Skip to main content

Extending Context Descriptions in Semantics-Aware Access Control

  • Conference paper
Information Systems Security (ICISS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4332))

Included in the following conference series:

Abstract

Security is a crucial concern for commercial and mission critical applications in Web-based environments. In our model, context information associated with Access Control management policies is defined according to basic operators that can be represented using the Web Ontology Language. Standard inference procedures of Description Logics are being used to check the consistency of context information referred to by policy conditions and, more interestingly, to pre-process context information for grounding policy propagation and enabling conflict resolution. In this paper, we extend the model to encompass part-of relations between entities in context descriptions and, consequently, revise the policy propagation criteria being applied to the model to take into account the newly introduced relations. Finally, we exemplify modality conflicts arising from part-of relations, a category of extensional conflicts (i.e., inconsistencies related to individuals) that cannot be foreseen by looking at the terminology underlying context information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The Common Logic Standard (CL), http://cl.tamu.edu/

  2. Jena: A Semantic Web Framework for Java, http://jena.sourceforge.net/

  3. Mereology, Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/archives/spr2004/entries/mereology/

  4. OMG Ontology Definition Metamodel (ODM), http://www.omg.org/docs/ad/03-08-01.pdf

  5. OMG Unified Modeling Language (UML), version 2.0, http://www.omg.org/technology/documents/formal/uml.htm

  6. Pellet OWL reasoner, http://www.mindswap.org/2003/pellet

  7. W3C Resource Description Framework (RDF). W3C Specifications, http://www.w3.org/RDF

  8. W3C Web Ontology Language (OWL). W3C Specifications, http://www.w3.org/2004/OWL

  9. XHTML 1.0 The Extensible Hypertext Markup Language, http://www.w3.org/TR/xhtml1/

  10. XML Path Language (XPath) 1.0, http://www.w3.org/TR/xpath

  11. XML Topic Maps (XTM), http://www.topicmaps.org/xtm/

  12. Ardagna, C.A., Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Offline Expansion of XACML Policies Based on P3P Metadata. In: Lowe, D.G., Gaedke, M. (eds.) ICWE 2005. LNCS, vol. 3579, pp. 363–374. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F.: The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, Cambridge (2003)

    MATH  Google Scholar 

  14. Bertino, E., Jajodia, S., Samarati, P.: Access control in object-oriented database systems - some approaches and issues. In: Advanced Database Systems, London, UK, pp. 17–44. Springer, Heidelberg (1993)

    Google Scholar 

  15. Brockmans, S., Volz, R., Eberhart, A., Löffler, P.: Visual Modeling of OWL DL Ontologies Using UML. In: McIlraith, S.A., Plexousakis, D., van Harmelen, F. (eds.) ISWC 2004. LNCS, vol. 3298, pp. 198–213. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Cook, S., Kleppe, A., Mitchell, R., Rumpe, B., Warmer, J., Wills, A.C.: The amsterdam manifesto on OCL. In: Clark, A., Warmer, J. (eds.) Object Modeling with the OCL. LNCS, vol. 2263, pp. 115–149. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  17. d’Amato, C., Fanizzi, N., Esposito, F.: A semantic similarity measure for expressive Description Logics. In: Pettorossi, A. (ed.) Proceedings of Convegno Italiano di Logica Computazionale (CILC 2005), June 21-22, 2005, Rome, IT (2005)

    Google Scholar 

  18. Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Modality Conflicts in Semantics-Aware Access Control. In: Sixth International Conference on Web Engineering (ICWE 2006), Palo Alto, CA, USA, July 11-14, 2006. ACM Press, New York (2006)

    Google Scholar 

  19. Davis, J.P., Bonnell, R.D.: A Taxonomy of Propositional Logic Constraint Patterns for the Unified Modeling Language, http://www.cse.sc.edu/~jimdavis/Research/Papers-PDF/TKDE-paper-040113.pdf

  20. Falkovych, K., Sabou, M., Stuckenschmidt, H.: UML for the Semantic Web: Transformation-Based Approaches. In: Omelayenko, B., Klein, M. (eds.) Knowledge Transformation for the Semantic Web, pp. 92–106. IOS Press, Amsterdam (2003)

    Google Scholar 

  21. Horrocks, I., Patel-Schneider, P.: Reducing OWL entailment to description logic satisfiability. Journal of Web Semantics 1(4), 345–357 (2004)

    Google Scholar 

  22. Kothari, C.R., Russomanno, D.J.: Modeling Logic-Based Constraints in OWL. In: IASTED International Conference on Databases and Applications, part of the 22nd Multi-Conference on Applied Informatics, Innsbruck, Austria, February 17-19 (2004), http://engronline.ee.memphis.edu/objectoriented/411-160.pdf

  23. Leacock, C., Chodorow, M.: Combining local context and WordNet similarity for word sense identification. In: Fellbaum, C. (ed.) WordNet, An Electronic Lexical Database, pp. 265–283. MIT Press, Cambridge (1998)

    Google Scholar 

  24. Lin, D.: An information-theoretic definition of similarity. In: Proc. 15th International Conf. on Machine Learning, Madison, WI, USA, July 24-27, pp. 296–304. Morgan Kaufmann, San Francisco (1998)

    Google Scholar 

  25. Lupu, E.C., Sloman, M.S.: Conflict Analysis for Management Policies. In: Proceedings of the 5th IFIP/IEEE International Symposium on Integrated Network management IM 1997, San Diego, CA, USA (1997)

    Google Scholar 

  26. Resnik, P.: Using Information Content to Evaluate Semantic Similarity in a Taxonomy. In: International Joint Conference on Artificial Intelligence (IJCAI), August 20-25, Montréal, Québec, CA, pp. 448–453 (1995)

    Google Scholar 

  27. Resnik, P.: Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language. Journal of Artificial Intelligence Research 11, 95–130 (1999)

    MATH  Google Scholar 

  28. Sandhu, R.: Rationale for the RBAC96 family of access control models. In: RBAC 1995: Proceedings of the first ACM Workshop on Role-based access control, pp. 9–17. ACM Press, New York (1996)

    Chapter  Google Scholar 

  29. Storey, V.C.: Understanding semantic relationships. The VLDB Journal 2(4), 455–488 (1993)

    Article  Google Scholar 

  30. Veres, C.: Aggregation in Ontologies: Practical Implementations in OWL. In: Lowe, D.G., Gaedke, M. (eds.) ICWE 2005. LNCS, vol. 3579, pp. 285–295. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  31. Wu, Z., Palmer, M.: Verb semantics and lexical selection. In: 32nd. Annual Meeting of the Association for Computational Linguistics, New Mexico State University, Las Cruces, New Mexico, pp. 133–138 (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P. (2006). Extending Context Descriptions in Semantics-Aware Access Control. In: Bagchi, A., Atluri, V. (eds) Information Systems Security. ICISS 2006. Lecture Notes in Computer Science, vol 4332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11961635_11

Download citation

  • DOI: https://doi.org/10.1007/11961635_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68962-1

  • Online ISBN: 978-3-540-68963-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics