SHACL-ACL: Access Control with SHACL

Research output: Chapter in book/report/conference proceedingContribution to book/anthologyResearchpeer review

Authors

  • Philipp D. Rohde
  • Enrique Iglesias
  • Maria-Esther Vidal

Research Organisations

External Research Organisations

  • German National Library of Science and Technology (TIB)
View graph of relations

Details

Original languageEnglish
Title of host publicationThe Semantic Web
Subtitle of host publicationESWC 2023 Satellite Events
EditorsCatia Pesquita, Hala Skaf-Molli, Vasilis Efthymiou, Sabrina Kirrane, Axel Ngonga, Diego Collarana, Renato Cerqueira, Mehwish Alam, Cassia Trojahn, Sven Hertling
Pages22-26
Number of pages5
ISBN (electronic)978-3-031-43458-7
Publication statusPublished - 2023

Publication series

NameLectur Notes in Computer Science
Volume13998
ISSN (Print)0302-9743
ISSN (electronic)1611-3349

Abstract

The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.

Keywords

    Access Control, Privacy, SHACL

ASJC Scopus subject areas

Cite this

SHACL-ACL: Access Control with SHACL. / Rohde, Philipp D.; Iglesias, Enrique; Vidal, Maria-Esther.
The Semantic Web: ESWC 2023 Satellite Events. ed. / Catia Pesquita; Hala Skaf-Molli; Vasilis Efthymiou; Sabrina Kirrane; Axel Ngonga; Diego Collarana; Renato Cerqueira; Mehwish Alam; Cassia Trojahn; Sven Hertling. 2023. p. 22-26 (Lectur Notes in Computer Science; Vol. 13998).

Research output: Chapter in book/report/conference proceedingContribution to book/anthologyResearchpeer review

Rohde, PD, Iglesias, E & Vidal, M-E 2023, SHACL-ACL: Access Control with SHACL. in C Pesquita, H Skaf-Molli, V Efthymiou, S Kirrane, A Ngonga, D Collarana, R Cerqueira, M Alam, C Trojahn & S Hertling (eds), The Semantic Web: ESWC 2023 Satellite Events. Lectur Notes in Computer Science, vol. 13998, pp. 22-26. https://doi.org/10.1007/978-3-031-43458-7_4
Rohde, P. D., Iglesias, E., & Vidal, M.-E. (2023). SHACL-ACL: Access Control with SHACL. In C. Pesquita, H. Skaf-Molli, V. Efthymiou, S. Kirrane, A. Ngonga, D. Collarana, R. Cerqueira, M. Alam, C. Trojahn, & S. Hertling (Eds.), The Semantic Web: ESWC 2023 Satellite Events (pp. 22-26). (Lectur Notes in Computer Science; Vol. 13998). https://doi.org/10.1007/978-3-031-43458-7_4
Rohde PD, Iglesias E, Vidal ME. SHACL-ACL: Access Control with SHACL. In Pesquita C, Skaf-Molli H, Efthymiou V, Kirrane S, Ngonga A, Collarana D, Cerqueira R, Alam M, Trojahn C, Hertling S, editors, The Semantic Web: ESWC 2023 Satellite Events. 2023. p. 22-26. (Lectur Notes in Computer Science). Epub 2023 Oct 21. doi: 10.1007/978-3-031-43458-7_4
Rohde, Philipp D. ; Iglesias, Enrique ; Vidal, Maria-Esther. / SHACL-ACL : Access Control with SHACL. The Semantic Web: ESWC 2023 Satellite Events. editor / Catia Pesquita ; Hala Skaf-Molli ; Vasilis Efthymiou ; Sabrina Kirrane ; Axel Ngonga ; Diego Collarana ; Renato Cerqueira ; Mehwish Alam ; Cassia Trojahn ; Sven Hertling. 2023. pp. 22-26 (Lectur Notes in Computer Science).
Download
@inbook{0179e6f8309e486e8970f3beafbcb7d6,
title = "SHACL-ACL: Access Control with SHACL",
abstract = "The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.",
keywords = "Access Control, Privacy, SHACL",
author = "Rohde, {Philipp D.} and Enrique Iglesias and Maria-Esther Vidal",
note = "Funding Information: This work has been partially supported by the EU H2020 RIA funded project CLARIFY (grant agreement No 875160) and the Federal Ministry for Economic Affairs and Energy of Germany (BMWK) in the project CoyPu (project number 01MK21007[A-L]).",
year = "2023",
doi = "10.1007/978-3-031-43458-7_4",
language = "English",
isbn = "978-3-031-43457-0",
series = "Lectur Notes in Computer Science",
pages = "22--26",
editor = "Catia Pesquita and Hala Skaf-Molli and Vasilis Efthymiou and Sabrina Kirrane and Axel Ngonga and Diego Collarana and Renato Cerqueira and Mehwish Alam and Cassia Trojahn and Sven Hertling",
booktitle = "The Semantic Web",

}

Download

TY - CHAP

T1 - SHACL-ACL

T2 - Access Control with SHACL

AU - Rohde, Philipp D.

AU - Iglesias, Enrique

AU - Vidal, Maria-Esther

N1 - Funding Information: This work has been partially supported by the EU H2020 RIA funded project CLARIFY (grant agreement No 875160) and the Federal Ministry for Economic Affairs and Energy of Germany (BMWK) in the project CoyPu (project number 01MK21007[A-L]).

PY - 2023

Y1 - 2023

N2 - The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.

AB - The number of publicly accessible knowledge graphs is increasing and so are their applications. Knowledge graphs may contain private data and need to be protected against unauthorized access. There are different approaches for access control to knowledge graphs, e.g., user-based or policy-based. User-based access control can be hard to maintain in systems with hundreds or even thousands of users. In contrast, policy-based approaches use rules to decide whether the access should be granted or denied. ODRL is designed for licensing but also used for policy-based access control. Hence, the evaluation of access policies is not defined and no external data can be considered during the decision-making process. Policies can be seen as integrity constraints and, hence, it is natural to specify them in SHACL; the semantics of SHACL validation are well-defined. SHACL-ACL demonstrates how SHACL can be utilized in a policy-based access control approach. Furthermore, utilizing RML mappings, SHACL-ACL is capable of considering data from various heterogeneous sources for the policy evaluation, e.g., JSON data from Web APIs. The demo is available as an interactive Jupyter notebook.

KW - Access Control

KW - Privacy

KW - SHACL

UR - http://www.scopus.com/inward/record.url?scp=85176013311&partnerID=8YFLogxK

U2 - 10.1007/978-3-031-43458-7_4

DO - 10.1007/978-3-031-43458-7_4

M3 - Contribution to book/anthology

SN - 978-3-031-43457-0

T3 - Lectur Notes in Computer Science

SP - 22

EP - 26

BT - The Semantic Web

A2 - Pesquita, Catia

A2 - Skaf-Molli, Hala

A2 - Efthymiou, Vasilis

A2 - Kirrane, Sabrina

A2 - Ngonga, Axel

A2 - Collarana, Diego

A2 - Cerqueira, Renato

A2 - Alam, Mehwish

A2 - Trojahn, Cassia

A2 - Hertling, Sven

ER -