Citation Link: https://nbn-resolving.org/urn:nbn:de:hbz:467-5789
A two-level approach to ontology-based access control in pervasive personal servers
Source Type
Article
Subjects
Authentication
(RBAC) Authorisation
Ontology-Based Access Control
Ontology Trust and Privacy Modeling
Spring Security
DDC
004 Informatik
GHBS-Clases
Issue Date
2011
Abstract
A new trend in pervasive personal server hosting is to enable
the integration of a user's social spheres. Ideally, the design of access
control to private data should be flexible and independent from the target
host. Personal data should also remain independent from environmental
constraints, e.g., in order to support easy migration to new deployment
landscapes. Such information interoperability can be achieved by
ontology-based personal information sphere management. In the digital.me
project, personal data is modelled using an ontology-based approach. In
this paper we address the design and first implementation of the
digital.me userware access control engine. Here, we introduce a two-level
access control design in order to decouple the ontology based-semantic
core from the hosting web container, while ensuring that personal data and
the associated ontology-based access rights remain flexibly decoupled from
the underlying environment.
the integration of a user's social spheres. Ideally, the design of access
control to private data should be flexible and independent from the target
host. Personal data should also remain independent from environmental
constraints, e.g., in order to support easy migration to new deployment
landscapes. Such information interoperability can be achieved by
ontology-based personal information sphere management. In the digital.me
project, personal data is modelled using an ontology-based approach. In
this paper we address the design and first implementation of the
digital.me userware access control engine. Here, we introduce a two-level
access control design in order to decouple the ontology based-semantic
core from the hosting web container, while ensuring that personal data and
the associated ontology-based access rights remain flexibly decoupled from
the underlying environment.
File(s)![Thumbnail Image]()
Loading...
Name
two_level_approach_to_ontology_based_access_control.pdf
Size
829.09 KB
Format
Adobe PDF
Checksum
(MD5):38a11564254a3d315e2354b8186dd4ac
Owning collection