79
Views
3
CrossRef citations to date
0
Altmetric
Articles

Using Ontologies to Share Access Control Information in Rural Business Process Outsourcing

ORCID Icon &

References

  • Vaidyanathan L., “Architectures for massively scalable, distributed rural service enterprises: Requirements and models,” IITM-Rural Technology and Business Incubator (RTBI) and Xerox Corporation, Tech. Rep., 2009.
  • Singh R., Divakaran D. M. and Gonsalves T. A., “Taking rural bpo to new heights: An acm for distributed and secure document sharing,” in 5th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2011, pp. 1–6.
  • Sandhu R. S., Coyne E. J., Feinstein H. L. and Youman C. E., “Role-based access control models,” Computer, Vol. 29, no. 2, pp. 38–47, 1996. doi: 10.1109/2.485845
  • Thomas R. K., “Team-based access control (tmac): A primitive for applying role-based access controls in collaborative environments,” in Proceedings of the 2nd ACM Workshop on Role-based Access Control, ser. RBAC '97. New York, NY, USA: ACM, 1997, pp. 13–19.
  • Yang N., Barringer H. and Zhang N., “A purpose-based access control model,” in 3rd International System on Information Assurance and Security (IAS), Aug. 2007, pp. 143–148.
  • Joshi J. B., Bertino E., Latif U. and Ghafoor A., “A generalized temporal role-based access control model,” IEEE. Trans. Knowl. Data. Eng., Vol. 17, no. 1, pp. 4–23, 2005. doi: 10.1109/TKDE.2005.1
  • Kalam A. A. E., et al. “Organization based access control,” in Proceedings of 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2003, 2003, pp. 120–131.
  • Kuhn D. R., Coyne E. J. and Weil T. R., “Adding attributes to role-based access control,” IEEE Computer, Vol. 43, no. 6, pp. 79–81, Jun. 2010. doi: 10.1109/MC.2010.155
  • Le X. H., Lee S., Lee Y.-K., Lee H., Khalid M. and Sankar R., “Activity-oriented access control to ubiquitous hospital information and services,” Inf. Sci., Vol. 180, pp. 2979–2990, Aug. 2010. doi: 10.1016/j.ins.2010.04.020
  • Ferraiolo D. and Kuhn R., “Role-based access control,” in 15th NIST-NCSC National Computer Security Conference, 1992, pp. 554–563.
  • Janev V. and Vranes S., “Applicability assessment of semantic web technologies,” Inf. Process. Manag., Vol. 47, no. 4, pp. 507–517, 2011. doi: 10.1016/j.ipm.2010.11.002
  • Finin T., Joshi A., Kagal L., Niu J., Sandhu R., Winsborough W. and Thuraisingham B., “Rowlbac: Representing role based access control in owl,” in Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, ser. SACMAT '08. New York, NY, USA: ACM, 2008, pp. 73–82. [Online]. Available: http://doi.acm.org/10.1145/1377836.1377849.
  • del Valle M. I. Y., Mana A., Lopez J. and Troya J. M., “Applying the semantic web layers to access control.” in DEXA Workshops. IEEE Computer Society, 2003, pp. 622–626.
  • Priebe T., Dobmeier W. and Kamprath N., “Supporting attribute-based access control with ontologies,” in 1st International Conference on Availability, Reliability and Security, 2006. ARES 2006., April 2006, pp. 1–8.
  • Chowdhury M., Noll J. and Gomez J., “Enabling access control and privacy through ontology,” in 4th International Conference on Innovations in Information Technology, 2007. IIT 2007., Nov. 2007, pp. 168–172.
  • Smith M., Schain A., Clark K., Griffey A. and Kolovski V., “Mother, may i? owl-based policy management at nasa.” in OWLED, C. Golbreich, A. Kalyanpur, and B. Parsia, Eds., vol. 258. CEUR-WS.org, 2007.
  • Cirio L., Cruz I. F. and Tamassia R., “A role and attribute based access control system using semantic web technologies,” in Proceedings of the 2007 OTM Confederated International Conference on On the Move to Meaningful Internet Systems - Volume Part II, ser. OTM'07. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 1256–1266.
  • Raje S., Davuluri C., Freitas M., Ramnath R. and Ramanathan J., “Using semantic web technologies for rbac in project-oriented environments.” in COMPSAC, X. Bai, F. Belli, E. Bertino, C. K. Chang, A. Elçi, C. C. Seceleanu, H. Xie, and M. Zulkernine, Eds. IEEE Computer Society, 2012, pp. 521–530.
  • Ferrini R. and Bertino E., “Supporting rbac with xacml+owl,” in Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, ser. SACMAT '09. New York, NY, USA: ACM, 2009, pp. 145–154.
  • Beimel D. and Peleg M., “Using owl and swrl to represent and reason with situation-based access control policies,” Data. Knowl. Eng., Vol. 70, pp. 596–615, 2011. doi: 10.1016/j.datak.2011.03.006
  • Calbimonte J.-P., Corcho O. and Gray A. J. G., “Enabling ontology-based access to streaming data sources,” in Proceedings of the 9th International Semantic Web Conference on The Semantic Web - Volume Part I, ser. ISWC'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 96–111.
  • Poulymenopoulou M., Malamateniou F. and Vassilacopoulos G., “An access control framework for pervasive mobile healthcare systems utilizing cloud services.” in MobiHealth, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, K. S. Nikita, J. C. Lin, D. I. Fotiadis, and M. T. A. Waldmeyer, Eds., vol. 83. Springer, 2011, pp. 380–385.
  • Singh R. and Gonsalves T. A., “A pragmatic approach towards secure sharing of digital objects,” Security Comm. Networks, Vol. 8, pp. 3914–26, 2015. doi:10.1002/sec.1310.
  • Singh R. and Gonsalves T. A., “Making the value of data determine the security: A case study of rural business process outsourcing,” Manuscript submitted for publication.
  • Kalfoglou Y. and Schorlemmer M., “Ontology mapping: The state of the art,” Knowl. Eng. Rev., vol. 18, no. 1, pp. 1–31, Jan. 2003. Available: http://dx.doi.org/10.1017/S0269888903000651.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.