Proceedings ArticleDOI
Inter-domain role based access control using ontology
S. Chandra Mouliswaran,Ch. Aswani Kumar,C. Chandrasekar +2 more
- pp 2027-2032
TLDR
This paper proposes a procedure to transform the access permission matrix of multiple domain environments into inter-domain access control ontology and shows that it is possible to formalize ontology for access permission of inter- domain security policy without any conflicts in terms ofinter-domain roles, services and domains in multipledomain environments.Abstract:
There are several access control models available for multiple domain environments. Applying role based access control for inter-domain services of multiple domain environment meet the challenges such as mapping of inter-domain role hierarchy, separation of duty constraints on role conflict, service conflict and location conflict. In the recent times, ontology based access control is introduced for various domain of interest. The main purpose of this paper is representing inter-domain access permissions of multiple domain environments using ontology which is the formal and explicit representation of a domain of interest through their concepts and their associations. To attain this objective, we propose a procedure to transform the access permission matrix of multiple domain environments into inter-domain access control ontology. The implementation shows that it is possible to formalize ontology for access permission of inter-domain security policy without any conflicts in terms of inter-domain roles, services and domains in multiple domain environments.read more
Citations
More filters
Journal ArticleDOI
4W1H in IoT Semantics
TL;DR: This paper studies and categorizes the existing ontologies based on the fundamental ontological concepts required for annotating different aspects of data collection and data access in an IoT application and identifies the 4Ws (What, When, Who, Where, Where) and 1H (How) identified using the 4W1H methodology.
Journal ArticleDOI
Role based access control design using three-way formal concept analysis
TL;DR: Three-way formal concept analysis (3WCA) is presented on how 3WCA can provide suitable representation ofRBAC policy and whether this representation follows role hierarchy and constraints of RBAC.
Proceedings ArticleDOI
A multi-domain role activation model
TL;DR: This paper evaluated the proposal by implementing a prototype to provide support for SRA, based on RESTful web services and standardized specifications such as XACML and OpenID Connect, with SRA showing better results when compared to traditional role activation.
Journal ArticleDOI
A Recommendation Method Based on Semantic Similarity and Complementarity Using Weighted Taxonomy: A Case on Construction Materials Dataset
Karamollah Bagherifard,Karamollah Bagherifard,Mohsen Rahmani,Vahid Rafe,Mehrbakhsh Nilashi,Mehrbakhsh Nilashi +5 more
TL;DR: This study provides a new approach based on ontology, data mining, and automatic discovering algorithms for the relationships with different degrees for the edges among the concepts, which is effective for construction materials recommendation.
Journal ArticleDOI
Role based access control design using triadic concept analysis
TL;DR: This work proposes a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts and presents how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.
References
More filters
Journal ArticleDOI
Role-based access control models
TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Journal ArticleDOI
TRBAC: A temporal role-based access control model
TL;DR: Temporal-RBAC (TRBAC), an extension of the RBAC model, is introduced, which supports periodic role enabling and disabling, and temporal dependencies among such actions, expressed by means of role triggers.
Proceedings ArticleDOI
TRBAC: a temporal role-based access control model
TL;DR: Temporal-RBAC (TRBAC), an extensions of the RBAC model, supports both periodic activations and deactivations of roles, and temporal dependencies among such actions, expressed by means of role triggers.
Proceedings ArticleDOI
ROWLBAC: representing role based access control in OWL
Tim Finin,Anupam Joshi,Lalana Kagal,Jianwei Niu,Ravi Sandhu,William H. Winsborough,Bhavani Thuraisingham +6 more
TL;DR: Two different ways to support the NIST Standard RBAC model in OWL are shown and how the OWL constructions can be extended to model attribute-based RBAC or more generally attribute- based access control are discussed.
Journal ArticleDOI
Secure interoperation in a multidomain environment employing RBAC policies
TL;DR: This paper proposes a policy integration framework for merging heterogeneous role-based access control policies of multiple domains into a global access control policy, and proposes an integer programming (IP)-based approach for optimal resolution of conflicts.
Related Papers (5)
Ontology-based access control model for security policy reasoning in cloud computing
Chang Choi,Junho Choi,Pankoo Kim +2 more
A semantic-based access control for ensuring data security in cloud computing
M. Auxilia,K. Raja +1 more