Skip to main content

Query Rewriting for Access Control on Semantic Web

  • Conference paper
Secure Data Management (SDM 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5159))

Included in the following conference series:

Abstract

Along with describing the web resources with ontology-based metadata to make them machine-understandable, one also needs to carefully protect Semantic Web data from unauthorized access. This paper presents a query rewriting mechanism for access control so as to avoid leakage of sensitive resources in the Semantic Web. We propose to specify the security policies for access restrictions on resources as views declared based on ontologies. Illustrated examples are presented in the paper for explaining the underlying concepts. In addition, bucket-based algorithms are proposed for supporting the query rewriting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bonatti, P.A., Duma, C., Fuchs, N., Nejdl, W., Olmedilla, D., Peer, J., Shahmehri, N.: Semantic Web policies - A discussion of requirements and research issues. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol. 4011, pp. 712–724. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Cautis, B.: Distributed access control: A privacy-conscious approach. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, Sophia, Antipolis, France (2007)

    Google Scholar 

  3. Duma, C., Herzog, A., Shahmehri, N.: Privacy in the Semantic Web: What policy languages have to offer. In: Proceedings of the 11th IEEE International Workshop on Policies for Distributed Systems and Networks (2007)

    Google Scholar 

  4. Halevy., A.Y.: Answering queries using views: A survey. VLDB Journal 2001 10(4), 270–294 (2001)

    Article  Google Scholar 

  5. Kagal, L., Finin, T., Joshi, A.: A policy based approach to security for the Semantic Web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402–418. Springer, Heidelberg (2003)

    Google Scholar 

  6. Kaushik, S., Wijesekera, D., Ammann, P.: Policy-based dissemination of partial web-ontologies. In: Proceedings of the 2005 Workshop on Secure Web Services (2005)

    Google Scholar 

  7. Javanmardi, S., Amini, M., Jalili, R.: An access control model for protecting Semantic Web resources. In: Proceedings of the 2nd International Semantic Web Policy Workshop, Athens, GA (2006)

    Google Scholar 

  8. Jain, A., Farkas, C.: Secure resource description framework: An access control model. In: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA (2006)

    Google Scholar 

  9. Jeong, D., Jing, Y., Baik, D.-K.: Access control model based on RDB security policy for OWL ontology. In: Shi, Y., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2007. LNCS, vol. 4488, pp. 720–727. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Jajodia, S., Samarati, P., Sapino, M.L., Subrahmaninan, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems 26(2), 214–260 (2001)

    Article  MATH  Google Scholar 

  11. Li, Q., Atluri, V.: Concept-level access control for the Semantic Web. In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, Virginia (2003)

    Google Scholar 

  12. Lakshmanan, V.S.L., Wang, H., Zhao, Z.: Answering tree pattern queries using views. In: Proceedings of the 32nd International Conference on Very Large Databases, Seoul, Korea, pp. 571–582 (2006)

    Google Scholar 

  13. Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proceedings of 2004 ACM SIGMOD International Conference on Management of Data, Paris, France (2004)

    Google Scholar 

  14. World Wide Web Consortium. Semantic Web, http://www.w3.org/2001/sw/

  15. World Wide Web. RDF Vocabulary Description Language 1.0: RDF Schema (December 2003), http://www.w3.org/TR/rdf-schema/

  16. World Wide Web Consortium. OWL Web Ontology Language Overview (December 2003), http://www.w3.org/TR/owl-features/

  17. Abel, F., Coi, J., Henze, N., Koesling, A.W., Krause, D., Olmedilla, D.: Enabling advanced and context-dependent access control in RDF Stores. In: Aberer, K., Choi, K.-S., Noy, N., Allemang, D., Lee, K.-I., Nixon, L., Golbeck, J., Mika, P., Maynard, D., Mizoguchi, R., Schreiber, G., Cudré-Mauroux, P. (eds.) ASWC 2007 and ISWC 2007. LNCS, vol. 4825, pp. 1–14. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  18. Broekstra, J., Kampman, A., van Harmelen, F.: Sesame: A generic architecture for storing and querying RDF and RDF Schema. In: Horrocks, I., Hendler, J. (eds.) ISWC 2002. LNCS, vol. 2342, pp. 54–68. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  19. Wilkinson, K., Sayers, C., Kuno, H., Reynolds, D.: Efficient RDF storage and retrieval in Jena2. In: Proceeding of the 1st International Workshop on Semantic Web and Databases, Berlin (2003)

    Google Scholar 

  20. Heflin, J., Hendler, J., and Luke, S.: SHOE: A knowledge representation language for internet applications. Technical Report CS-TR-4078 (UMIACS TR-99-71), Dept. of Computer Science, University of Maryland at College Park (1999)

    Google Scholar 

  21. Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Extending policy languages to the Semantic Web. In: Koch, N., Fraternali, P., Wirsing, M. (eds.) ICWE 2004. LNCS, vol. 3140, pp. 330–343. Springer, Heidelberg (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Willem Jonker Milan Petković

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, J., Cheung, W.K. (2008). Query Rewriting for Access Control on Semantic Web. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2008. Lecture Notes in Computer Science, vol 5159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85259-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85259-9_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85258-2

  • Online ISBN: 978-3-540-85259-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics