CFP last date
20 January 2025
Reseach Article

Comparative analysis of Role Base and Attribute Base Access Control Model in Semantic Web

by Sonu Verma, Suresh Kumar, Manjeet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 18
Year of Publication: 2012
Authors: Sonu Verma, Suresh Kumar, Manjeet Singh
10.5120/7038-9033

Sonu Verma, Suresh Kumar, Manjeet Singh . Comparative analysis of Role Base and Attribute Base Access Control Model in Semantic Web. International Journal of Computer Applications. 46, 18 ( May 2012), 1-6. DOI=10.5120/7038-9033

@article{ 10.5120/7038-9033,
author = { Sonu Verma, Suresh Kumar, Manjeet Singh },
title = { Comparative analysis of Role Base and Attribute Base Access Control Model in Semantic Web },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 18 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number18/7038-9033/ },
doi = { 10.5120/7038-9033 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:40:03.322085+05:30
%A Sonu Verma
%A Suresh Kumar
%A Manjeet Singh
%T Comparative analysis of Role Base and Attribute Base Access Control Model in Semantic Web
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 18
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

To control the unauthorized access to the resources and services is an emerging security issue in Semantic Web (SW). There are various existing access control models such as Role base, Attribute base, Credential base, Concept level access control models. They all have some strengths and weaknesses with them. In this paper we first take an overview of history of access control models and the need of access control models in semantic web. This paper has a discussion of strengths and weaknesses of the RBAC and ABAC. Than we have a comparative analysis of RBAC and ABAC with some points of issue

References
  1. Muhammad Reza Fatemi, Atilla Elçi and Zeki Bayram, "A proposal for Ontology Security Standards", 2008.
  2. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H. Winsborough, Bhavani Thuraisingham, "Using OWL to Model Role Based Access Control", SACMAT'08, June 11–13, 2008.
  3. Alan H. Karp, Harry Haury, Michael H. Davis, "From ABAC to ZBAC: The Evolution of Access Control Models", HP Laboratories-2009-30.
  4. D. F. Ferraiolo and D. R. Kuhn (1992) "Role Based Access Control", 15th National Computer Security Conference, October, 1992.
  5. L. Cirio, I. F. Cruz, and R. Tamassia. "A Role and Attribute Based Access Control System Using Semantic Web Technologies". In International IFIP Workshop on Semantic Web and Web Semantics, volume 4806 of Lecture Notes in Computer Science, pages 1256–1266. Springer, 2007.
  6. Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, and Mirko Orsini, "A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments", 2008.
  7. Torsten Priebe, Wolfgang Dobmeier, Christian Schläger, Nora Kamprath, "Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies", First International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria, April 2006.
  8. A. Mohammad, G. Kanaan, T. Khdour, S. Bani-Ahmad, "Ontology-Based Access Control Model for Semantic Web service", Journal of Information and Computing Science, March, 2011.
  9. Bernard Stepien, Stan Matwin, Amy Felty, "Advantages of a Non-Technical XACML Notation in Role-Based Models", 2011 Ninth Annual International Conference on Privacy, Security and Trust.
  10. Gerald Stermsek, Mark Stremmbeck, Gustaf Neumann, "Using Subject- and Object-specific Attrubutes for Access Control in Web-based Knowledge Management System".
  11. YAO Zhilin, LI Bing and LIU Shufen, "Role Based Collaboration Authorizing by Using Ontology", Chinese Journal of Electronics Vol. 20, No. 3, July 2011.
  12. D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil, "Adding Attributes to Role-Based Access Control", IEEE Computer Society, JUNE 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Model Semantic Web Authorization