P. Rohde, E. Iglesias, and M. Vidal. The Semantic Web: ESWC 2023 Satellite Events, page 22--26. Cham, Springer Nature Switzerland, (2023)
Abstract
The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.
%0 Conference Paper
%1 10.1007/978-3-031-43458-7_4
%A Rohde, Philipp D.
%A Iglesias, Enrique
%A Vidal, Maria-Esther
%B The Semantic Web: ESWC 2023 Satellite Events
%C Cham
%D 2023
%E Pesquita, Catia
%E Skaf-Molli, Hala
%E Efthymiou, Vasilis
%E Kirrane, Sabrina
%E Ngonga, Axel
%E Collarana, Diego
%E Cerqueira, Renato
%E Alam, Mehwish
%E Trojahn, Cassia
%E Hertling, Sven
%I Springer Nature Switzerland
%K myown
%P 22--26
%T SHACL-ACL: Access Control with SHACL
%U https://link.springer.com/chapter/10.1007/978-3-031-43458-7_4
%X The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.
%@ 978-3-031-43458-7
@inproceedings{10.1007/978-3-031-43458-7_4,
abstract = {The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.},
added-at = {2024-02-15T15:06:05.000+0100},
address = {Cham},
author = {Rohde, Philipp D. and Iglesias, Enrique and Vidal, Maria-Esther},
biburl = {https://www.bibsonomy.org/bibtex/2a171b6f4f5ac000d48c28f27bf3afd6d/gabydler},
booktitle = {The Semantic Web: ESWC 2023 Satellite Events},
editor = {Pesquita, Catia and Skaf-Molli, Hala and Efthymiou, Vasilis and Kirrane, Sabrina and Ngonga, Axel and Collarana, Diego and Cerqueira, Renato and Alam, Mehwish and Trojahn, Cassia and Hertling, Sven},
interhash = {58c5c32e302abf19f3b5af2361ae59a0},
intrahash = {a171b6f4f5ac000d48c28f27bf3afd6d},
isbn = {978-3-031-43458-7},
keywords = {myown},
pages = {22--26},
publisher = {Springer Nature Switzerland},
timestamp = {2024-02-15T15:06:05.000+0100},
title = {SHACL-ACL: Access Control with SHACL},
url = {https://link.springer.com/chapter/10.1007/978-3-031-43458-7_4},
year = 2023
}