Access Control, Triggers and Versioning over SPARQL Endpoint

  • Sergey Gorshkov
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 468)


Industrial use of RDF triple stores is facing lack of supplementary functionality such as fine-grained access control, changes approval, triggers and versioning. We have faced industrial use case in which this functionality is essential. The solution is the transparent proxy middleware implemented over SPARQL endpoint. It allows usage of the standard application interface, not requiring any changes in third-party software working with the triple store. It provides all the required functionality by using metadata stored outside of the model, leaving triple store content intact. The general middleware algorithm and some particular workaround are described. Performance slowdown factor is reduced by implementing internal caching for frequently used queries.


Access control SPARQL endpoint RDF triple store triggers versioning collaborative authoring 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Costabello, L., Villata, S., Gandon, F.: Context-Aware Access Control for RDF Graph Stores. In: 20th European Conference on Artificial Intelligence (2012)Google Scholar
  2. 2.
  3. 3.
    Kamateri, E., Kalampokis, E., Tambouris, E., Tarabanis, K.: The Linked Data Access Control Framework. Journal of Biomedical Informatics. Special Issue on Informatics Methods in Medical Privacy (2014)Google Scholar
  4. 4.
    Reddivari, P., Finin, T., Joshi, A.: Policy-Based Access Control for an RDF Store. In: Proceedings of the Policy Management for the Web Workshop, A WWW 2005 Workshop (2005)Google Scholar
  5. 5.
    Abel, F., De Coi, J.L., Henze, N., Koesling, A.W., Krause, D., Olmedilla, D.: Enabling Advanced and Context-Dependent Access Control in RDF Stores. In: Aberer, K., et al. (eds.) ISWC/ASWC 2007. LNCS, vol. 4825, pp. 1–14. Springer, Heidelberg (2007)Google Scholar
  6. 6.
    Sacco, O., Passant, A., Decker, S.: An Access Control Framework for the Web of Data. In: International Joint Conference of IEEE TrustCom 2011/IEEE ICESS 2011/FCST 2011 (2011)Google Scholar
  7. 7.
    Flouris, G., Fundulaki, I., Michou, M., Antoniou, G.: Controlling Access to RDF Graphs. In: Proceedings of the Third Future Internet Conference on Future Internet, Berlin, Germany, pp. 107–117 (2010)Google Scholar
  8. 8.
    Hollenbach, J., Presbrey, J., Berners-Lee, T.: Using RDF Metadata to Enable Access Control on the Social Semantic Web. In: Workshop on Collaborative Construction, Management and Linking of Structured Knowledge (2009)Google Scholar
  9. 9.
    Costabello, L., Villata, S., Delaforge, N., Gandon, F.: Ubiquitous Access Control for SPARQL Endpoints: Lessons Learned and Future Challenges. In: Proceedings of the 21st International Conference Companion on World Wide Web, Lyon, France (2012)Google Scholar
  10. 10.
    Ognyanov, D., Kiryakov, A.: Tracking Changes in RDF(S) Repositories. In: Gómez-Pérez, A., Benjamins, V.R. (eds.) EKAW 2002. LNCS (LNAI), vol. 2473, pp. 373–378. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Auer, S., Herre, H.: A Versioning and Evolution Framework for RDF Knowledge Bases. In: Proceedings of the 6th International Andrei Ershov Memorial Conference on Perspectives of Systems Informatics, Novosibirsk, Russia (2006)Google Scholar
  12. 12.
    Noy, N., Musen, M.: Ontology Versioning in an Ontology Management Framework. IEEE Intelligent Systems 19(4), 6–13 (2004)CrossRefGoogle Scholar
  13. 13.
    Sangers, J., Hogenboom, F., Frasincar, F.: Event-Driven Ontology Updating. In: Wang, X.S., Cruz, I., Delis, A., Huang, G. (eds.) WISE 2012. LNCS, vol. 7651, pp. 44–57. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  14. 14.
    Le, W., Duan, S., Kementsietsidis, A., Li, F., Wang, M.: Rewriting Queries on SPARQL Views. In: Proceedings of the 20th International Conference on World Wide Web, Hyderabad, India (2011)Google Scholar
  15. 15.
    Kirrane, S., Mileo, A., Decker, S.: Applying DAC Principles to the RDF Graph Data Model. In: 28th IFIP TC-11 SEC International Information Security and Privacy Conference (2013)Google Scholar
  16. 16.
    Kirrane, S., Abdelrahman, A., Mileo, A., Decker, S.: Secure Manipulation of Linked Data. In: Alani, H., et al. (eds.) ISWC 2013, Part I. LNCS, vol. 8218, pp. 248–263. Springer, Heidelberg (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Sergey Gorshkov
    • 1
  1. 1.TriniDataEkaterinburgRussia

Personalised recommendations