ACCESS CONTROL FOR SHARED ONTOLOGIES

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access Control for Ontologies

Conjunctive query answering plays an important role in industrial applications of ontologies such as the integration of heterogeneous information sources and the management of information resources and services. If confidential information is included in such settings, the ability to enforce access control policies is a critical security requirement. In presence of logical inferences, however, ...

متن کامل

Query-Based Access Control for Ontologies

Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies representing knowledge, deciding what can be told to a user without revealing secrets is more difficult as the user might be able to infer secret knowledge using logical reasoning. In this paper, we present two approa...

متن کامل

Access Control for Shared Remote Laboratories

Remote experiments can be shared and exchanged among educational institutions in the form of reusable learning objects. The paper discusses different solutions for authentication and authorization needs when “Lab Learning Objects” are used through the Learning Management System of an institution to run a remote experiment based on physical resources (rigs) provided by an external experiment pro...

متن کامل

A Model-driven Approach to enable Access Control for Ontologies

Industrial applications of semantic technologies in particular ontologies include the integration of heterogeneous information sources and the management of information resources and services. Currently, the adoption of these technologies in large-scaled applications within enterprises is slowed down by their failure to meet some basic requirements of commercial applications. One of those is th...

متن کامل

Dynamic Access Control for Shared Objects in Groupware Applications

This paper discusses one type of security policy that very often occurs in secure group activities. That is the notion of 'backing'. The concept captures the idea of splitting responsibility between more than one principal with the result that it takes the corruption and collusion of more than one principal before malicious damage can occur. This security concept is common outside the realm of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electronic Commerce Studies

سال: 2013

ISSN: 2073-9729

DOI: 10.7903/ijecs.1039