2016
DOI: 10.17485/ijst/2016/v9i23/95148
|View full text |Cite
|
Sign up to set email alerts
|

Ontology Centric Access Control Mechanism for Enabling Data Protection in Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…To overcome this issue, Auxilia and Raja proposed a Semantic-Based Access Control model (Auxilia and Raja, 2016;. The SBAC model includes three modules: The Ontology Base, which is a collection of ontologies (Subject Ontology, Object Ontology, and Action Ontology), designed with an OWL ontology language, Authorization Base which is a collection of authorization rules made with SWRL language and operations that are executed on Authorization Base to grant or revoke access to objects.…”
Section: Related Workmentioning
confidence: 99%
“…To overcome this issue, Auxilia and Raja proposed a Semantic-Based Access Control model (Auxilia and Raja, 2016;. The SBAC model includes three modules: The Ontology Base, which is a collection of ontologies (Subject Ontology, Object Ontology, and Action Ontology), designed with an OWL ontology language, Authorization Base which is a collection of authorization rules made with SWRL language and operations that are executed on Authorization Base to grant or revoke access to objects.…”
Section: Related Workmentioning
confidence: 99%
“…Generality: Starting with the creation of ontologies, we have chosen the domain of knowledge as banking [29]. Subject ontology is created in terms of credentials which are universally accepted for user authentication.…”
Section: Experimental Analysismentioning
confidence: 99%
“…By using knowledge base and language tools to replace the pre-defined sensitive words set, they propose an automatically method to assess the degree of sensitiveness. Auxilia et al [57] put forward an ontology centric access control (OCAC) framework, which defines user, resource and action ontology, and calculate the similarity of access request on behalf of these ontology. This framework can avoid policy collision effectively and enable users to manage their policies.…”
Section: Researches On Multi-clouds Access Controlmentioning
confidence: 99%