Description of Temporal Constraints Using Semantic Web in Role-Based Access Control

被引:0
|
作者
Tanihira, Kazushi
Sakamoto, Yusuke
Kobayashi, Hiromi
机构
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a description of an access control list (ACL) used to conduct role-based access control (RBAC), with particular emphasis oil temporal constraints using extensible markup language (XML) and Web ontology language (OWL). It is natural to use OWL for describing ACL because OWL is based oil set theory. Set theory is useful in this case because RBAC maps privileges naturally to users from the viewpoint of users' functions. Comparison of XML and OWL in terms of their use as all ACL is described. A teaching management model is used to illustrate examples of these implementations.
引用
收藏
页码:186 / 195
页数:10
相关论文
共 50 条
  • [1] Modeling of the role-based access control policy with constraints using description logic
    Chae, Junghwa
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 500 - 511
  • [2] Role-based access control on the web using LDAP
    Park, JS
    Ahn, GJ
    Sandhu, R
    [J]. DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 19 - 30
  • [3] Role-based access control on the web using Java']Java™
    Giuri, L
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 11 - 18
  • [4] Mining constraints in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Wang, Wei
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 87 - 96
  • [5] The implementation of role-based access control on the web
    Xu, CG
    Yan, H
    Liu, FG
    [J]. 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
  • [6] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [7] Role-based access control system for web services
    Feng, X
    Guoyuan, L
    Hao, H
    Li, X
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 357 - 362
  • [8] An extended role-based access control for Web services
    Zhu, Yi-qun
    Li, Jian-hua
    Zhang, Quan-hai
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 471 - +
  • [9] Application of Role-Based Access Control for Web Environment
    Robles, Rosslin John
    Choi, Min-Kyu
    Yeo, Sang-Soo
    Kim, Tai-hoon
    [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 171 - +
  • [10] Securing the Web of Things with Role-Based Access Control
    Barka, Ezedine
    Mathew, Sujith Samuel
    Atif, Yacine
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 14 - 26