{"id":"https://openalex.org/W2082905291","doi":"https://doi.org/10.1145/2295136.2295155","title":"Access control for RDF graphs using abstract models","display_name":"Access control for RDF graphs using abstract models","publication_year":2012,"publication_date":"2012-06-20","ids":{"openalex":"https://openalex.org/W2082905291","doi":"https://doi.org/10.1145/2295136.2295155","mag":"2082905291"},"language":"en","primary_location":{"id":"doi:10.1145/2295136.2295155","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2295136.2295155","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015238046","display_name":"Vassilis Papakonstantinou","orcid":null},"institutions":[{"id":"https://openalex.org/I8901234","display_name":"Foundation for Research and Technology Hellas","ror":"https://ror.org/052rphn09","country_code":"GR","type":"facility","lineage":["https://openalex.org/I8901234"]},{"id":"https://openalex.org/I142617266","display_name":"University of Crete","ror":"https://ror.org/00dr28g20","country_code":"GR","type":"education","lineage":["https://openalex.org/I142617266"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Vassilis Papakonstantinou","raw_affiliation_strings":["FORTH-ICS &amp; University of Crete, Heraklion, Greece"],"affiliations":[{"raw_affiliation_string":"FORTH-ICS &amp; University of Crete, Heraklion, Greece","institution_ids":["https://openalex.org/I142617266","https://openalex.org/I8901234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051761426","display_name":"Maria Michou","orcid":null},"institutions":[{"id":"https://openalex.org/I8901234","display_name":"Foundation for Research and Technology Hellas","ror":"https://ror.org/052rphn09","country_code":"GR","type":"facility","lineage":["https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Maria Michou","raw_affiliation_strings":["Greece","FORTH-ICS, Heraklion, Greece"],"affiliations":[{"raw_affiliation_string":"Greece","institution_ids":[]},{"raw_affiliation_string":"FORTH-ICS, Heraklion, Greece","institution_ids":["https://openalex.org/I8901234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032918788","display_name":"Irini Fundulaki","orcid":"https://orcid.org/0000-0002-4812-9896"},"institutions":[{"id":"https://openalex.org/I8901234","display_name":"Foundation for Research and Technology Hellas","ror":"https://ror.org/052rphn09","country_code":"GR","type":"facility","lineage":["https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Irini Fundulaki","raw_affiliation_strings":["FORTH-ICS, Heraklion, Greece"],"affiliations":[{"raw_affiliation_string":"FORTH-ICS, Heraklion, Greece","institution_ids":["https://openalex.org/I8901234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035032490","display_name":"Giorgos Flouris","orcid":"https://orcid.org/0000-0002-8937-4118"},"institutions":[{"id":"https://openalex.org/I8901234","display_name":"Foundation for Research and Technology Hellas","ror":"https://ror.org/052rphn09","country_code":"GR","type":"facility","lineage":["https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Giorgos Flouris","raw_affiliation_strings":["FORTH-ICS, Heraklion, Greece"],"affiliations":[{"raw_affiliation_string":"FORTH-ICS, Heraklion, Greece","institution_ids":["https://openalex.org/I8901234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018289832","display_name":"Grigoris Antoniou","orcid":"https://orcid.org/0000-0003-3673-6602"},"institutions":[{"id":"https://openalex.org/I8901234","display_name":"Foundation for Research and Technology Hellas","ror":"https://ror.org/052rphn09","country_code":"GR","type":"facility","lineage":["https://openalex.org/I8901234"]},{"id":"https://openalex.org/I133837150","display_name":"University of Huddersfield","ror":"https://ror.org/05t1h8f27","country_code":"GB","type":"education","lineage":["https://openalex.org/I133837150"]}],"countries":["GB","GR"],"is_corresponding":false,"raw_author_name":"Grigoris Antoniou","raw_affiliation_strings":["FORTH-ICS &amp; University of Huddersfield, Heraklion, Greece","FORTH-ICS & University of Huddersfield, Heraklion, Greece#TAB#"],"affiliations":[{"raw_affiliation_string":"FORTH-ICS &amp; University of Huddersfield, Heraklion, Greece","institution_ids":["https://openalex.org/I8901234"]},{"raw_affiliation_string":"FORTH-ICS & University of