Using OWL and SWRL to represent and reason with situation-based access control policies

D Beimel, M Peleg - Data & Knowledge Engineering, 2011 - Elsevier
Access control is a central problem in confidentiality management, in particular in the
healthcare domain, where many stakeholders require access to patients' health records …

Supporting attribute-based access control in authentication and authorization infrastructures with ontologies

T Priebe, W Dobmeier, C Schläger… - Journal of software …, 2007 - epub.uni-regensburg.de
In highly open systems like the Internet, attributebased access control (ABAC) has proven its
appropriateness. This is reflected in the utilization of ABAC in authentication and …

[图书][B] Big data analytics with applications in insider threat detection

B Thuraisingham, P Parveen, MM Masud, L Khan - 2017 - taylorfrancis.com
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is
more intelligent, learning and adapting to new computer defenses on the fly. Using the same …

A semantic-aware attribute-based access control model for web services

H Shen - Algorithms and Architectures for Parallel Processing …, 2009 - Springer
Web service is a new service-oriented computing paradigm which poses the unique security
challenges due to its inherent heterogeneity, multi-domain characteristic and highly dynamic …

Performances of cryptographic accumulators

A Kumar, P Lafourcade… - 39th Annual IEEE …, 2014 - ieeexplore.ieee.org
Cryptographic accumulators are space/time efficient data structures used to verify if a value
belongs to a set. They have found many applications in networking and distributed systems …

Semantics-enriched QoS policies for web service interactions

DZG Garcia, MBF de Toledo - … of the 12th Brazilian Symposium on …, 2006 - dl.acm.org
Web service technology provides an infrastructure for developing distributed systems and
performing electronic business operations within and across organizational boundaries. It is …

[PDF][PDF] Semantics-based Access Control Approach for Web Service.

Z He, L Wu, H Li, H Lai, Z Hong - J. Comput., 2011 - Citeseer
Due to the open and distributed characteristics of web service, its access control becomes a
challenging problem which has not been addressed properly. In this paper, we show how …

[图书][B] Secure data provenance and inference control with semantic web

B Thuraisingham, T Cadenhead, M Kantarcioglu… - 2014 - books.google.com
With an ever-increasing amount of information on the web, it is critical to understand the
pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the …

Ontology-based security policies for supporting the management of web service business processes

DZG Garcia, MBF de Toledo - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
Typically, in areas such as e-business and e-government, among others, Web services are
used as basic components for building business processes. Participants in a business …

A semantic-and attribute-based framework for web services access control

HB Shen - 2010 2nd International Workshop on Intelligent …, 2010 - ieeexplore.ieee.org
Web services over the Internet are widely used nowadays. Controlling access in Web
services environment is crucial and a significant challenge because this environment is …