scispace - formally typeset
Proceedings ArticleDOI

Inter-domain role based access control using ontology

TLDR
This paper proposes a procedure to transform the access permission matrix of multiple domain environments into inter-domain access control ontology and shows that it is possible to formalize ontology for access permission of inter- domain security policy without any conflicts in terms ofinter-domain roles, services and domains in multipledomain environments.
Abstract
There are several access control models available for multiple domain environments. Applying role based access control for inter-domain services of multiple domain environment meet the challenges such as mapping of inter-domain role hierarchy, separation of duty constraints on role conflict, service conflict and location conflict. In the recent times, ontology based access control is introduced for various domain of interest. The main purpose of this paper is representing inter-domain access permissions of multiple domain environments using ontology which is the formal and explicit representation of a domain of interest through their concepts and their associations. To attain this objective, we propose a procedure to transform the access permission matrix of multiple domain environments into inter-domain access control ontology. The implementation shows that it is possible to formalize ontology for access permission of inter-domain security policy without any conflicts in terms of inter-domain roles, services and domains in multiple domain environments.

read more

Citations
More filters
Journal ArticleDOI

4W1H in IoT Semantics

TL;DR: This paper studies and categorizes the existing ontologies based on the fundamental ontological concepts required for annotating different aspects of data collection and data access in an IoT application and identifies the 4Ws (What, When, Who, Where, Where) and 1H (How) identified using the 4W1H methodology.
Journal ArticleDOI

Role based access control design using three-way formal concept analysis

TL;DR: Three-way formal concept analysis (3WCA) is presented on how 3WCA can provide suitable representation ofRBAC policy and whether this representation follows role hierarchy and constraints of RBAC.
Proceedings ArticleDOI

A multi-domain role activation model

TL;DR: This paper evaluated the proposal by implementing a prototype to provide support for SRA, based on RESTful web services and standardized specifications such as XACML and OpenID Connect, with SRA showing better results when compared to traditional role activation.
Journal ArticleDOI

A Recommendation Method Based on Semantic Similarity and Complementarity Using Weighted Taxonomy: A Case on Construction Materials Dataset

TL;DR: This study provides a new approach based on ontology, data mining, and automatic discovering algorithms for the relationships with different degrees for the edges among the concepts, which is effective for construction materials recommendation.
Journal ArticleDOI

Role based access control design using triadic concept analysis

TL;DR: This work proposes a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts and presents how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.
References
More filters
Journal ArticleDOI

Role-based access control models

TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Journal ArticleDOI

TRBAC: A temporal role-based access control model

TL;DR: Temporal-RBAC (TRBAC), an extension of the RBAC model, is introduced, which supports periodic role enabling and disabling, and temporal dependencies among such actions, expressed by means of role triggers.
Proceedings ArticleDOI

TRBAC: a temporal role-based access control model

TL;DR: Temporal-RBAC (TRBAC), an extensions of the RBAC model, supports both periodic activations and deactivations of roles, and temporal dependencies among such actions, expressed by means of role triggers.
Proceedings ArticleDOI

ROWLBAC: representing role based access control in OWL

TL;DR: Two different ways to support the NIST Standard RBAC model in OWL are shown and how the OWL constructions can be extended to model attribute-based RBAC or more generally attribute- based access control are discussed.
Journal ArticleDOI

Secure interoperation in a multidomain environment employing RBAC policies

TL;DR: This paper proposes a policy integration framework for merging heterogeneous role-based access control policies of multiple domains into a global access control policy, and proposes an integer programming (IP)-based approach for optimal resolution of conflicts.
Related Papers (5)