期刊文献+

面向语义Web的基于语义和上下文的访问控制模型 被引量:1

Context-aware semantic-based access control model for semantic Web
下载PDF
导出
摘要 对语义Web上资源的访问需要授权决策充分考虑其中实体之间的语义关系和上下文因素,而传统的访问控制模型不能处理这些问题。结合基于本体的语义描述技术和基于SWRL规则的推理机制,并将不同的语义关系归纳为一种包含关系,提出了一种面向语义Web的基于语义和上下文的访问控制(CSBAC)模型,并讨论了其语义授权推理、授权传播及冲突解决和实现架构。 The access decision should take into account the semantic relationships among entities and contexts under this environment when accessing to resources on the semantic Web, but traditional access control models fail to do it. By combining Ontology-based semantic representation technology with SWRL rule-based reasoning mechanism, and reducing different semantic interrelations to the subsumption relation, a Context-aware Semantic-based Access Control (CSBAC) model for the semantic Web was presented, and its semantic authorization inference, authorization propagation and conflict resolution were discussed. In the end, a structure for implementing the CSBAC model was proposed.
作者 沈海波
出处 《计算机应用》 CSCD 北大核心 2009年第5期1289-1292,共4页 journal of Computer Applications
基金 湖北省自然科学基金资助项目(2005ABA243)
关键词 语义WEB 基于语义的访问控制 本体 上下文 semantic Web Semantic-Based Access Control (SBAC) Ontology context
  • 相关文献

参考文献11

  • 1BERNERS-LEE T, HANDER J, LASSILA O. The semantic Web [J]. Scientific American, 2001, 284(5): 34-43.
  • 2BONATTI P A, DUMA C, FUCHS N, et al. Semantic Web policies -a discussion of requirements and research issues [ C]// Proceedings of the European Semantic Web Conference: ESWC2006. Berlin: Springer-Verlag, 2006:712-724.
  • 3YAGUE M, MANA A, LOPEZ J. Applying the semantic Web layers to access control [ C]// Proceedings of 14th IEEE International Workshop on Database and Expert Systems Application. Washington, DC: IEEE Press, 2003:622-626.
  • 4QIN L, Atluri V. Concept-level access control for the semantic Web [ C]// Proceedings of the 2003 ACM Workshop on XML Security. New York: ACM Press, 2003:94-103.
  • 5JAVANMARDI S, AMINI A, JALINI R. An access control model for protecting semantic Web resources [ C] // Proceedings of the 2nd International Semantic Web Policy Workshop: SWPW06. Athens, GA, USA: [s.n.], 2006: 32-46.
  • 6JAVANMARDI S, AMINI A, JALILI R, et al. SBAC: A semanticbased access control model [ C]// Proceedings of the 11th Nordic Workshop on Secure IT-systems: NordSec2006. Linkping, Sweden: [s.n.], 2006: 157-168.
  • 7GOLBRE1CH C. Combining rule and Ontology reasoners for the semantic Web [ C]// Third International Workshop, Rules and Rule Markup Languages for the Semantic Web: RuleML 2004, LNCS 3323. Berlin: Springer-Verlag, 2004: 155- 169.
  • 8MAECHE A. Ontology learning for the semantic Web[ M]. Boston: Kluwer Academic Publishers, 2002.
  • 9SAMARATI P, de VIMECATI S C. Access control: Policies, models, and mechanisms [ C]// Foundations of Security Analysis and Design: FOSAD 2000. Berlin: Spfinger-Verlag, 2001:137-196.
  • 10PATEL-SCHNEIDER P F, HAYES P, HORROCKS I. OWL Web Ontology language semantics and abstract syntax[ DB/OL]. ( 2004 - 02 - 10) [2008 -09 -03]. http://www, w3. org/TR/owl-absyn/.

同被引文献9

  • 1Debao Xiao, Hui Xu. An Integration of ontology-based andpolicy-based network management for automation [ C ] // In-ternational Conference on Computational Intelligence forModelling, Control and Automation, 2006 and InternationalConference on Intelligent Agents, Web Technologies andInternet Commerce. 2006:27.
  • 2Uszok A,Bradshaw J M,Lott J,et al. New developmentsin ontology-based policy management : Increasing the prac-ticality and comprehensiveness of KAoS[ C]// IEEE Work-shop on Policies for Distributed Systems and Networks2008. 2008:145-152.
  • 3RFC 3084,COPS Usage for Policy Provisioning( COPS-PR)[S].
  • 4RFC 2748,The COPS (Common Open Policy Service) Pro-tocol [S].
  • 5Wang X H,Zhang D Q, Gu T,et al. Ontology based con-text modeling and reasoning using OWL [ C ] // Proceedingsof the Second IEEE Annual Conference on Pervasive Compu-ting and Communications Workshops, 2004. 2004; 18-22.
  • 6RFC 3060, Policy Core Information Model-Version 1 Speci-fication [ S].
  • 7Hui Xu, Debao Xiao. A common ontology-based intelligentconfiguration management model for IP network devices[C]//First International Conference on Innovative Compu-ting, Information and Control, 2006. 2006:385-388.
  • 8周捷.策略抽象模型及表示语言研究[D].南京:中国人民解放军理工大学,2012.
  • 9纪兆辉,李存华.基于SWRL和Jess构造语义Web规则及其对策分析[J].淮海工学院学报(自然科学版),2009,18(4):26-29. 被引量:7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部