Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2108616.2108655acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Context data abstraction framework using RDF

Published: 14 January 2010 Publication History

Abstract

Context data in context-aware ubiquitous systems usually have private information for customized services. Although access control systems may be used to prevent unpermitted subjects from accessing private data, it would also stop execution of useful customized services. To solve this problem, this paper suggests a method of abstracting context data which enables data owners to deliver less detailed information to data requesters. With a set of intelligent RDF schema, inference rule and negotiation document, it can avoid providing excessive data and can keep service continuity.

References

[1]
Wikipedia, http://www.wikipedia.org
[2]
Sandu, R. S., Coyne, F. J., and Youman, C. E. 1996. Role-based access control models. IEEE computer. 29(2), 38--47.
[3]
Sandu, R. S., Ferraiolo, D. F., and Kyhn, D. R. 2000. The Nist Model for Role Based Access Control: Toward a Unified Standard. In Proceedings of 5th ACM Workshop on Role Based Access Control. 47--63.
[4]
Roshan K. Thomas. 1997. Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In Proceedings of the second ACM workshop on Role-based access control. 13--19.
[5]
Fahad, T. A. and Chen, J. X. 2004. A Model for Team-based Access Control (TMAC2004). In Proceedings of the International Conference on Information Technology: Coding and Computing(ITCC'04).
[6]
Ryan, W., Karen, H., and Jadwiga I. 2005. Context Obfuscation for Privacy via Ontological Descriptions. In Proceedings of the International Workshop on Location and Context-Awareness 2005. 276--278.
[7]
Emin, I. T. 2006. Context Data Model for Privacy. Prime Standardization Workshop.
[8]
P3P: The Platform for Privacy Preferences. http://www.w3.org/P3P/
[9]
Resource Description Framework (RDF), http://www.w3.org/RDF/
[10]
GeoPriv Location/Privacy, http://www.ietf.org/html.charters/geopriv-charter.html
[11]
Jena - A Semantic Web Framework for Java, http://jena.sourceforge.net/
[12]
Yun-Sam, K., Eun-Sun, C., and We-Duke, C. 2009. Apparatus and Method for Abstracting of Personal Information. Korea patent application 10-2009-0100349. 2009-10-21.
[13]
SPARQL Query Language for RDF, http://www.w3.org/TR/rdf-sparql-query
[14]
Samarati, P. 2001. Protecting Respondent's Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering. Vol.13. 1010--1027.
[15]
Ashwin, M., Daniel, K., Johannes G., and Muthuramakrishnan, V. 2007. 1-Diversity: Privacy beyond k-Anonymity. ACM Transactions on Knowledge Discovery from DATA. Vol.1 Issuer 1.
[16]
Ninghui, L., and Tiancheng, L. 2007. t-Closeness: Privacy Beyond k-Anonymity and 1-Diversity. In Proceedings of IEEE 23th Int'l Conf. on Data Engineering.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
January 2010
550 pages
ISBN:9781605588933
DOI:10.1145/2108616
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 January 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. RDF (resource description framework)
  2. abstraction
  3. access control
  4. negotiation

Qualifiers

  • Research-article

Conference

ICUIMC '10
Sponsor:

Acceptance Rates

Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 101
    Total Downloads
  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media