DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement

The explosion of digital content and the heterogeneity of enterprise content sources have resulted in a pressing need for advanced tools and technologies, to support enterprise content search and analysis. Semantic technology and linked data may be the long term solution to this growing problem. Our research explores the application of access control to a knowledge discovery platform. In order to ensure integrated information is only accessible to authorised individuals, existing access control policies need to be associated with the data. Through in-depth analysis we aim to propose an access control model and enforcement framework which can be used to represent and enforce various access models both inside and outside the enterprise. Furthermore, through experimentation we plan to develop a methodology which can be used as a guideline for the lifting of distributed access control policies from the individual data sources to a linked data network.

[1]  S. Javanmardi,et al.  SBAC : “ A Semantic – Based Access Control Model ” , 2006 .

[2]  François Bry,et al.  Semantic Techniques for the Web, The REWERSE Perspective , 2009, REWERSE.

[3]  Ravi S. Sandhu,et al.  Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management , 1997, DBSec.

[4]  José M. Troya,et al.  Applying the semantic Web layers to access control , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[5]  Robert Neches,et al.  Access Control Policies for Semantic Networks , 2009, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks.

[6]  Timothy W. Finin,et al.  A policy language for a pervasive computing environment , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[7]  Jeffrey M. Bradshaw,et al.  KAoS: toward an industrial-strength open agent architecture , 1997 .

[8]  LouAnna Notargiacomo,et al.  Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[9]  Li Qin,et al.  Concept-level access control for the Semantic Web , 2003, XMLSEC '03.

[10]  Ravi S. Sandhu,et al.  Role-based access control: a multi-dimensional view , 1994, Tenth Annual Computer Security Applications Conference.

[11]  James A. Hendler,et al.  Analyzing web access control policies , 2007, WWW '07.

[12]  Morteza Amini,et al.  Multi-level authorisation model and framework for distributed semantic-aware environments , 2010, IET Inf. Secur..

[13]  Piero A. Bonatti,et al.  Rule-Based Policy Representations and Reasoning , 2009, REWERSE.

[14]  P. Checkland,et al.  Action Research: Its Nature and Validity , 1998 .

[15]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .