2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2015
DOI: 10.1109/icacci.2015.7275915
|View full text |Cite
|
Sign up to set email alerts
|

Inter-domain role based access control using ontology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Ingeneral,fuzzyFCAandfuzzyontologyarethetwocommonknowledgerepresentationformalisms availabletodealwithuncertaintyinknowledgedomain.Oncomparingtherepresentationoffuzzy ontologywithfuzzyFCAintherepresentationofFRBAC (Mouliswaran,Kumar,&Chandrasekar, 2015),thedisadvantagesoffuzzyFCAareasfollows.…”
Section: Discussionmentioning
confidence: 99%
“…Ingeneral,fuzzyFCAandfuzzyontologyarethetwocommonknowledgerepresentationformalisms availabletodealwithuncertaintyinknowledgedomain.Oncomparingtherepresentationoffuzzy ontologywithfuzzyFCAintherepresentationofFRBAC (Mouliswaran,Kumar,&Chandrasekar, 2015),thedisadvantagesoffuzzyFCAareasfollows.…”
Section: Discussionmentioning
confidence: 99%
“…Standard access control models are widely used in inter-domain authorization, but they face a challenge of adopting them to the inter-domain constraints. Since cross-domain authorization requires to determine the role of the user requesting the remote access, the role mapping concept is proposed via creating a single-goal-role [29], mapping between hierarchical access control structures [19,30], or using the ontology [31,32]. The single-goal-role consists of finding the appropriate role for a local user allowing him to access the remote resources.…”
Section: Inter-domain Authorizationmentioning
confidence: 99%
“…Several ontologies [11]- [18] have been proposed that target access control and privacy, in general. Developers can reuse privacy and access control concepts from these ontologies, however they do not focus on consent towards accessing particular data, which is a key requirement in GDPR.…”
Section: Related Workmentioning
confidence: 99%
“…Each concept and property fulfills a set of metadata that includes rdfs:labels and rdfs:comments. We maintain the online accessibility 18 and the permanent URL of the ontology. The ontology web documentation is generated using WIDOCO [31].…”
Section: Best Practices Followed and Recommendations To Triple-store ...mentioning
confidence: 99%