Zakharyaschev, Michael
    PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2018, : 5511 - 5519