T Berners-Lee, D Connolly, L Kagal… - Theory and Practice of …, 2008 - cambridge.org
The Semantic Web drives toward the use of the Web for interacting with logically interconnected data. Through knowledge models such as Resource Description Framework …
Pervasive computing is by its nature open and extensible, and must integrate the information from a diverse range of sources. This leads to a problem of information exchange, so sub …
Privacy policies are intended to inform users about the collection and use of their data by websites, mobile apps and other services or appliances they interact with. This also includes …
In recent years we have seen significant advances in the technology used to both publish and consume structured data using the existing web infrastructure, commonly referred to as …
Attribute-based access control (ABAC) uses the attributes of the involved entities (ie, subject, object, action, and environment) to provide access control. Despite various advantages …
Abstract We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with …
R Ferrini, E Bertino - Proceedings of the 14th ACM symposium on …, 2009 - dl.acm.org
XACML does not natively support RBAC and even the pecialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty …
While photo sharing sites such as Flickr provide efficient tools for setting up an online album, users who want to maintain a certain level of privacy are usually only provided with …
T Vitvar, J Kopecky, M Zaremba… - … Conference on Web …, 2007 - ieeexplore.ieee.org
The current Web service technology brought a new potential to the Web of services. However, the success of Web services still depends on resolving three fundamental …