Browse > Article

Efficient Authorization Conflict Detection Using Prime Number Graph Labeling in RDF Access Control  

Kim, Jae-Hoon (서강대학교 컴퓨터학과)
Park, Seog (서강대학교 컴퓨터학과)
Abstract
RDF and OWL are the primary base technologies for implementing Semantic Web. Recently, many researches related with them, or applying them into the other application domains, have been introduced. However, relatively little work has been done for securing the RDF and OWL data. In this article, we briefly introduce an RDF triple based model for specifying RDF access authorization related with RDF security. Next, to efficiently find the authorization conflict by RDF inference, we introduce a method using prime number graph labeling in detail. The problem of authorization conflict by RDF inference is that although the lower concept is permitted to be accessed, it can be inaccessible due to the disapproval for the upper concept. Because by the RDF inference, the lower concept can be interpreted into the upper concept. Some experimental results show that the proposed method using the prime number graph labeling has better performance than the existing simple method for the detection of the authorization conflict.
Keywords
RDF; Access Control; Authorization Conflict; Graph Labeling; Prime Number;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Semantic Web, W3C, http://www.w3.org/2001/sw
2 OWL Web Ontology Language Overview, W3C Recommendation, http://www.w3.org/TR/owl-features/
3 S. Kaushik, D. Wijesekera, P. Ammann, "Policy- based dissemination of partial web-ontologies," Proc. of the 2005 workshop on Secure web services, pp. 43-52, Nov. 2005
4 E. Damiani, S. D. C. Vimercati, S. Paraboschi, P. Samarati, "A fine-grained access control system for XML documents," ACM Transactions on Information and System Security, 5(2), pp. 169-202, 2002   DOI
5 R. Agrawal, A. Borgida, and H. V. Jagadish, "Efficient management of transitive relationships in large data and knowledge bases," In Proc. of the SIGMOD Inter. Conf. on Management of Data, pp. 253-262, 1989
6 Q. Li and B. Moon, "Indexing and querying XML data for regular path expressions," In Proc. of 27th Inter. Conf. on Very Large Data Bases(VLDB'02), pp. 361-370, 2001
7 Online Computer Library Center. Dewey decimal classification. http://www.oclc.org/dewey
8 RDF Semantics, W3C Recommendation, http://www. w3.org/TR/rdf-mt/
9 P. Reddivari, T. Finin, A. Joshi, "Policy-Based Access Control for an RDF Store," Proc. of the Policy Management for the Web Workshop, pp. 78-83, May. 2005
10 E. Bertino, S. Castano, E. Ferrari, M. Mesiti, "Specifying and enforcing access control policies for XML document sources," World Wide Web Journal, 3(3), pp. 139-151, 2000   DOI   ScienceOn
11 G. Wu, K. Zhang, C. Liu, J. Li, "Adapting Prime Number Labeling Scheme for Directed Acyclic Graphs," DASFAA 2006, pp. 787-796, April 2006
12 RDF Primer, W3C Recommendation, http://www.w3.org/ TR/rdf-primer/
13 E. Bertino, E. Ferrari, "Secure and selective dissemination of XML documents," ACM Transactions on Information and System Security, 5(3), pp. 290-331, 2002   DOI
14 L. Qin, V. Atluri, "Concept-level Access Control for the Semantic Web," Proc. of ACM Workshop on XML Security 2003, pp. 94-103, Oct. 2003
15 S. Javanmardi, M. Amini, R. Jalili, "An Access Control Model for Protecting Semantic Web Resources," Proc. of the 2nd International Semantic Web Policy Workshop(SWPW'06), Nov. 2006
16 A. Jain, C. Farkas, "Secure resource description framework: an access control model," Proc. of 11th ACM Symposium on Access Control Models and Technologies, pp. 121-129, June 2006
17 V. Christophides, G. Karvounarakis, D. Plexousakis, M. Scholl, S. Tourtounis, "Optimizing taxonomic semantic web queries using labeling schemes," Journal of Web Semantics, 11(1), pp. 207-228, Nov. 2003