application to the field of semantic data integration
can pose new challenges and require additional
research.
6 CURRENT AND FUTURE
WORK
Aletheia has started in 2008 as part of a research
alliance on federating and integrating knowledge in
a future IoT and IoS, together with the partner
projects SemProM and ADiWa. At the time of this
writing, the Aletheia system architecture is not
finalized, yet. Important current discussions include
the construction of a single, system-wide ontology
vs. a loosely coupled federation of local ontologies,
the existence of central entities like the global
Aletheia registry, and possible distribution
mechanisms. Many of those choices will affect the
security mechanisms we can deploy.
Starting out from a prototype on federated
identity and web-service access control that is
consisting of just a few partners, we will investigate
how existing mechanisms can be extended to cover
semantic-aware access control and anonymization.
Special emphasis will be placed on the best locations
for these mechanisms within the information flow,
and their impact on scalability and performance,
especially comparing online vs. offline processing
for inference protection and anonymity control.
In parallel, we will apply Neumann’s and
Strembeck’s (2002) approach for modelling RBAC
policies using their toolset, and investigate legal
requirements on data protection.
7 CONCLUSION
In this paper, we presented the main challenges we
encountered so far during ongoing work on
providing access control solutions for Aletheia, and
provided an outlook on current and future work in
that area.
REFERENCES
Abel, F., Coi, J. L. D., Henze, N., Koesling, A. W.,
Krause, D., and Olmedilla, 2007. D. Enabling
Advanced and Context-Dependent Access Control in
RDF Stores. In Proc. 6th International Semantic Web
Conference.
Aletheia, 2009. Aletheia Project Web Site URL:
http://www.aletheia-projekt.de/.
Ameri, F. and Dutta, D., 2005. Product Lifecycle
Management: Closing the Knowledge Loops. In
Computer-Aided Design and Applications 2(5), pp.
577-590.
Benjamins, V. R., Davies, J., Baeza-Yates, R., Mika, P.,
Zaragoza, H., Greaves, M.; Gomez-Perez, J. M.,
Contreras, J., Domingue, J. and Fensel, D, 2008. Near-
term prospects for semantic technologies. In IEEE
Intelligent Systems 23(1), pp. 76-88.
Dierks, T. and Rescorla, E., 2008. The Transport Layer
Security (TLS) Protocol Version 1.2, Request for
Comments 5246. IETF.
Farkas, C. and Jajodia, S., 2002. The Inference Problem:
A survey. SIGKDD Explor. Newsl. 4, 2, pp. 6-11.
Ferraiolo, D., Barkley, J., and Kuhn, D.R., 1999. A Role-
Based Access Control Model and Reference
Implementation within a Corporate Intranet. In ACM
Transactions on Information and System Security
(TISSEC), 2(1), pp. 34-64.
Ferraiolo, D., Kuhn, D.R. and Chandramouli, R., 2007.
Role-Based Access Control, Artech House. 2
nd
ed.
Jain, A. and Farkas, C., 2006. Secure Resource
Description Framework: An access control model. In
Proc. of 11th ACM Symposium on Access Control
Models and Technologies (SACMAT'06). ACM Press.
Knechtel, M. and Hladik, J., 2008. RBAC Authorization
Decision with DL Reasoning. In Proc. of the IADIS
International Conference WWW/Internet (ICWI ’08).
Machanavajjhala, A., Kifer, D., Gehrke, J., and
Venkitasubramaniam, M. 2007. L-diversity: Privacy
beyond k-anonymity. ACM Trans. Knowl. Discov.
Data 1(1). ACM Press.
Mazzoleni, P., Crispo, B., Sivasubramanian, S. and
Bertino, E., 2008. XACML Policy Integration
Algorithms. In ACM Transactions on Information and
System Security (TISSEC) 11 (1), pp. 1-29.
Neumann, G., Strembeck, M., 2002. A Scenario-driven
Role Engineering Process for Functional RBAC Roles,
In: Proc. of 7th ACM Symposium on Access Control
Models and Technologies (SACMAT).
OASIS, 2009. OASIS Standards Web Site, URL:
http://www.oasis-open.org/committees/
Reddivari, P., Finin, T. and Joshi A., 2005. Policy Based
Access Control for a RDF Store. Proc. Policy
Management for the Web Workshop. W3C, pp. 78-83.
Robertson, S. and Robertson, J., 2006. Mastering the
Requirements Process, Addison-Wesley Professional.
Sandhu R., Ferraiolo, D. and Kuhn, D.R., 2000. The
NIST Model for Role Based Access Control:
Toward a Unified Standard. In Proc. 5th ACM
Workshop on Role Based Access Control. ACM Press, pp.
47-63.
Sweeney, L. 2002. k-Anonymity: A model for protecting
privacy. In International Journal of Uncertainty,
Fuzziness and Knowledge-Based Systems 10 (5), pp.
557-570.
Thuraisingham, B., 2008. Building Trustworthy Semantic
Webs, Auerbach Publications.
CHALLENGES FOR ACCESS CONTROL IN KNOWLEDGE FEDERATIONS
229