ABSTRACT
In this paper, we describe a general-purpose, scalable RDF policy engine. The innovations in our work include seamless support for a diverse set of security policies enforced by a highly available and scalable policy engine designed using a cloud-based platform. Our main goal is to demonstrate how coalition agencies can share information stored in multiple formats, through the enforcement of appropriate policies.
- U. Braun, A. Shinnar, and M. Seltzer. Securing provenance. In Proceedings of the 3rd conference on Hot topics in security, page 4. USENIX Association, 2008. Google ScholarDigital Library
- T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B. Thuraisingham. A language for provenance access control. In Proceedings of the first ACM conference on Data and application security and privacy, pages 133--144. ACM, 2011. Google ScholarDigital Library
- T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B. Thuraisingham. Transforming Provenance using Redaction. In Proceedings of the Sixteenth ACM Symposium on Access Control Models and Technologies (SACMAT). ACM, 2011. Google ScholarDigital Library
- H. Ehrig. Fundamentals of algebraic graph transformation. Springer-Verlag New York Inc, 2006. Google ScholarDigital Library
- G. Klyne and J. J. Carroll. Resource Description Framework (RDF): Concepts and Abstract Syntax. http://www.w3.org/TR/2004/REC-rdf-syntax-20040210/, 2004.Google Scholar
- E. Prud'hommeaux and A. Seaborne. SPARQL Query Language for RDF. http://www.w3.org/TR/rdf-sparql-query, 2008.Google Scholar
- G. Rozenberg and H. Ehrig. Handbook of graph grammars and computing by graph transformation, volume 1. World Scientific, 1997. Google ScholarDigital Library
- P. Samarati and S. de Vimercati. Access control: Policies, models, and mechanisms. Foundations of Security Analysis and Design, pages 137--196, 2001. Google ScholarDigital Library
Comments