2009
DOI: 10.1587/transinf.e92.d.41
|View full text |Cite
|
Sign up to set email alerts
|

RDFacl: A Secure Access Control Model Based on RDF Triple

Abstract: An expectation for more intelligent Web is recently being reflected through the new research field called Semantic Web. In this paper, related with Semantic Web security, we introduce an RDF triple based access control model having explicit authorization propagation by inheritance and implicit authorization propagation by inference. Especially, we explain an authorization conflict problem between the explicit and the implicit authorization propagation, which is an important concept in access control for Semant… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
8
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 9 publications
1
8
0
Order By: Relevance
“…The RDF access control framework [17], RDF Security based Framework [18], access control model for securing RDF triples [19] etc., are existing RDF access control methodologies. In any case, the above existing RDF data management procedures don't deal with a lot of data since all the current works are actualized in Jena which isn't productive to scale the colossal measure of data.…”
Section: Introductionmentioning
confidence: 99%
“…The RDF access control framework [17], RDF Security based Framework [18], access control model for securing RDF triples [19] etc., are existing RDF access control methodologies. In any case, the above existing RDF data management procedures don't deal with a lot of data since all the current works are actualized in Jena which isn't productive to scale the colossal measure of data.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, related to the problem of securely accessing RDF data, several studies on RDF access control have been conducted [1]- [7]. Among these, the studies presented in [3] and [6] dealt with an authorization conflict problem caused by RDF inference, and explained the problem at a more fine-grained level of the RDF triple. The authorization conflict problem caused by RDF inference can be illustrated by the following simple example.…”
Section: Introductionmentioning
confidence: 99%
“…Suppose that a user is forbidden to access an RDF triple [s 1 , p 1 1 ]. In our former study [6], we addressed the authorization conflict problem that arises particularly from subsumption inference, which is the key inference in RDF, and suggested an efficient au- thorization conflict detection method that uses graph labeling techniques [8].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations