2011
DOI: 10.1007/978-3-642-27245-5_33
|View full text |Cite
|
Sign up to set email alerts
|

Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library Ontology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
1
1
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Different research efforts on ontology-based systems and secured access to ontology structure for DL have already been reported partially in (Adam et al, 2002;Ray and Chakraborty, 2006;Dasgupta and Bagchi, 2011, 2012a, 2012b. This section provides the comprehensive model for security policy specification that covers the authorization of different users for accessing different concepts.…”
Section: Access Control Policies and Operational Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Different research efforts on ontology-based systems and secured access to ontology structure for DL have already been reported partially in (Adam et al, 2002;Ray and Chakraborty, 2006;Dasgupta and Bagchi, 2011, 2012a, 2012b. This section provides the comprehensive model for security policy specification that covers the authorization of different users for accessing different concepts.…”
Section: Access Control Policies and Operational Issuesmentioning
confidence: 99%
“…The research group involved in this paper has made some study on these problems in connection with controlled access to a DL (Dasgupta and Bagchi, 2011, 2012a, 2012b. The model proposed in this paper accepts the presence of multiple parents in the concept hierarchy of DL ontology.…”
Section: Introductionmentioning
confidence: 99%
“…In other words, a user getting access to a concept may not get access to all the documents covered by that concept, particularly in a situation when a concept has multiple parent concepts. This gives rise to a flexible access control system for a DL environment hitherto unexplored [4]. This earlier work considered some implementation issues related to such access control environment.…”
Section: Introductionmentioning
confidence: 99%