SECURE KNOWLEDGE EXCHANGE BY POLICY ALGEBRA AND ERML

Steve Barker, Paul Douglas

2007

Abstract

In this paper, we demonstrate how role-based access control policies may be used for secure forms of knowledge module exchange in an open, distributed environment. For that, we define an algebra that a security administrator may use for defining compositions and decompositions of shared information sources, and we describe a markup language for facilitating secure information exchange amongst heterogeneous information systems. We also describe an implementation of our approach and we give some performance measures, which offer evidence of the feasibility of our proposal.

References

  1. Abiteboul, S., Hull, R. and Vianu, V. 1995. Foundations of Databases. Addison-Wesley.
  2. Apt, K. 1997. From Logic Programming to Prolog. Prentice Hall.
  3. Baral, C. and Gelfond, M. 1994. Logic Programming and Knowledge Representation. JLP, vol 19/20, pp73-148.
  4. Barker, S. 2000. Data Protection by Logic Programming. Proc. 1st International Conference on Computational Logic. Springer-Verlag.
  5. Barker, S. and Stuckey, P. 2003. Flexible Access Control Policy Specification with Constraint Logic Programming. ACM Trans. on Information and System Security, vol 6, number 4, pp501-546.
  6. Barker, S. 2004. Labeled Logic Programs. Springer-Verlag.
  7. Bhatti, R., Joshi, J., Bertino, E. and Ghafoor, A. 2003. Access Control in Dynamic XML-Based Web-Services with X-RBAC. In ICWS 2003, pp243-249.
  8. Bonatti, P., Vimercati, S. and Samarati, P. 2002. An algebra for Composing access control policies. TISSEC 2002, vol 5, number 1, pp1-35.
  9. Date, C. 2003. An Introduction to Database Systems. Addison-Wesley.
  10. Dean, M. 2001. RuleML Experiments with GEDCOM. www.daml.org/2001/02/gedcom-ruleml/
  11. Eberhardt, A. 2001. Prolog2RuleML Parser. www.iu.de/schools/eberhart/prolog2ruleml
  12. Eberhardt, A. 2001. OntoSQL. www.aifb.unikarlsruhe.de/WBS/aeb/ontosql/
  13. Grosof, B., Gandhe, M. and Finin, T. 2002. SweetJess: Translating DAMLRuleML to JESS. SunSITE.Informatik.RWTHAachen.DE/Publications/CEUR-WS/Vol60/grosof.pdf
  14. Jajodia, S., Samarati, P., Sapino, M. and Subrahmaninan, V. 2001. Flexible Support for Multiple Access Control Policies. ACM TODS, vol 26, number 2, pp214-260.
  15. Kay, M. 2001. The SAXON XSLT and XQuery Processor. http://saxon.sourceforge.net/
  16. Kuper, G., Libkin, L. and Paredaens, J. 2000. Constraint Databases. Springer.
  17. Marriott, K. and Stuckey, P. 1998. Programming with Constraints: an Introduction. MIT Press.
  18. Sandhu, R., Ferraiolo, D. and Kuhn, R. 2001. The NIST Model for Role-Based Access Control: Towards a Unified Standard. Proc. 4th ACM Workshop on RoleBased Access Control, pp47-61.
  19. Wijesekera, D. and Jajodia, S. 2001. Policy algebras for access control: the propositional case. Proc. ACM Conference on Computer and Communications Security pp38-47.
Download


Paper Citation


in Harvard Style

Barker S. and Douglas P. (2007). SECURE KNOWLEDGE EXCHANGE BY POLICY ALGEBRA AND ERML . In Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 1: ICEIS, ISBN 978-972-8865-88-7, pages 212-217. DOI: 10.5220/0002358402120217


in Bibtex Style

@conference{iceis07,
author={Steve Barker and Paul Douglas},
title={SECURE KNOWLEDGE EXCHANGE BY POLICY ALGEBRA AND ERML},
booktitle={Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 1: ICEIS,},
year={2007},
pages={212-217},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002358402120217},
isbn={978-972-8865-88-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 1: ICEIS,
TI - SECURE KNOWLEDGE EXCHANGE BY POLICY ALGEBRA AND ERML
SN - 978-972-8865-88-7
AU - Barker S.
AU - Douglas P.
PY - 2007
SP - 212
EP - 217
DO - 10.5220/0002358402120217