{"id":"https://openalex.org/W2055952594","doi":"https://doi.org/10.1109/icosc.2015.7050817","title":"Towards knowledge level privacy and security using RDF/RDFS and RBAC","display_name":"Towards knowledge level privacy and security using RDF/RDFS and RBAC","publication_year":2015,"publication_date":"2015-02-01","ids":{"openalex":"https://openalex.org/W2055952594","doi":"https://doi.org/10.1109/icosc.2015.7050817","mag":"2055952594"},"language":"en","primary_location":{"id":"doi:10.1109/icosc.2015.7050817","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icosc.2015.7050817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038819986","display_name":"Rishi Kanth Saripalle","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rishi Kanth Saripalle","raw_affiliation_strings":["NetVisionResources, Chantilly, VA","NetVisionResources, 4229 Lafayette Center Drive, Suite # 1750, Chantilly, VA, USA"],"affiliations":[{"raw_affiliation_string":"NetVisionResources, Chantilly, VA","institution_ids":[]},{"raw_affiliation_string":"NetVisionResources, 4229 Lafayette Center Drive, Suite # 1750, Chantilly, VA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086639104","display_name":"Alberto De la Rosa Algar\u00edn","orcid":null},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alberto De La Rosa Algarin","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Connecticut, Storrs, Connecticut, USA","NetVisionResources, 4229 Lafayette Center Drive, Suite # 1750, Chantilly, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Connecticut, Storrs, Connecticut, USA","institution_ids":["https://openalex.org/I140172145"]},{"raw_affiliation_string":"NetVisionResources, 4229 Lafayette Center Drive, Suite # 1750, Chantilly, VA, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042097703","display_name":"Timoteus B. Ziminski","orcid":null},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Timoteus B. Ziminski","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Connecticut, Storrs, USA","Dept of Computer Science and Engineering, University of Connecticut, Storrs, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Connecticut, Storrs, USA","institution_ids":["https://openalex.org/I140172145"]},{"raw_affiliation_string":"Dept of Computer Science and Engineering, University of Connecticut, Storrs, USA","institution_ids":["https://openalex.org/I140172145"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038819986"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.0246,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.84888602,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"264","last_page":"267"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7822340726852417},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.6797254085540771},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6459057331085205},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.5939067006111145},{"id":"https://openalex.org/keywords/knowledge-extraction","display_name":"Knowledge extraction","score":0.5729439854621887},{"id":"https://openalex.org/keywords/rdf","display_name":"RDF","score":0.533234179019928},{"id":"https://openalex.org/keywords/rdf-schema","display_name":"RDF Schema","score":0.5199576616287231},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5143107175827026},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4333535134792328},{"id":"https://openalex.org/keywords/sparql","display_name":"SPARQL","score":0.29096749424934387},{"id":"https://openalex.org/keywords/semantic-web","display_name":"Semantic Web","score":0.2675064206123352},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2435915172100067},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.20481783151626587}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7822340726852417},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.6797254085540771},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6459057331085205},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.5939067006111145},{"id":"https://openalex.org/C120567893","wikidata":"https://www.wikidata.org/wiki/Q1582085","display_name":"Knowledge extraction","level":2,"score":0.5729439854621887},{"id":"https://openalex.org/C147497476","wikidata":"https://www.wikidata.org/wiki/Q54872","display_name":"RDF","level":3,"score":0.533234179019928},{"id":"https://openalex.org/C15657843","wikidata":"https://www.wikidata.org/wiki/Q1751819","display_name":"RDF Schema","level":5,"score":0.5199576616287231},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5143107175827026},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4333535134792328},{"id":"https://openalex.org/C41009113","wikidata":"https://www.wikidata.org/wiki/Q54871","display_name":"SPARQL","level":4,"score":0.29096749424934387},{"id":"https://openalex.org/C2129575","wikidata":"https://www.wikidata.org/wiki/Q54837","display_name":"Semantic Web","level":2,"score":0.2675064206123352},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2435915172100067},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.20481783151626587},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icosc.2015.7050817","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icosc.2015.7050817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W179417467","https://openalex.org/W187959817","https://openalex.org/W1514761922","https://openalex.org/W2007999111","https://openalex.org/W2110444463","https://openalex.org/W2133109597","https://openalex.org/W2148495604","https://openalex.org/W2152107884","https://openalex.org/W2166602595","https://openalex.org/W6607767824"],"related_works":["https://openalex.org/W2016122440","https://openalex.org/W2372156812","https://openalex.org/W50701655","https://openalex.org/W43613300","https://openalex.org/W2027499911","https://openalex.org/W1939859361","https://openalex.org/W2374393728","https://openalex.org/W2218209731","https://openalex.org/W4389545867","https://openalex.org/W2528240602"],"abstract_inverted_index":{"Information":[0],"privacy":[1],"and":[2,105],"security":[3,23,53,125],"plays":[4],"a":[5,135,172],"major":[6],"role":[7],"in":[8,65],"domains":[9],"where":[10],"sensitive":[11,27,77,87],"information":[12,28,68,82],"is":[13,29,70,117],"handled,":[14],"such":[15,43],"as":[16,44],"case":[17],"studies":[18],"of":[19,161,175],"rare":[20],"diseases.":[21],"Currently,":[22],"for":[24,72],"accessing":[25],"any":[26],"provided":[30],"by":[31,38,133,141,159],"various":[32],"mechanisms":[33],"at":[34,54,96,129],"the":[35,55,97,102,108,124,130,150,165,176],"user/system":[36],"level":[37,57,99,132],"employing":[39],"access":[40,95,127],"control":[41,128],"models":[42],"Role":[45],"Based":[46],"Access":[47],"Control.":[48],"However,":[49],"these":[50,115],"approaches":[51],"leave":[52],"knowledge":[56,75,109,131,139,143,158,166,177],"unattended,":[58],"which":[59,90],"can":[60,111],"be":[61,112],"inadequate.":[62],"For":[63],"example,":[64],"healthcare,":[66],"ontology-based":[67],"extraction":[69,83],"employed":[71],"extracting":[73],"medical":[74],"from":[76,114],"structured/unstructured":[78],"data":[79,88],"sources.":[80],"These":[81],"systems":[84],"act":[85],"on":[86,101,147,164],"sources":[89,116,144],"are":[91],"protected":[92],"against":[93],"unauthorized":[94],"system":[98],"based":[100],"user,":[103],"context":[104],"permissions,":[106],"but":[107],"that":[110],"extracted":[113],"not.":[118],"In":[119],"this":[120],"paper":[121],"we":[122],"tackle":[123],"or":[126],"presenting":[134],"model,":[136],"to":[137],"enforce":[138],"security/access":[140],"leveraging":[142],"(currently":[145],"focused":[146],"RDF)":[148],"with":[149,171],"RBAC":[151],"model.":[152],"The":[153],"developed":[154],"model":[155],"filters":[156],"out":[157],"means":[160],"binary":[162],"permissions":[163],"source,":[167],"providing":[168],"each":[169],"user":[170],"different":[173],"view":[174],"source.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
