2011
DOI: 10.1007/978-3-642-22875-9_6
|View full text |Cite
|
Sign up to set email alerts
|

Access Control at Triple Level: Specification and Enforcement of a Simple RDF Model to Support Concurrent Applications in Smart Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…It provides basic operations to smart space (query, insert, remove, update, subscribe and unsubscribe) with the use of triple representation as an instance of the Triple class. In addition this class also provides methods to setup and remove triples protection [5]. This protection is used to restrict changing of agent description, its output and state triples by other dataflow network nodes.…”
Section: Framework Architecturementioning
confidence: 98%
“…It provides basic operations to smart space (query, insert, remove, update, subscribe and unsubscribe) with the use of triple representation as an instance of the Triple class. In addition this class also provides methods to setup and remove triples protection [5]. This protection is used to restrict changing of agent description, its output and state triples by other dataflow network nodes.…”
Section: Framework Architecturementioning
confidence: 98%
“…Since provenance data are typically stored in relational databases or RDF stores, one approach to access control is to leave the access control to the storage security mechanisms. Security for database technologies has been studied extensively in the past (see [50] for an overview) and the increasing need for maintaining semantic resources has developed a large set of works focused on security for RDF data [51,52,53].…”
Section: Securitymentioning
confidence: 99%
“…These approaches include approaches where access control is implemented as an additional layer on top of the repository, as in [42], and approaches where access-control information has also been integrated into repositories. In the triple-level access control [43], RDF resources are protected with access-restriction properties. Essentially, these properties are links to access policy graphs that specify the owner of the RDF resource as well as those predicates to which this protection applies.…”
Section: Access Control Over Semantic Informationmentioning
confidence: 99%