Access control for sharing semantic data across desktops

作者: Ekaterini Ioannou , Juri L. De Coi , Arne Wolf Koesling , Daniel Olmedilla , Wolfgang Nejdl

DOI:

关键词:

摘要: Personal Information Management (PIM) systems aim to provide convenient access all data and metadata on a desktop the user itself as well co-workers. Obviously, sharing with co-workers raises privacy control issues which have be addressed. In this paper we discuss these issues, present appropriate solutions. line architecture of current PIM [8, 2, 11, 15], our solutions cover semantic shared in such context, i.e. resources other structures created by system, an RDF store inverted index entries for efficient textual search. We different kinds policies specify protection metadata, describe system express execute efficiently. Additionally, extension existing Beagle++, approach, experiments, convincing results performance scalability.

参考文章(13)
Leo Sauermann, Gunnar Aastrand Grimnes, Malte Kiesel, Christiaan Fluit, Heiko Maus, Dominik Heim, Danish Nadeem, Benjamin Horak, Andreas Dengel, Semantic desktop 2.0: the Gnowsis experience international semantic web conference. pp. 887- 900 ,(2006) , 10.1007/11926078_64
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web Lecture Notes in Computer Science. pp. 342- 356 ,(2004) , 10.1007/978-3-540-25956-5_24
David Hawking, Challenges in enterprise search australasian database conference. pp. 15- 24 ,(2004)
Wolfgang Nejdl, Boris Wolf, Changtao Qu, Stefan Decker, Michael Sintek, Ambjörn Naeve, Mikael Nilsson, Matthias Palmér, Tore Risch, EDUTELLA: a P2P networking infrastructure based on RDF the web conference. pp. 604- 615 ,(2002) , 10.1145/511446.511525
Hakan Hacigümüş, Bala Iyer, Chen Li, Sharad Mehrotra, Executing SQL over encrypted data in the database-service-provider model Proceedings of the 2002 ACM SIGMOD international conference on Management of data - SIGMOD '02. pp. 216- 227 ,(2002) , 10.1145/564691.564717
Stefan Büttcher, Charles L. A. Clarke, A security model for full-text file system search in multi-user environments file and storage technologies. pp. 13- 13 ,(2005) , 10.5555/1251028.1251041
Yan-Cheng Chang, Michael Mitzenmacher, Privacy Preserving Keyword Searches on Remote Encrypted Data Applied Cryptography and Network Security. pp. 442- 455 ,(2005) , 10.1007/11496137_30
Mayank Bawa, Roberto J. Bayardo, Rakesh Agrawal, Jaideep Vaidya, Privacy-preserving indexing of documents on the network very large data bases. ,vol. 18, pp. 922- 933 ,(2003) , 10.1007/S00778-008-0129-7
P. Bonatti, D. Olmedilla, Driving and monitoring provisional trust negotiation with metapolicies ieee international workshop on policies for distributed systems and networks. pp. 14- 23 ,(2005) , 10.1109/POLICY.2005.13
Dawn Xiaoding Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data ieee symposium on security and privacy. pp. 44- 55 ,(2000) , 10.1109/SECPRI.2000.848445