Ontology-Based Access Rights Management



In this paper we propose an approach to manage access rights in a content management systems which relies on semantic web models and technologies. We present the AMO ontology which consists (1) in a set of classes and properties dedicated to the annotation of resources whose access should be controlled and (2) in a base of inference rules modeling the access management strategy to carry out. When applied to the annotations of the resources whose access should be controlled, these rules enable to manage access according to a given strategy. This modelisation is flexible, extendable and ensures the adaptability of the AMO ontology to any access management strategy. We illustrate the use of AMO on the documents of a collaborative website managed by the semantic wiki SweetWiki in the ANR ISICIL project. We show how to annotate documents with AMO, we explain which AMO inference rules can be applied and which semantic queries finally enable to control access to SweetWiki documents.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Buffa, M., Gandon, F., Erétéo, G., Sander, P., Faron, C.: Sweetwiki: A semantic wiki. Journal of Web Semantics 6(1), 84–97 (2008)CrossRefGoogle Scholar
  2. 2.
    Corby, O., Dieng-Kuntz, R., Faron-Zucker, C.: Querying the semantic web with corese search engine. In: 16th Eureopean Conference on Artificial Intelligence, ECAI 2004, pp. 705–709. IOS Press (2004)Google Scholar
  3. 3.
    Corby, O., Dieng-Kuntz, R., Faron-Zucker, C., Gandon, F.: Searching the Semantic Web: Approximate Query Processing Based on Ontologies. IEEE Intelligent Systems 21(1), 20–27 (2006)CrossRefGoogle Scholar
  4. 4.
    Alam, A., Subbiah, G., Thuraisingham, B., Khan, L.: Reasoning with Semantics-aware Access Control Policies for Geospatial Web Services. In: 3rd ACM Workshop On Secure Web Services (SWS 2006), pp. 69–76 (2006)Google Scholar
  5. 5.
    Hollenbach, J., Presbrey, J., Berners-Lee, T.: Using RDF Metadata to Enable Access Control on Social Semantic Web. In: ISWC 2009. LNCS. Springer, Heidelberg (2009)Google Scholar
  6. 6.
    Coyle, K.: Rights Management and Digital Library Requirements. Ariadne 40 (2004)Google Scholar
  7. 7.
    Lagoze, C., Payette, S., Shin, E., Wilper, C.: Fedora: an Architecture for Complex Objects and their Relationships. Int. J. on Digital Libraries 6(2), 124–138 (2006)CrossRefGoogle Scholar
  8. 8.
    Kruk, S.R., Cygan, M., Gzella, A.: JeromeDL - Semantic and Social Technologies for Improving User Experience in Digital Libraries. In: World Wide Web Conference (WWW 2008). ACM (2008)Google Scholar
  9. 9.
    Kruk, S.R.: Extensible Access Control (EAC) Ontology Specification, DERI (2008), http://www.jeromedl.org/eac/1.0/spec/index.html/
  10. 10.
    Nasirifard, P., Peristeras, V., Hayes, C., Decker, S.: Extracting and Utilizing Social Networks from Log Files of Shared Workspaces. In: Camarinha-Matos, L.M., Paraskakis, I., Afsarmanesh, H. (eds.) PRO-VE 2009. IFIP Advances in Information and Communication Technology, vol. 307, pp. 643–650. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  11. 11.
    Story, H., Harbulot, B., Jacobi, I., Jones, M.: FOAF+SSL: RESTful Authentication for the Social Web. In: ESWC Workshop Trust and Privacy on the Social and Semantic Web, SPOT (2009)Google Scholar
  12. 12.
    Erétéo, G., Buffa, M., Gandon, F., Corby, O.: Analysis of a Real Online Social Network Using Semantic Web Frameworks. In: Bernstein, A., Karger, D.R., Heath, T., Feigenbaum, L., Maynard, D., Motta, E., Thirunarayan, K. (eds.) ISWC 2009. LNCS, vol. 5823, pp. 180–195. Springer, Heidelberg (2009)CrossRefGoogle Scholar

Copyright information

© Springer Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.I3S, Université de Nice Sophia Antipolis, CNRSSophia Antipolis cedexFrance

Personalised recommendations