Huddersfield, Heraklion, Greece#TAB#","institution_ids":["https://openalex.org/I133837150"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5015238046"],"corresponding_institution_ids":["https://openalex.org/I142617266","https://openalex.org/I8901234"],"apc_list":null,"apc_paid":null,"fwci":13.583,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.98401999,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"103","last_page":"112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rdf-schema","display_name":"RDF Schema","score":0.8989944458007812},{"id":"https://openalex.org/keywords/rdf","display_name":"RDF","score":0.8576909899711609},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8234349489212036},{"id":"https://openalex.org/keywords/sparql","display_name":"SPARQL","score":0.7671102285385132},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5397189259529114},{"id":"https://openalex.org/keywords/linked-data","display_name":"Linked data","score":0.517644464969635},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4698711037635803},{"id":"https://openalex.org/keywords/semantic-web","display_name":"Semantic Web","score":0.46009179949760437},{"id":"https://openalex.org/keywords/rdf/xml","display_name":"RDF/XML","score":0.452700138092041},{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.42622247338294983},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.33178967237472534},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33004045486450195},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17371821403503418},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.150445818901062}],"concepts":[{"id":"https://openalex.org/C15657843","wikidata":"https://www.wikidata.org/wiki/Q1751819","display_name":"RDF Schema","level":5,"score":0.8989944458007812},{"id":"https://openalex.org/C147497476","wikidata":"https://www.wikidata.org/wiki/Q54872","display_name":"RDF","level":3,"score":0.8576909899711609},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8234349489212036},{"id":"https://openalex.org/C41009113","wikidata":"https://www.wikidata.org/wiki/Q54871","display_name":"SPARQL","level":4,"score":0.7671102285385132},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5397189259529114},{"id":"https://openalex.org/C69075417","wikidata":"https://www.wikidata.org/wiki/Q515701","display_name":"Linked data","level":3,"score":0.517644464969635},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4698711037635803},{"id":"https://openalex.org/C2129575","wikidata":"https://www.wikidata.org/wiki/Q54837","display_name":"Semantic Web","level":2,"score":0.46009179949760437},{"id":"https://openalex.org/C78923513","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"RDF/XML","level":5,"score":0.452700138092041},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.42622247338294983},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.33178967237472534},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33004045486450195},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17371821403503418},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.150445818901062}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2295136.2295155","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2295136.2295155","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.hud.ac.uk:13996","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401852","display_name":"University of Huddersfield Repository (University of Huddersfield)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I133837150","host_organization_name":"University of Huddersfield","host_organization_lineage":["https://openalex.org/I133837150"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Book Chapter"},{"id":"pmh:oai:pure.atira.dk:publications/512e5901-787c-4efd-8b77-446b456283e9","is_oa":false,"landing_page_url":"https://pure.hud.ac.uk/en/publications/512e5901-787c-4efd-8b77-446b456283e9","pdf_url":null,"source":{"id":"https://openalex.org/S4306402508","display_name":"Huddersfield Research Portal (University of Huddersfield)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I133837150","host_organization_name":"University of Huddersfield","host_organization_lineage":["https://openalex.org/I133837150"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Papakonstantinou, V, Michou, M, Fundulaki, I, Flouris, G & Antoniou, G 2012, Access