Applying DAC Principles to the RDF Graph Data Model

Abstract : In this paper we examine how Discretionary Access Control principles, that have been successfully applied to relational and XML data, can be applied to the Resource Description Framework (RDF) graph data model. The objective being to provide a baseline for the specification of a general authorisation framework for the RDF data model. Towards this end we provide a summary of access control requirements for graph data structures, based on the different characteristics of graph models compared to relational and tree data models. We subsequently focus on the RDF data model and identify a list of access rights based on SPARQL query operations; propose a layered approach to authorisation derivation based on the graph structure and RDFSchema; and demonstrate how SQL GRANT and REVOKE commands can be adapted to cater for delegation of privileges in SPARQL.
Document type :
Conference papers
Lech J. Janczewski; Henry B. Wolfe; Sujeet Shenoi. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. Springer, IFIP Advances in Information and Communication Technology, AICT-405, pp.69-82, 2013, Security and Privacy Protection in Information Processing Systems. 〈10.1007/978-3-642-39218-4_6〉
Liste complète des métadonnées

Cited literature [26 references]  Display  Hide  Download

https://hal.inria.fr/hal-01463847
Contributor : Hal Ifip <>
Submitted on : Thursday, February 9, 2017 - 5:24:33 PM
Last modification on : Thursday, February 9, 2017 - 5:37:18 PM
Document(s) archivé(s) le : Wednesday, May 10, 2017 - 2:43:22 PM

File

978-3-642-39218-4_6_Chapter.pd...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Sabrina Kirrane, Alessandra Mileo, Stefan Decker. Applying DAC Principles to the RDF Graph Data Model. Lech J. Janczewski; Henry B. Wolfe; Sujeet Shenoi. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. Springer, IFIP Advances in Information and Communication Technology, AICT-405, pp.69-82, 2013, Security and Privacy Protection in Information Processing Systems. 〈10.1007/978-3-642-39218-4_6〉. 〈hal-01463847〉

Share

Metrics

Record views

56

Files downloads

11