ACCESS CONTROL FOR SHARED ONTOLOGIES
نویسندگان
چکیده
منابع مشابه
Access Control for Ontologies
Conjunctive query answering plays an important role in industrial applications of ontologies such as the integration of heterogeneous information sources and the management of information resources and services. If confidential information is included in such settings, the ability to enforce access control policies is a critical security requirement. In presence of logical inferences, however, ...
متن کاملQuery-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies representing knowledge, deciding what can be told to a user without revealing secrets is more difficult as the user might be able to infer secret knowledge using logical reasoning. In this paper, we present two approa...
متن کاملAccess Control for Shared Remote Laboratories
Remote experiments can be shared and exchanged among educational institutions in the form of reusable learning objects. The paper discusses different solutions for authentication and authorization needs when “Lab Learning Objects” are used through the Learning Management System of an institution to run a remote experiment based on physical resources (rigs) provided by an external experiment pro...
متن کاملA Model-driven Approach to enable Access Control for Ontologies
Industrial applications of semantic technologies in particular ontologies include the integration of heterogeneous information sources and the management of information resources and services. Currently, the adoption of these technologies in large-scaled applications within enterprises is slowed down by their failure to meet some basic requirements of commercial applications. One of those is th...
متن کاملDynamic Access Control for Shared Objects in Groupware Applications
This paper discusses one type of security policy that very often occurs in secure group activities. That is the notion of 'backing'. The concept captures the idea of splitting responsibility between more than one principal with the result that it takes the corruption and collusion of more than one principal before malicious damage can occur. This security concept is common outside the realm of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electronic Commerce Studies
سال: 2013
ISSN: 2073-9729
DOI: 10.7903/ijecs.1039