The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] authorization conflict(2hit)

1-2hit
  • Authorization Conflict Problems in Combining RIF Rules with RDF Data

    Jaehoon KIM  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2014/09/05
      Vol:
    E98-D No:4
      Page(s):
    863-871

    Resource Description Framework (RDF) access control suffers from an authorization conflict problem caused by RDF inference. When an access authorization is specified, it can lie in conflict with other access authorizations that have the opposite security sign as a result of RDF inference. In our former study, we analyzed the authorization conflict problem caused by subsumption inference, which is the key inference in RDF. The Rule Interchange Format (RIF) is a Web standard rule language recommended by W3C, and can be combined with RDF data. Therefore, as in RDF inference, an authorization conflict can be caused by RIF inference. In addition, this authorization conflict can arise as a result of the interaction of RIF inference and RDF inference rather than of RIF inference alone. In this paper, we analyze the authorization conflict problem caused by RIF inference and suggest an efficient authorization conflict detection algorithm. The algorithm exploits the graph labeling-based algorithm proposed in our earlier paper. Through experiments, we show that the performance of the graph labeling-based algorithm is outstanding for large RDF data.

  • RDFacl: A Secure Access Control Model Based on RDF Triple

    Jaehoon KIM  Seog PARK  

     
    PAPER-Application Information Security

      Vol:
    E92-D No:1
      Page(s):
    41-50

    An expectation for more intelligent Web is recently being reflected through the new research field called Semantic Web. In this paper, related with Semantic Web security, we introduce an RDF triple based access control model having explicit authorization propagation by inheritance and implicit authorization propagation by inference. Especially, we explain an authorization conflict problem between the explicit and the implicit authorization propagation, which is an important concept in access control for Semantic Web. We also propose a novel conflict detection algorithm using graph labeling techniques in order to efficiently find authorization conflicts. Some experimental results show that the proposed detection algorithm has much better performance than the existing detection algorithm when data size and number of specified authorizations become larger.