As more private data is entering the web, defining authorization about its access is crucial for privacy protection. This paper proposes a policy language that leverages SPARQL expressiveness and popularity for flexible access control management and enforces the protection using temporal graphs. The temporal graphs are created during the authentication phase and are cached for further usage. They enable design-time policy testing and debugging, which is necessary for correctness guarantee.
%0 Conference Paper
%1 10.1007/978-3-030-91421-9_9
%A Stojanov, Riste
%A Popovski, Ognen
%A Jovanovik, Milos
%A Zdravevski, Eftim
%A Lameski, Petre
%A Trajanov, Dimitar
%B Smart Objects and Technologies for Social Good (GOODTECHS 2021)
%D 2022
%E Pires, Ivan Miguel
%E Spinsante, Susanna
%E Zdravevski, Eftim
%E Lameski, Petre
%I Springer International Publishing
%K linkeddata myown semanticwebtechnologies
%P 105--120
%R 10.1007/978-3-030-91421-9_9
%T Temporal Authorization Graphs: Pros, Cons and Limits
%U https://link.springer.com/chapter/10.1007/978-3-030-91421-9_9
%V 401
%X As more private data is entering the web, defining authorization about its access is crucial for privacy protection. This paper proposes a policy language that leverages SPARQL expressiveness and popularity for flexible access control management and enforces the protection using temporal graphs. The temporal graphs are created during the authentication phase and are cached for further usage. They enable design-time policy testing and debugging, which is necessary for correctness guarantee.
%@ 978-3-030-91421-9
@inproceedings{10.1007/978-3-030-91421-9_9,
abstract = {As more private data is entering the web, defining authorization about its access is crucial for privacy protection. This paper proposes a policy language that leverages SPARQL expressiveness and popularity for flexible access control management and enforces the protection using temporal graphs. The temporal graphs are created during the authentication phase and are cached for further usage. They enable design-time policy testing and debugging, which is necessary for correctness guarantee.},
added-at = {2022-01-05T17:30:11.000+0100},
author = {Stojanov, Riste and Popovski, Ognen and Jovanovik, Milos and Zdravevski, Eftim and Lameski, Petre and Trajanov, Dimitar},
biburl = {https://www.bibsonomy.org/bibtex/2f45859c6160d421c069214ec01644194/mjovanovik},
booktitle = {Smart Objects and Technologies for Social Good (GOODTECHS 2021)},
doi = {10.1007/978-3-030-91421-9_9},
editor = {Pires, Ivan Miguel and Spinsante, Susanna and Zdravevski, Eftim and Lameski, Petre},
interhash = {81e8852f11eb7c15c6d4fcbc5d9907fe},
intrahash = {f45859c6160d421c069214ec01644194},
isbn = {978-3-030-91421-9},
keywords = {linkeddata myown semanticwebtechnologies},
month = jan,
pages = {105--120},
publisher = {Springer International Publishing},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
timestamp = {2022-01-09T16:54:02.000+0100},
title = {Temporal Authorization Graphs: Pros, Cons and Limits},
url = {https://link.springer.com/chapter/10.1007/978-3-030-91421-9_9},
volume = 401,
year = 2022
}