Controlling Access to a Digital Library Ontology - A Graph Transformation Approach

##plugins.themes.academic_pro.article.main##

Subhasis Dasgupta
Aditya Bagchi

Abstract

This paper presents a graph-based formalism for an Ontology Based Access Control (OBAC) system applied to Digital Library (DL) ontology. It uses graph transformations, a graphical specication technique based on a generalization of classical string grammars to nonlinear structures. The proposed formalism provides an executable specication that exploits existing tools of graph grammar to verify the properties of a graph-based access control mechanism applicable to a digital library ontology description. It also provides a uniform specication for controlling access not only at the concept level but also at the level of the documents covered by the concepts including node obfuscation, if required. Authors have shown the need of using both positive and negative authorizations for eective access control to the DL ontology. However, it gives rise to a decidability problem. A view creation mechanism and associated algorithm has been presented as a solution to the decidability problem.

##plugins.themes.academic_pro.article.details##

How to Cite
Subhasis Dasgupta, & Aditya Bagchi. (2014). Controlling Access to a Digital Library Ontology - A Graph Transformation Approach. International Journal of Next-Generation Computing, 5(1), 22–42. https://doi.org/10.47164/ijngc.v5i1.59

References

  1. DDC-2010. Implementing dewey.info as a linked data platform. Dewey Summaries as Linked Data. OCLC Developer Networks.LCC-1990. Library of Congress. (1990) LC Classification Outline (6th Ed.). Library of Congress.
  2. Bertino, E. and Ferrari, E. 2002. Secure and selective dissemination of xml documents. ACM Trans. Inf. Syst.Secur. 5, 290–331.
  3. Carminati, B., Ferrari, E., and Bertino, E. 2005. Securing xml data in third-party distribution systems. In Proceedings of the 14th ACM international conference on Information and knowledge management. CIKM ’05.ACM, New York, NY, USA, 99–106.
  4. Corradini, A., Montanari, U., Rossi, F., Ehrig, H., Heckel, R., and Lowe, M. ¨ 1997. Algebraic approaches to graph transformation. Part I: basic concepts and double pushout approach. World Scientific Publishing Co., Inc., River Edge, NJ, USA, 163–245.
  5. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., and Samarati, P. 2002. A fine-grained access control system for xml documents. ACM Trans. Inf. Syst. Secur. 5, 169–202.
  6. Damiani, E., di Vimercati, S. D. C., Paraboschi, S., and Sarnarati, P. 2000. Securing xml documents. In INTERNATIONAL CONFERENCE ON EXTENDING DATABASE TECHNOLOGY. Springer, 121–135.
  7. Dasgupta, S. and Bagchi, A. 2011. Controlled access over documents for concepts having multiple parents in a digital library ontology. In Computer Information Systems Analysis and Technologies, N. Chaki and A. Cortesi, Eds. Communications in Computer and Information Science, vol. 245. Springer Berlin Heidelberg, 277–285. 10.1007/978-3-642-27245-5 33.
  8. Dasgupta, S. and Bagchi, A. 2012. A graph-based formalism for controlling access to a digital library ontology.In CISIM, A. Cortesi, N. Chaki, K. Saeed, and S. T. Wierzchon, Eds. Lecture Notes in Computer Science, vol.7564. Springer, 111–122.
  9. Farkas, C., Gowadia, V., Jain, A., and Roy, D. 2006. From xml to rdf: Syntax, semantics, security, and integrity (invited paper). In Security Management, Integrity, and Internal Control in Information Systems, P. Dowland, S. Furnell, B. Thuraisingham, and X. Wang, Eds. IFIP International Federation for Information Processing, vol. 193. Springer Boston, 41–55. 10.1007/0-387-31167-X 3.
  10. Gabillon, A. 2005. A formal access control model for xml databases. In Secure Data Management, W. Jonker and M. Petkovic, Eds. Lecture Notes in Computer Science, vol. 3674. Springer Berlin / Heidelberg, 86–103.10.1007/11552338 7.
  11. Gonc¸alves, M. A., Fox, E. A., and Watson, L. T. 2008. Towards a digital library theory: a formal digital library ontology. Int. J. Digit. Libr. 8, 91–114.
  12. Kashyap, V. and Sheth, A. 1996. Semantic and schematic similarities between database objects: a context-based approach. The VLDB Journal 5, 276–304.
  13. Kaushik, S., Wijesekera, D., and Ammann, P. 2005. Policy-based dissemination of partial web-ontologies. In Proceedings of the 2nd ACM Workshop On Secure Web Services, SWS 2005, Fairfax, VA, USA, November 11,2005, E. Damiani and H. Maruyama, Eds. ACM, 43–52.
  14. Koch, M., Mancini, L., and Parisi-Presicce, F. 2005. Graph-based specification of access control policies.Journal of Computer and System Sciences 71, 1, 1 – 33.
  15. Noy, N. and Musen, M. 2004. Specifying ontology views by traversal. In The Semantic Web ISWC 2004,S. McIlraith, D. Plexousakis, and F. Harmelen, Eds. Lecture Notes in Computer Science, vol. 3298. SpringerBerlin Heidelberg, 713–725.
  16. Ouksel, A. M. and Ahmed, I. 1999. Ontologies are not the panacea in data integration: A flexible coordinator to mediate context construction. Distributed and Parallel Databases 7, 7–35. 10.1023/A:1008626109650.
  17. Qin, L. and Atluri, V. 2010. Semantics aware security policy specification for the semantic web data. Int. J.Inf. Comput. Secur. 4, 52–75.
  18. Saeed, H. and Chaudhry, A. S. 2002. Using dewey decimal classification scheme (DDC) for building taxonomies for knowledge organisation. Journal of Documentation 58, 5, 578–583.
  19. Seidenberg, J. and Rector, A. 2006. Web ontology segmentation: analysis, classification and use. In Proceedings of the 15th international conference on World Wide Web. WWW ’06. ACM, New York, NY, USA, 13–22.