Description of Temporal Constraints Using Semantic Web in Role-Based Access Control

被引:0
|
作者
Tanihira, Kazushi
Sakamoto, Yusuke
Kobayashi, Hiromi
机构
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a description of an access control list (ACL) used to conduct role-based access control (RBAC), with particular emphasis oil temporal constraints using extensible markup language (XML) and Web ontology language (OWL). It is natural to use OWL for describing ACL because OWL is based oil set theory. Set theory is useful in this case because RBAC maps privileges naturally to users from the viewpoint of users' functions. Comparison of XML and OWL in terms of their use as all ACL is described. A teaching management model is used to illustrate examples of these implementations.
引用
收藏
页码:186 / 195
页数:10
相关论文
共 50 条
  • [41] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [42] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [43] Study of Role-based Access Control
    Cao Yonghui
    [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [44] Migrating to role-based access control
    Brooks, K
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [45] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [46] The conflict detection between permission assignment constraints in role-based access control
    Moon, CJ
    Paik, W
    Kim, YG
    Kwon, JH
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 265 - 278
  • [47] RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control
    Wang, Man
    Mayo, Jean
    Shene, Ching-Kuang
    Lake, Thomas
    Carr, Steve
    Wang, Chaoli
    [J]. ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2015, : 141 - 146
  • [48] Automated reverse engineering of role-based access control policies of web applications
    Ha Thanh Le
    Shar, Lwin Khin
    Bianculli, Domenico
    Briand, Lionel Claude
    Nguyen, Cu Duy
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 184
  • [49] Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
    Sohr, Karsten
    Mustafa, Tanveer
    Bao, Xinyu
    Ahn, Gail-Joon
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 257 - +
  • [50] A context-aware role-based access control model for Web services
    Shen, HB
    Hong, F
    [J]. ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 220 - 223