2016
DOI: 10.3233/sw-160236
|View full text |Cite
|
Sign up to set email alerts
|

Access control and the Resource Description Framework: A survey

Abstract: In recent years we have seen significant advances in the technology used to both publish and consume structured data using the existing web infrastructure, commonly referred to as the Linked Data Web. However, in order to support the next generation of e-business applications on top of Linked Data suitable forms of access control need to be put in place. This paper provides an overview of the various access control models, standards and policy languages, and the different access control enforcement strategies … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 46 publications
(26 citation statements)
references
References 76 publications
(272 reference statements)
0
25
0
1
Order By: Relevance
“…In existing literature, enforcing access control at the level of single statements or tuples is generally referred to as fine-grained access control (cf. [23]). Then, we presented two indexing strategies (implemented using MapDB) to enhance query performance, the main scalability bottleneck when it comes to serving user requests.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In existing literature, enforcing access control at the level of single statements or tuples is generally referred to as fine-grained access control (cf. [23]). Then, we presented two indexing strategies (implemented using MapDB) to enhance query performance, the main scalability bottleneck when it comes to serving user requests.…”
Section: Resultsmentioning
confidence: 99%
“…Kirrane et al [23] provide a comprehensive survey of existing access control proposals for RDF. Unlike access control, encryption techniques for RDF has received very little attention to date.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Other systems such as SOCS-SI use a logic programming framework with a deontic interpretation . Outside of MAS, norm-related concepts such as access control policies in computer security are sometimes defined using semantic web languages like description logic or resource description framework, see Kirrane et al (2017).…”
Section: External Monitorsmentioning
confidence: 99%
“…An alternative approach to anonymization for protecting against privacy breaches consists in applying access control methods to Linked Data ( [16,19,11]). In the Semantic Web setting, when data are described by description logics ontologies, preliminary results on role-based access control have been obtained in [1] for the problem of checking whether a sequence of role changes and queries can infer that an anonymous individual is equal to a known individual.…”
Section: Related Workmentioning
confidence: 99%