The mediator authorization-security model for heterogeneous semantic knowledge bases

Many organizations often need to share semantic knowledge base content with selected members of other organizations. However, sharing semantic knowledge across different organizations is a critical problem. This is because the differences in the vocabulary utilized by the organizations have to be resolved before knowledge can be shared. Also, if semantic repositories are syntactically and schematically heterogeneous, information interoperation becomes a vital challenge. When a system needs to allow unknown entities to access its resources, mechanisms should be in place in order to provide a secure and trusted information-sharing environment and enable users to interact and share information easily and perfectly. To address these challenges, the Mediator Authorization-Security model is proposed to provide secure interoperation among heterogeneous semantic repositories. This paper addresses the issue of interoperability and how to incorporate trust into semantic interoperability. The evaluation showed that, despite the complexity of the mediator system, it still provides acceptable performance.

[1]  Heiner Stuckenschmidt,et al.  A Formal Investigation of Mapping Language for Terminological Knowledge , 2005, IJCAI.

[2]  Vijayalakshmi Atluri,et al.  Privacy-preserving semantic interoperation and access control of heterogeneous databases , 2006, ASIACCS '06.

[3]  Jian Li,et al.  Query Rewriting for Access Control on Semantic Web , 2008, Secure Data Management.

[4]  Peng Liu,et al.  Semantic access control for information interoperation , 2006, SACMAT '06.

[5]  Li Gong,et al.  Computational Issues in Secure Interoperation , 1996, IEEE Trans. Software Eng..

[6]  Michael Uschold,et al.  Representation of Semantic Mappings , 2005, Semantic Interoperability and Integration.

[7]  Heiner Stuckenschmidt,et al.  A Model-driven Approach to enable Access Control for Ontologies , 2009, Wirtschaftsinformatik.

[8]  Li Qin,et al.  Concept-level access control for the Semantic Web , 2003, XMLSEC '03.

[9]  Pedro M. Domingos,et al.  Learning to map between ontologies on the semantic web , 2002, WWW '02.

[10]  Timothy W. Finin,et al.  A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.

[11]  Li Gong,et al.  The complexity and composability of secure interoperation , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[12]  Xiang Zhang,et al.  OREL: an ontology-based rights expression language , 2004, WWW Alt. '04.

[13]  Duminda Wijesekera,et al.  Policy-based dissemination of partial web-ontologies , 2005, SWS '05.

[14]  Weiru Liu,et al.  A Concept Hierarchy Based Ontology Mapping Approach , 2010, KSEM.

[15]  Uzay Kaymak,et al.  tOWL : A Temporal Web Ontology Language , 2011 .

[16]  J. Williams,et al.  Investigation Organizer: the development and testing of a Web-based tool to support mishap investigations , 2005, 2005 IEEE Aerospace Conference.

[17]  James A. Hendler,et al.  The semantic Web and its languages , 2000 .

[18]  Bhavani M. Thuraisingham,et al.  ROWLBAC: representing role based access control in OWL , 2008, SACMAT '08.

[19]  Heiner Stuckenschmidt,et al.  Query-Based Access Control for Ontologies , 2010, RR.

[20]  Anni-Yasmin Turhan Description logic reasoning for semantic web ontologies , 2011, WIMS '11.

[21]  Grigoris Antoniou,et al.  Access control for RDF graphs using abstract models , 2012, SACMAT '12.

[22]  James A. Thom,et al.  Authorization Control for a Semantic Data Repository through an Inference Policy Engine , 2013, IEEE Transactions on Dependable and Secure Computing.