Control for RDF Graphs using Abstract Models. in SACMAT'12 : Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery (ACM), New York, pp. 103-112, 17th ACM Symposium on Access Control Models and Technologies, Newark, New Jersey, United States, 20/06/12. https://doi.org/10.1145/2295136.2295155","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W42230206","https://openalex.org/W1498451101","https://openalex.org/W1506943641","https://openalex.org/W1532834088","https://openalex.org/W1548523074","https://openalex.org/W1581901575","https://openalex.org/W1608617956","https://openalex.org/W1977515256","https://openalex.org/W2027499911","https://openalex.org/W2059518496","https://openalex.org/W2131785201","https://openalex.org/W2134170665","https://openalex.org/W2138552351","https://openalex.org/W2144044428","https://openalex.org/W2152577585","https://openalex.org/W2154687603","https://openalex.org/W2242459625","https://openalex.org/W2293299776","https://openalex.org/W2470963247","https://openalex.org/W2796319054","https://openalex.org/W2914648361","https://openalex.org/W4285719527","https://openalex.org/W6630867488","https://openalex.org/W7008139197"],"related_works":["https://openalex.org/W4206665951","https://openalex.org/W4301152651","https://openalex.org/W3107051279","https://openalex.org/W2602535883","https://openalex.org/W3082761338","https://openalex.org/W3171256892","https://openalex.org/W2615202182","https://openalex.org/W3150241097","https://openalex.org/W199330785","https://openalex.org/W2770351630"],"abstract_inverted_index":{"The":[0,61],"Resource":[1],"Description":[2],"Framework":[3],"(RDF)":[4],"has":[5],"become":[6],"the":[7,14,18,27,45,55,95,105,117,120,123,144,158,193,196,205,223,233,243,246,250,262],"defacto":[8],"standard":[9],"for":[10,225],"representing":[11],"information":[12],"in":[13,157,170],"Semantic":[15],"Web.":[16],"Given":[17],"increasing":[19],"amount":[20],"of":[21,47,58,68,92,108,119,143,160,195,204,218,235,245,254],"sensitive":[22],"RDF":[23,59,78,86,96],"data":[24],"available":[25],"on":[26,202],"Web,":[28],"it":[29],"becomes":[30],"increasingly":[31],"critical":[32],"to":[33,37,53,76,126,149,178,232],"guarantee":[34],"secure":[35],"access":[36,50,81,106,137,184],"this":[38,41,103,154],"content.":[39],"In":[40,102],"paper":[42],"we":[43,198],"advocate":[44],"use":[46],"an":[48,141,215],"abstract":[49,69,145,161,227],"control":[51],"model":[52,62,85],"ensure":[54],"selective":[56],"exposure":[57],"information.":[60,82],"is":[63,111,229,239],"defined":[64],"by":[65,242],"a":[66,109,112,171],"set":[67,217],"operators":[70,84,124,148,164],"and":[71,90,99,122,147,163,207,252,256],"tokens.":[72],"Tokens":[73],"are":[74],"used":[75],"label":[77,107],"triples":[79,121,236],"with":[80,181],"Abstract":[83],"Schema":[87],"inference":[88],"rules":[89],"propagation":[91],"labels":[93,118],"along":[94],"Schema(RDFS)":[97],"class":[98,255],"property":[100,257],"hierarchies.":[101],"way,":[104],"triple":[110],"complex":[113],"expression":[114],"that":[115,139,175,222],"involves":[116],"applied":[125],"obtain":[127],"said":[128],"label.":[129],"Different":[130],"applications":[131],"can":[132,165],"then":[133],"adopt":[134],"different":[135,182],"concrete":[136,150,183,264],"policies":[138,185],"encode":[140],"assignment":[142],"tokens":[146,162],"(specific)":[151],"values.":[152],"Following":[153],"approach,":[155,197],"changes":[156],"interpretation":[159],"be":[166],"easily":[167,179],"implemented":[168,199],"resulting":[169],"very":[172],"flexible":[173],"mechanism":[174],"allows":[176],"one":[177],"experiment":[180],"(defined":[186],"per":[187],"context":[188],"or":[189],"user).":[190],"To":[191],"demonstrate":[192],"feasibility":[194],"our":[200],"ideas":[201],"top":[203],"MonetDB":[206],"PostgreSQL":[208],"open":[209],"source":[210],"database":[211],"systems.":[212],"We":[213],"conducted":[214],"initial":[216],"experiments":[219],"which":[220],"showed":[221],"overhead":[224],"using":[226],"expressions":[228],"roughly":[230],"linear":[231],"number":[234],"considered;":[237],"performance":[238],"also":[240],"affected":[241],"characteristics":[244],"dataset,":[247],"such":[248],"as":[249,259,261],"size":[251],"depth":[253],"hierarchies":[258],"well":[260],"considered":[263],"policy.":[265]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
