Access Control at Triple Level: Specification and Enforcement of a Simple RDF Model to Support Concurrent Applications in Smart Environments

  • Alfredo D’Elia
  • Jukka Honkola
  • Daniele Manzaroli
  • Tullio Salmon Cinotti
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6869)

Abstract

Smart environments support service innovation and in emerging approaches the information space involved is shared and accessible through simple primitives. Semantic web technologies play a crucial role in smart environments information representation, as they provide definitions allowing for interoperability at information level. The consistent interplay of multiple agents that concurrently access the knowledge base of an interoperable smart environment requires synchronization means like in traditional concurrent programming. This paper is focused on access control to synchronize concurrent access to shared resources of an RDF store in a multi-agent system. An RDF data model to semantically describe access rights at triple level is defined, an implementation to enforce this semantics on the RDF store is described and its performance are evaluated. Additional access control primitives can be implemented to support more complex behaviors.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lee, T.B., Hendler, J., Lassila, O.: The semantic web. Scientific American (2001)Google Scholar
  2. 2.
    Context Broker Architecture, http://cobra.umbc.edu/
  3. 3.
    Smith, D., Ma, L., Ryan, N.: Acoustic environment as an indicator of social and physical context. Personal and Ubiquitous Computing 10, 241–254 (2006)CrossRefGoogle Scholar
  4. 4.
    Ryan, N.: Smart environments for cultural heritage. In: Takao, U.N.O. (ed.) Takao UNO, Reading Historical Spatial Information From Around the World: Studies of Culture and Civilization Based on Geographic Information Systems Data, International Research Center for Japanese Studies, Kyoto (2005)Google Scholar
  5. 5.
    Luukkala, V., Binnema, D., Börzsei, M., Corongiu, A., Hyttinen, P.: Experiences in Implementing a Cross-Domain Use Case by Combining Semantic and Service Level Platforms. In: Proceedings of 1st Workshop on Semantic Interoperability in Smart Spaces (2010)Google Scholar
  6. 6.
    Savolainen, P., Niemelä, E., Savola, R.: A Taxonomy of Information Security for Service-Centric Systems. In: 33rd EUROMICRO Conference on Software Engineering and Advanced Applications, pp. 5–12 (2007)Google Scholar
  7. 7.
    Lampson, B.W.: Protection. In: Proc. Princeton Symposium on Information Sciences and Systems, pp. 437–443. Princeton University, Princeton (1971); reprinted in: Operating Systems Review 8(1), 18–24 (1974) Google Scholar
  8. 8.
    Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Mathematical Founda-tions and Model. National Technical Information Service (Spring 1973)Google Scholar
  9. 9.
    Sandhu, R.: Lattice-based access control models. IEEE Computer 26(11), 9–19 (1993)CrossRefGoogle Scholar
  10. 10.
    Dijkstra, E.W.: Solution of a problem in concurrent programming control. Communications of the ACM 8(9) (1965)Google Scholar
  11. 11.
    Dijkstra, E.W.: Co-operating sequential processes. In: Genuys, F. (ed.) Programming Languages, pp. 43–112 (1968)Google Scholar
  12. 12.
    Dietzold, S., Auer, S.: Access control on RDF triple stores from a semantic wiki perspective. In: Scripting for the Semantic Web Workshop at 3rd European Semantic Web Conference, ESWC (2006)Google Scholar
  13. 13.
    Manjunath, G., Sayers, C., Reynolds, D., Venugopal, K.S., Mohalik, S.K., Badrinath, R., Recker, J.L., Mesarina, M.: Semantic Views for Controlled Access to the Semantic Web. In: HP Technical Reports, Laboratories HPL (2008)Google Scholar
  14. 14.
    Suomalainen, J., Hyttinen, P., Tarvainen, P.: Secure information sharing between heterogeneous embedded devices. In: Proceedings of the Fourth European Conference on Software Architecture: Companion, ECSA (2010)Google Scholar
  15. 15.
    Montanari, R., Toninelli, A., Bradshaw, J.M.: Context-based security management for multi-agent systems. In: Proc. of the 2nd IEEE Sym. on Multi-Agent Security and Survivability (MAS&S 2005), pp. 75–84 (2005)Google Scholar
  16. 16.
    Toninelli, A., Kagal, L., Bradshaw, J.M., Montanari, R.: Rule-based and ontology-based policies: toward a hybrid approach to control agents in pervasive environments. In: Proc. of the Semantic Web and Policy Workshop (SWPW), in Conj. with ISWC 2005, Galway, Ireland (2005)Google Scholar
  17. 17.
    Jain, A., Farkas, C.: Secure resource description framework: An access control model. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies (SACMAT 2006), pp. 121–129 (2006)Google Scholar
  18. 18.
    Honkola, J., Laine, H., Brown, R., Oliver, I.: Cross-Domain Interoperability: A Case Study. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2009. LNCS, vol. 5764, pp. 22–31. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  19. 19.
    SOFIA project – Smart Objects for Intelligent Applications, http://www.sofia-project.eu
  20. 20.
  21. 21.
    Smart-M3 Open Source Project, http://sourceforge.net/projects/smart-m3
  22. 22.
    Honkola, J., Laine, H., Brown, R., Tyrkkö, O.: Smart-M3 Information Sharing Platform. In: Proceedings of 1st Workshop on Semantic Interoperability in Smart Spaces (2010)Google Scholar
  23. 23.
    Reddivari, P., Finin, T., Joshi, A.: Policy based Access Control for a RDF Store. In: Proceedings of the Policy Management for the Web Workshop, A WWW 2005 Workshop, W3C, pp. 78–83 (May 2005)Google Scholar
  24. 24.
    Lassila, O.: Programming Semantic Web Applications: A Synthesis of Knowledge Representation and Semi-Structured Data. Doctoral dissertation (October 2007) ISBN 978-951-22-8985-1Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Alfredo D’Elia
    • 1
  • Jukka Honkola
    • 2
  • Daniele Manzaroli
    • 1
  • Tullio Salmon Cinotti
    • 1
  1. 1.Arces, University of BolognaBolognaItaly
  2. 2.Innorange OyHelsinkiFinland

Personalised recommendations