Abstract
The use of ontologies in the fields of information retrieval and semantic web is well-known. Since long time researcher are trying to find ontological representations of the diverse laws to have a mechanism to retrieve fine granular legal information about diverse legal cases. However, one of the common problems software systems are faced with in constitutional states is the adapting of the diverse privacy directives. This is a very complex task due to lacks in current software solutions – especially from the architectural point of view. In fact, we miss software solutions that manage privacy directives in a central instance in a structured manner. Even more, such a solution should provide a fine granular access control mechanism on the data entities to ensure that every aspect of the privacy directives can be reflected. Moreover, the whole system should be transparent, comprehensible, and modifiable at runtime. This paper provides a novel solution for this by means of ontologies. The usage of ontologies in our approach differs from the conventional form in focusing on generating access control policies which are adapted from our software framework to provide fine granular access on the diverse data sources.
An erratum to this chapter can be found at http://dx.doi.org/10.1007/11914853_71.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
European Parliament and Council. Official journal l 281, 31–51 (November 23, 1995)
Wettern, M., Von Knop, J.: Datenschutz im hochschulbereich. In: Jahrbuch der Heinrich-Heine-Universität Düsseldorf 2004, pp. 575–589 (2005)
Fischer-Hübner, S.: IT-Security and Privacy - Design and Use of Privacy-Enhancing Security Mechanisms. Ser. LNCS. Springer, Heidelberg (1958)
META Group, Privacy enhancing technologies, Danish Ministry of Science, Technology and Innovation, Tech. Rep. (2005)
Decentralized Information Group, Transparent accountable datamining initiative (2006) [Online] Available: http://dig.csail.mit.edu/TAMI/
Platform for privacy preferences (p3p) project [Online] Available: http://www.w3.org/P3P/
The Object Management Group (OMG), Resource access decision [Online] Available: http://www.omg.org/technology/documents/formal/resource_access_decision.htm
Eberling, W.: Resource access decision - ein framework zur realisierung eines datenbasierten zugriffsschutzes. MATHEMA Software GmbH, Tech. Rep. (2003)
Korba, L., Kenny, S.: Towards meeting the privacy challenge: Adapting drm. In: Digital Rights Management Workshop, pp. 118–136 (2002)
XrML, Xrml - the digital rights language for trusted content and services [Online] Available: http://www.xrml.org/
ODRL, ODRL - Open Digital Rights Language [Online] Available: http://odrl.net/
Kolovski, V., Parsia, B., Katz, Y., Hendler, J.: Representing web service policies in OWL-DL. In: Gil, Y., Motta, E., Benjamins, V.R., Musen, M.A. (eds.) ISWC 2005. LNCS, vol. 3729, pp. 461–475. Springer, Heidelberg (2005)
Breuker, J., Hoekstra, R.: Epistemology and ontology in core ontologies: FOLaw and LRI-Core, two core ontologies for law. In: Proceedings of EKAW Workshop on Core ontologies. CEUR (2004) [Online] Available: http://sunsite.informatik.rwth-aachen.de/Publications/CEUR-WS/
Lehmann, J., Breuker, J., Brouwer, B.: CAUSATIONT: Modeling causation in aI&Law. In: Benjamins, V.R., Casanovas, P., Breuker, J., Gangemi, A. (eds.) Law and the Semantic Web. LNCS, vol. 3369, pp. 77–96. Springer, Heidelberg (2005)
Breuker, J., Valente, A., Winkels, R.: Use and reuse of legal ontologies in knowledge engineering and information management. In: Benjamins, V.R., Casanovas, P., Breuker, J., Gangemi, A. (eds.) Law and the Semantic Web. LNCS, vol. 3369, pp. 36–64. Springer, Heidelberg (2005)
OASIS, eXtensible Access Control Markup Language (XACML) (February 2005), [Online] Available: http://www.oasis-open.org/committees
S. Microsystems, “Sun’s XACML Implementation,” 2006. [Online]. Available: http://sunxacml.sourceforge.net/
Verma, M.: XML Security: Control information access with XACML (2004) [Online] Available: http://www-128.ibm.com/developerworks/library/x-xacml/
Seitz, L., Rissanen, E., Sandholm, T., Firozabadi, B.S., Mulmo, O.: Policy administration control and delegation using xacml and delegent. In: 6th IEEE/ACM International Workshop on Grid Computing, Seattle, USA. IEEE Press, Los Alamitos (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abou-Tair, D.e.D.I., Berlik, S. (2006). An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE. OTM 2006. Lecture Notes in Computer Science, vol 4275. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11914853_63
Download citation
DOI: https://doi.org/10.1007/11914853_63
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48287-1
Online ISBN: 978-3-540-48289-5
eBook Packages: Computer ScienceComputer Science (R0)