期刊文献+

基于RIF的链接数据访问控制机制研究

RIF-based access control mechanism for linked data
下载PDF
导出
摘要 随着Web上数据量的不断增加,利用RDF组织数据并形成链接数据已经成为一种有效的应用方式。目前,链接数据的访问控制仍然没有形成规范,极大地阻碍了人们对链接数据的发布。传统的数据访问控制技术不能满足链接数据的开放环境要求,需要寻求新的控制模式以对链接数据进行有效保护。RIF是W3C推出的规则交换语言,适合于链接数据环境下的规则描述;基于属性的访问控制模型将是网络访问控制的一种趋势,将RIF与基于属性的访问控制结合起来是链接数据的访问控制的有益尝试。通过对链接数据的特点分析,给出了RIF+ABAC访问控制的定义,描述了关键的控制算法。实验表明,基于RIF+ABAC的访问控制机制非常适合链接数据的应用环境。 With the constant increment of the data on the Web, it is an effective application to organize the data with RDF and result in the Linked Data. Presently, the access control of Linked Data has not get a normalization, which has prevented the publication of the Linked Data. As the traditional methods are incompetent in the open circumstance of the social semantic web, there is a requirement for the access control model to protect the Linked Data. R/F, a W3C recommendation, can be applied in the Linked Data, and the attribute-based access control will be a trend of social network access control. Combining both will be a beneficial attempt for access control of Linked Data. By analyzing the characteristics of Linked Data, this paper gives the definition of the RIF+ABAC and describes the key algorithm of the control model. The experiment implements the R/F+ABAC control model is suitable for the Linked Data.
作者 陈磊
出处 《阜阳师范学院学报(自然科学版)》 2017年第2期69-73,共5页 Journal of Fuyang Normal University(Natural Science)
基金 安徽高校自然科学重点研究项目(KJ2016A664)资助
关键词 访问控制 链接数据 RIF 基于属性的访问控制 access control linked data RIF ABAC
  • 相关文献

参考文献2

二级参考文献69

  • 1李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 2WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 3M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 4V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.
  • 5E Yuan,J Tong.Attributed based access control (ABAC) for web services[A].Proceedings of the IEEE International Conference on Web Services[C].Washington:IEEE Computer Society,2005.561-569.
  • 6C Ye,Z Wu,Y Fu.An attribute-based delegation model and its extension[J].Journal of Research and Practice in Information Technology,2006,38 (1):3-17.
  • 7J Michael,R Manoj.A contextual attribute-based access control model[A].Proceedings of 2006 Workshops on the Move to Meaningful Internet Systems[C].Berlin:Springer,2006.1996-2006.
  • 8J Park,R Sandhu.The UCONABC usage control model[J].ACM Transactions on Information and System Security,2004,7(1):128-174.
  • 9D Q Zou,L G He,H Jin,et al.CRBAC:imposing multigrained constraints on the RBAC model in the multi-application environment[J].Journal of Network and Computer Applications,2009,32(2):402-411.
  • 10R Yang,C Lin,F Feng.A time and mutable attribute-based access control model[J].Journal of Computers,2009,4(6):510-518.

共引文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部