Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs

LF Sikos, D Philp - Data Science and Engineering, 2020 - Springer
Expressing machine-interpretable statements in the form of subject-predicate-object triples
is a well-established practice for capturing semantics of structured data. However, the …

Access control and the resource description framework: A survey

S Kirrane, A Mileo, S Decker - Semantic Web, 2016 - journals.sagepub.com
In recent years we have seen significant advances in the technology used to both publish
and consume structured data using the existing web infrastructure, commonly referred to as …

Secure manipulation of linked data

S Kirrane, A Abdelrahman, A Mileo… - The Semantic Web–ISWC …, 2013 - Springer
When it comes to publishing data on the web, the level of access control required (if any) is
highly dependent on the type of content exposed. Up until now RDF data publishers have …

Linked data authorization platform

R Stojanov, S Gramatikov, I Mishkovski… - IEEE Access, 2017 - ieeexplore.ieee.org
The expansion of the smart devices, the growing popularity of the social networks, and the
wide spread of the corporate services impose huge amounts of heterogeneous data to be …

[PDF][PDF] Linked data with access control

S Kirrane - Diss. National University of Ireland …, 2015 - researchrepository …
The explosion of digital content and the heterogeneity of enterprise content sources have
pushed existing data integration solutions to their boundaries. An alternative solution is to …

Inference leakage detection for authorization policies over RDF data

T Sayah, E Coquery, R Thion, MS Hacid - … XXIX: 29th Annual IFIP WG 11.3 …, 2015 - Springer
Abstract The Semantic Web technologies include entailment regimes that produce new RDF
data from existing ones. In the presence of access control, once a user has legitimately …

Towards a Domain-Agnostic Computable Policy Tool

M Falkow, H Santos, DL McGuinness - European Semantic Web …, 2021 - Springer
Policies are often crucial for decision-making in a wide range of domains. Typically they are
written in natural language, which leaves room for different individual interpretations. In …

Authorization proxy for sparql endpoints

R Stojanov, M Jovanovik - International Conference on ICT Innovations, 2017 - Springer
A large number of emerging services expose their data using various Application
Programming Interfaces (APIs). Consuming and fusing data form various providers is a …

Applying DAC principles to the RDF graph data model

S Kirrane, A Mileo, S Decker - … Processing Systems: 28th IFIP TC 11 …, 2013 - Springer
In this paper we examine how Discretionary Access Control principles, that have been
successfully applied to relational and XML data, can be applied to the Resource Description …

Protect your RDF data!

S Kirrane, N Lopes, A Mileo, S Decker - … 2012, Nara, Japan, December 2-4 …, 2013 - Springer
The explosion of digital content and the heterogeneity of enterprise content sources have
pushed existing data integration solutions to their boundaries. Although RDF can be used as …