Details
Original language | English |
---|---|
Title of host publication | The Semantic Web |
Subtitle of host publication | ESWC 2023 Satellite Events |
Editors | Catia Pesquita, Hala Skaf-Molli, Vasilis Efthymiou, Sabrina Kirrane, Axel Ngonga, Diego Collarana, Renato Cerqueira, Mehwish Alam, Cassia Trojahn, Sven Hertling |
Pages | 22-26 |
Number of pages | 5 |
ISBN (electronic) | 978-3-031-43458-7 |
Publication status | Published - 2023 |
Publication series
Name | Lectur Notes in Computer Science |
---|---|
Volume | 13998 |
ISSN (Print) | 0302-9743 |
ISSN (electronic) | 1611-3349 |
Abstract
Keywords
- Access Control, Privacy, SHACL
ASJC Scopus subject areas
- Mathematics(all)
- Theoretical Computer Science
- Computer Science(all)
- General Computer Science
Cite this
- Standard
- Harvard
- Apa
- Vancouver
- BibTeX
- RIS
The Semantic Web: ESWC 2023 Satellite Events. ed. / Catia Pesquita; Hala Skaf-Molli; Vasilis Efthymiou; Sabrina Kirrane; Axel Ngonga; Diego Collarana; Renato Cerqueira; Mehwish Alam; Cassia Trojahn; Sven Hertling. 2023. p. 22-26 (Lectur Notes in Computer Science; Vol. 13998).
Research output: Chapter in book/report/conference proceeding › Contribution to book/anthology › Research › peer review
}
TY - CHAP
T1 - SHACL-ACL
T2 - Access Control with SHACL
AU - Rohde, Philipp D.
AU - Iglesias, Enrique
AU - Vidal, Maria-Esther
N1 - Funding Information: This work has been partially supported by the EU H2020 RIA funded project CLARIFY (grant agreement No 875160) and the Federal Ministry for Economic Affairs and Energy of Germany (BMWK) in the project CoyPu (project number 01MK21007[A-L]).
PY - 2023
Y1 - 2023
N2 - The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.
AB - The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.
KW - Access Control
KW - Privacy
KW - SHACL
UR - http://www.scopus.com/inward/record.url?scp=85176013311&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-43458-7_4
DO - 10.1007/978-3-031-43458-7_4
M3 - Contribution to book/anthology
SN - 978-3-031-43457-0
T3 - Lectur Notes in Computer Science
SP - 22
EP - 26
BT - The Semantic Web
A2 - Pesquita, Catia
A2 - Skaf-Molli, Hala
A2 - Efthymiou, Vasilis
A2 - Kirrane, Sabrina
A2 - Ngonga, Axel
A2 - Collarana, Diego
A2 - Cerqueira, Renato
A2 - Alam, Mehwish
A2 - Trojahn, Cassia
A2 - Hertling, Sven
ER -