IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Semantic Mapping for Access Control Model

Semantic Mapping for Access Control Model
View Sample PDF
Author(s): Yi Zhao (Lehrgebiet Informationstechnik, Germany)and Wolfgang A. Halang (Lehrgebiet Informationstechnik, Germany)
Copyright: 2011
Pages: 16
Source title: Innovations in SMEs and Conducting E-Business: Technologies, Trends and Solutions
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cavado and Ave, Portugal)and João Varajão (University of Trás-os-Montes e Alto Douro, Portugal)
DOI: 10.4018/978-1-60960-765-4.ch014

Purchase

View Semantic Mapping for Access Control Model on the publisher's website for pricing and purchasing information.

Abstract

With the increasing development of the Semantic Web technologies, the Semantic Web has been introduced to apply in the Web Services to integrate data across different applications. For the Semantic Web Services to succeed it is essential to maintain the security of the organizations involved. Security is a crucial concern for commercial and mission critical applications in Web-based environments. To guarantee the security of the Web Services, security measures must be considered to protect against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. Access control is a kind of security measurements to guarantee the service processes, which is defined to allow resource owners to define, manage, and enforce the access conditions for each resource. In this chapter, an attribute based access control model with semantic mapping (SABAC, for short) is proposed to specify access control over attributes defined in domain ontologies. The model is built on the basis of XACML policy language. Semantic mapping process is proved to be syntactical, semantic, and structural. Our SABAC model between the service requester and service provider can make the access to the Semantic Web Services secure.

Related Content

Rehmat Shah, Rana Yassir Hussain, Hira Irshad. © 2024. 21 pages.
Malik Waqar Ahmed, Haroon Hussain, Hammad Hassan Mirza, Ghulam Ali Bhatti. © 2024. 17 pages.
Burak Nedim Aktaş. © 2024. 23 pages.
Rani Jha, Sidharth Mishra, Avinash Sharma. © 2024. 15 pages.
Tugçe Şimşek, Ahmet Bahadır Şimşek. © 2024. 25 pages.
George Kassar. © 2024. 15 pages.
Andi Cudai Nur, Komal Khalid. © 2024. 19 pages.
Body Bottom