SHACL-ACL: Access Control with SHACL

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandBeitrag in Buch/SammelwerkForschungPeer-Review

Autoren

  • Philipp D. Rohde
  • Enrique Iglesias
  • Maria-Esther Vidal

Organisationseinheiten

Externe Organisationen

  • Technische Informationsbibliothek (TIB) Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
Titel des SammelwerksThe Semantic Web
UntertitelESWC 2023 Satellite Events
Herausgeber/-innenCatia Pesquita, Hala Skaf-Molli, Vasilis Efthymiou, Sabrina Kirrane, Axel Ngonga, Diego Collarana, Renato Cerqueira, Mehwish Alam, Cassia Trojahn, Sven Hertling
Seiten22-26
Seitenumfang5
ISBN (elektronisch)978-3-031-43458-7
PublikationsstatusVeröffentlicht - 2023

Publikationsreihe

NameLectur Notes in Computer Science
Band13998
ISSN (Print)0302-9743
ISSN (elektronisch)1611-3349

Abstract

The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.

ASJC Scopus Sachgebiete

Zitieren

SHACL-ACL: Access Control with SHACL. / Rohde, Philipp D.; Iglesias, Enrique; Vidal, Maria-Esther.
The Semantic Web: ESWC 2023 Satellite Events. Hrsg. / Catia Pesquita; Hala Skaf-Molli; Vasilis Efthymiou; Sabrina Kirrane; Axel Ngonga; Diego Collarana; Renato Cerqueira; Mehwish Alam; Cassia Trojahn; Sven Hertling. 2023. S. 22-26 (Lectur Notes in Computer Science; Band 13998).

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandBeitrag in Buch/SammelwerkForschungPeer-Review

Rohde, PD, Iglesias, E & Vidal, M-E 2023, SHACL-ACL: Access Control with SHACL. in C Pesquita, H Skaf-Molli, V Efthymiou, S Kirrane, A Ngonga, D Collarana, R Cerqueira, M Alam, C Trojahn & S Hertling (Hrsg.), The Semantic Web: ESWC 2023 Satellite Events. Lectur Notes in Computer Science, Bd. 13998, S. 22-26. https://doi.org/10.1007/978-3-031-43458-7_4
Rohde, P. D., Iglesias, E., & Vidal, M.-E. (2023). SHACL-ACL: Access Control with SHACL. In C. Pesquita, H. Skaf-Molli, V. Efthymiou, S. Kirrane, A. Ngonga, D. Collarana, R. Cerqueira, M. Alam, C. Trojahn, & S. Hertling (Hrsg.), The Semantic Web: ESWC 2023 Satellite Events (S. 22-26). (Lectur Notes in Computer Science; Band 13998). https://doi.org/10.1007/978-3-031-43458-7_4
Rohde PD, Iglesias E, Vidal ME. SHACL-ACL: Access Control with SHACL. in Pesquita C, Skaf-Molli H, Efthymiou V, Kirrane S, Ngonga A, Collarana D, Cerqueira R, Alam M, Trojahn C, Hertling S, Hrsg., The Semantic Web: ESWC 2023 Satellite Events. 2023. S. 22-26. (Lectur Notes in Computer Science). Epub 2023 Okt 21. doi: 10.1007/978-3-031-43458-7_4
Rohde, Philipp D. ; Iglesias, Enrique ; Vidal, Maria-Esther. / SHACL-ACL : Access Control with SHACL. The Semantic Web: ESWC 2023 Satellite Events. Hrsg. / Catia Pesquita ; Hala Skaf-Molli ; Vasilis Efthymiou ; Sabrina Kirrane ; Axel Ngonga ; Diego Collarana ; Renato Cerqueira ; Mehwish Alam ; Cassia Trojahn ; Sven Hertling. 2023. S. 22-26 (Lectur Notes in Computer Science).
Download
@inbook{0179e6f8309e486e8970f3beafbcb7d6,
title = "SHACL-ACL: Access Control with SHACL",
abstract = "The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.",
keywords = "Access Control, Privacy, SHACL",
author = "Rohde, {Philipp D.} and Enrique Iglesias and Maria-Esther Vidal",
note = "Funding Information: This work has been partially supported by the EU H2020 RIA funded project CLARIFY (grant agreement No 875160) and the Federal Ministry for Economic Affairs and Energy of Germany (BMWK) in the project CoyPu (project number 01MK21007[A-L]).",
year = "2023",
doi = "10.1007/978-3-031-43458-7_4",
language = "English",
isbn = "978-3-031-43457-0",
series = "Lectur Notes in Computer Science",
pages = "22--26",
editor = "Catia Pesquita and Hala Skaf-Molli and Vasilis Efthymiou and Sabrina Kirrane and Axel Ngonga and Diego Collarana and Renato Cerqueira and Mehwish Alam and Cassia Trojahn and Sven Hertling",
booktitle = "The Semantic Web",

}

Download

TY - CHAP

T1 - SHACL-ACL

T2 - Access Control with SHACL

AU - Rohde, Philipp D.

AU - Iglesias, Enrique

AU - Vidal, Maria-Esther

N1 - Funding Information: This work has been partially supported by the EU H2020 RIA funded project CLARIFY (grant agreement No 875160) and the Federal Ministry for Economic Affairs and Energy of Germany (BMWK) in the project CoyPu (project number 01MK21007[A-L]).

PY - 2023

Y1 - 2023

N2 - The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.

AB - The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.

KW - Access Control

KW - Privacy

KW - SHACL

UR - http://www.scopus.com/inward/record.url?scp=85176013311&partnerID=8YFLogxK

U2 - 10.1007/978-3-031-43458-7_4

DO - 10.1007/978-3-031-43458-7_4

M3 - Contribution to book/anthology

SN - 978-3-031-43457-0

T3 - Lectur Notes in Computer Science

SP - 22

EP - 26

BT - The Semantic Web

A2 - Pesquita, Catia

A2 - Skaf-Molli, Hala

A2 - Efthymiou, Vasilis

A2 - Kirrane, Sabrina

A2 - Ngonga, Axel

A2 - Collarana, Diego

A2 - Cerqueira, Renato

A2 - Alam, Mehwish

A2 - Trojahn, Cassia

A2 - Hertling, Sven

ER -