期刊文献+

关联数据的访问控制技术进展研究 被引量:1

Research on Progress of Access Control Technology for Linked Data
原文传递
导出
摘要 访问控制是关联数据环境下保护敏感数据的重要技术,文章概述了访问控制策略和常用的策略语言,重点阐述分布式云平台授权、标注RDF、令牌和本体4种访问控制的改进方法。另外还介绍了在传统的访问控制模型的基础上的基于语义访问控制模型、基于关系的访问控制模型等改进模型,分析了Lockr,My Privacy Manager,RAW等典型的应用系统的组成和功能特点,最后讨论了衡量访问控制的一些标准。 Access control is an important technology to protect sensitive data in the environment of linked data. This paper summarizes the access control policy and common policy language,and focuses on 4 access control methods to improve the annotation,which are distributed cloud platform,annotated RDF,token and ontology. Furthermore,the paper introduces such improved models as semantic-based access control model and relationship-based access control,which are based on the traditional access control model. The paper also analyzes the composition and function of typical application system,such as Lockr,My Privacy Manager and RAW. Finally,the paper discusses some standards to measure the access control.
作者 刘振
出处 《情报理论与实践》 CSSCI 北大核心 2014年第12期127-132,共6页 Information Studies:Theory & Application
基金 国家社会科学基金项目"数字资源长期保存技术的研究与实践"(项目编号:09FTQ005) 国家十二五科技支撑计划项目"面向外文科技文献信息的知识组织体系建设与应用示范"课题五"信息资源自动处理 智能检索与STKOS应用服务集成"(项目编号:2011BAH10B00)的研究成果
关键词 关联数据 访问控制 策略 研究进展 linked data access control strategy research progress
  • 相关文献

参考文献21

  • 1HOLLENBACH J, PRESBREY J, BERNERS-LEE T. Using rdf metadata to enable access control on the social semantic Web [ C ] //Proceedings of the Workshop on Collaborative Construc- tion, Management and Linking of Structured Knowledge (CK2009) . 2009: 514. 被引量:1
  • 2BIZER C, CARROLL J J. Modelling context using named graphs [ C ] //W3C Semantic Web Interest Group Meeting, 2004. 被引量:1
  • 3KIRRANE S, LOPES N, MILEO A, et al. Protect your RDF Datal [M] //Semantic Technology. [S. 1. ]: Springer Ber- lin Heidelberg, 2013 : 81-96. 被引量:1
  • 4USZOK A, BRADSHAW J, JEFFERS R, et al. KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement [ C] // Policies for distributed systems and networks, 2003.Proceed- ings. POLICY 2003. IEEE 4tb International Workshop on. IEEE, 2003: 93-96. 被引量:1
  • 5DAMIANOU N, DULAY N, LUPU E, et al. The ponder poli- cy specification language [ M ] //Policies for Distributed Sys- tems and Networks. [ S. 1. ]: Springer Berlin Heidelberg, 2001 : 18-38. 被引量:1
  • 6KAGAL L, FININ T, JOSHI A. A policy language for a perva- sive computing environment [ C ] //Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on. IEEE,2003:63-74. 被引量:1
  • 7BONATI?I P A, DE COI J L, OLMEDILLA D, et al. Rule- based policy representations and reasoning [ M ] //Semantic Techniques for the Web. [ S. 1. ] : Springer Berlin Heidelberg, 2009 : 201-232. 被引量:1
  • 8MUHLEISEN H, KOST M, FREYTAG J C. SWRL-based ac- cess policies for linked data [ C ] //SPOT 2010 2nd Workshop on Trust and Privacy on the Social and Semantic Web, Herak- lion, Greece. 2010. 被引量:1
  • 9NERI M A, GUARNIERI M, MAGRI E, et al. Conflict detec- tion in security policies using semantic web technology [ C ] // Satellite Telecommunications (ESTEL), 2012 IEEE First AESS European Conference on. IEEE, 2012: 1-6. 被引量:1
  • 10RECORDON D, REED D. OpenID 2.0 : a platform for user- centric identity management [ C ] //Proceedings of the Second ACM Workshop on Digital identity Management. ACM, 2006:11-16. 被引量:1

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部