SECURE KNOWLEDGE EXCHANGE BY POLICY ALGEBRA AND ERML
Steve Barker, Paul Douglas
2007
Abstract
In this paper, we demonstrate how role-based access control policies may be used for secure forms of knowledge module exchange in an open, distributed environment. For that, we define an algebra that a security administrator may use for defining compositions and decompositions of shared information sources, and we describe a markup language for facilitating secure information exchange amongst heterogeneous information systems. We also describe an implementation of our approach and we give some performance measures, which offer evidence of the feasibility of our proposal.
References
- Abiteboul, S., Hull, R. and Vianu, V. 1995. Foundations of Databases. Addison-Wesley.
- Apt, K. 1997. From Logic Programming to Prolog. Prentice Hall.
- Baral, C. and Gelfond, M. 1994. Logic Programming and Knowledge Representation. JLP, vol 19/20, pp73-148.
- Barker, S. 2000. Data Protection by Logic Programming. Proc. 1st International Conference on Computational Logic. Springer-Verlag.
- Barker, S. and Stuckey, P. 2003. Flexible Access Control Policy Specification with Constraint Logic Programming. ACM Trans. on Information and System Security, vol 6, number 4, pp501-546.
- Barker, S. 2004. Labeled Logic Programs. Springer-Verlag.
- Bhatti, R., Joshi, J., Bertino, E. and Ghafoor, A. 2003. Access Control in Dynamic XML-Based Web-Services with X-RBAC. In ICWS 2003, pp243-249.
- Bonatti, P., Vimercati, S. and Samarati, P. 2002. An algebra for Composing access control policies. TISSEC 2002, vol 5, number 1, pp1-35.
- Date, C. 2003. An Introduction to Database Systems. Addison-Wesley.
- Dean, M. 2001. RuleML Experiments with GEDCOM. www.daml.org/2001/02/gedcom-ruleml/
- Eberhardt, A. 2001. Prolog2RuleML Parser. www.iu.de/schools/eberhart/prolog2ruleml
- Eberhardt, A. 2001. OntoSQL. www.aifb.unikarlsruhe.de/WBS/aeb/ontosql/
- Grosof, B., Gandhe, M. and Finin, T. 2002. SweetJess: Translating DAMLRuleML to JESS. SunSITE.Informatik.RWTHAachen.DE/Publications/CEUR-WS/Vol60/grosof.pdf
- Jajodia, S., Samarati, P., Sapino, M. and Subrahmaninan, V. 2001. Flexible Support for Multiple Access Control Policies. ACM TODS, vol 26, number 2, pp214-260.
- Kay, M. 2001. The SAXON XSLT and XQuery Processor. http://saxon.sourceforge.net/
- Kuper, G., Libkin, L. and Paredaens, J. 2000. Constraint Databases. Springer.
- Marriott, K. and Stuckey, P. 1998. Programming with Constraints: an Introduction. MIT Press.
- Sandhu, R., Ferraiolo, D. and Kuhn, R. 2001. The NIST Model for Role-Based Access Control: Towards a Unified Standard. Proc. 4th ACM Workshop on RoleBased Access Control, pp47-61.
- Wijesekera, D. and Jajodia, S. 2001. Policy algebras for access control: the propositional case. Proc. ACM Conference on Computer and Communications Security pp38-47.
Paper Citation
in Harvard Style
Barker S. and Douglas P. (2007). SECURE KNOWLEDGE EXCHANGE BY POLICY ALGEBRA AND ERML . In Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 1: ICEIS, ISBN 978-972-8865-88-7, pages 212-217. DOI: 10.5220/0002358402120217
in Bibtex Style
@conference{iceis07,
author={Steve Barker and Paul Douglas},
title={SECURE KNOWLEDGE EXCHANGE BY POLICY ALGEBRA AND ERML},
booktitle={Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 1: ICEIS,},
year={2007},
pages={212-217},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002358402120217},
isbn={978-972-8865-88-7},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 1: ICEIS,
TI - SECURE KNOWLEDGE EXCHANGE BY POLICY ALGEBRA AND ERML
SN - 978-972-8865-88-7
AU - Barker S.
AU - Douglas P.
PY - 2007
SP - 212
EP - 217
DO - 10.5220/0002358402120217