Social Semantic Network-Based Access Control

Social networks are the bases of the so-called Web 2.0, raising many new challenges to the research community. In particular, the ability of these networks to allow the users to share their own personal information with other people opens new issues concerning privacy and access control. Nowadays the Web has further evolved into the Social Semantic Web where social networks are integrated and enhanced by the use of semantic conceptual models, e.g., the ontologies, where the social information and links among the users become semantic information and links. In this chapter, we discuss which are the benefits of introducing semantics in social network-based access control. In particular, we analyze and detail two approaches to manage the access rights of the social network users relying on Semantic Web languages only, and we highlight, thanks to these two proposals, what are pros and cons of introducing semantics in social networks access control. Finally, we report on the other existing approaches coupling semantics and access control in the context of social networks.

[1]  Hannes Mühleisen,et al.  SWRL-based Access Policies for Linked Data , 2010 .

[2]  James A. Hendler,et al.  Analyzing the AIR Language: A Semantic Web (Production) Rule Language , 2010, RR.

[3]  Lalana Kagal,et al.  A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments , 2006, SEMWEB.

[4]  karen coyle,et al.  Rights Management and Digital Library Requirements , 2004 .

[5]  Nora Cuppens-Boulahia,et al.  High Level Conflict Management Strategies in Advanced Access Control Models , 2007, ICS@SYNASC.

[6]  Alexandre Passant,et al.  A Privacy Preference Ontology (PPO) for Linked Data , 2011, LDOW.

[7]  Carlo Curino,et al.  A data-oriented survey of context models , 2007, SGMD.

[8]  Serena Villata,et al.  Ubiquitous access control for SPARQL endpoints: lessons learned and future challenges , 2012, WWW.

[9]  John G. Breslin,et al.  Social Semantic Web , 2009, Handbook of Semantic Web Technologies.

[10]  Joe Presbrey,et al.  Using RDF Metadata To Enable Access Control on the Social Semantic Web , 2009 .

[11]  Catherine Faron-Zucker,et al.  Querying the Semantic Web with Corese Search Engine , 2004, ECAI.

[12]  Fausto Giunchiglia,et al.  Ontology Driven Community Access Control , 2008, SPOT@ESWC.

[13]  Bhavani M. Thuraisingham,et al.  Semantic web-based social network access control , 2011, Comput. Secur..

[14]  Antonio Corradi,et al.  Context-based access control management in ubiquitous environments , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[15]  Catherine Faron-Zucker,et al.  SweetWiki: A semantic wiki , 2008, J. Web Semant..

[16]  Antonio Corradi,et al.  A Quality of Context-Aware Approach to Access Control in Pervasive Environments , 2009, MOBILWARE.

[17]  Manoj R. Sastry,et al.  A Contextual Attribute-Based Access Control Model , 2006, OTM Workshops.

[18]  Bhavani M. Thuraisingham,et al.  Reasoning with semantics-aware access control policies for geospatial web services , 2006, SWS '06.

[19]  Sandra Payette,et al.  Fedora: an architecture for complex objects and their relationships , 2005, International Journal on Digital Libraries.

[20]  Gregory D. Abowd,et al.  Securing context-aware applications using environment roles , 2001, SACMAT '01.

[21]  Catherine Faron-Zucker,et al.  Ontology-Based Access Rights Management , 2010, EGC.

[22]  Lalana Kagal,et al.  Proteus: A Semantic Context-Aware Adaptive Policy Model , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).

[23]  Henry Story,et al.  FOAF + TLS : RESTful Authentication for Distributed Social Networks ? , 2009 .

[24]  Jeremy J. Carroll,et al.  Named graphs , 2005, J. Web Semant..

[25]  Serena Villata,et al.  An Access Control Model for Linked Data , 2011, OTM Workshops.

[26]  Luca Costabello,et al.  DC Proposal: PRISSMA, Towards Mobile Adaptive Presentation of the Web of Data , 2011, SEMWEB.

[27]  Elisa Bertino,et al.  Location-Aware Authentication and Access Control Concepts and Issues , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[28]  Catherine Faron-Zucker,et al.  Searching the semantic Web: approximate query processing based on ontologies , 2006, IEEE Intelligent Systems.

[29]  Serena Villata,et al.  Social Semantic Web Access Control , 2011, SDoW@ISWC.

[30]  Catherine Faron-Zucker,et al.  The KGRAM Abstract Machine for Knowledge Graph Querying , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[31]  Jani Mäntyjärvi,et al.  An Ontology for Mobile Device Sensor-Based Context Awareness , 2003, CONTEXT.

[32]  Anand R. Tripathi,et al.  Context-aware role-based access control in pervasive computing systems , 2008, SACMAT '08.

[33]  Nora Cuppens-Boulahia,et al.  Modeling contextual security policies , 2008, International Journal of Information Security.

[34]  Alfons H. Salden,et al.  Context sensitive access control , 2005, SACMAT '05.

[35]  Yu Cheng,et al.  A Semantic Context-Based Model for Mobile Web Services Access Control , 2011 .

[36]  Vassilios Peristeras,et al.  Extracting and Utilizing Social Networks from Log Files of Shared Workspaces , 2009, PRO-VE.

[37]  Grigoris Antoniou,et al.  Controlling Access to RDF Graphs , 2010, FIS.

[38]  Bhavani M. Thuraisingham,et al.  ROWLBAC: representing role based access control in OWL , 2008, SACMAT '08.

[39]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[40]  Alexandre Passant,et al.  A Privacy Preference Manager for the Social Semantic Web , 2011, SPIM.

[41]  Nicola Henze,et al.  Enabling Advanced and Context-Dependent Access Control in RDF Stores , 2007, ISWC/ASWC.

[42]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.