<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Access Control on RDF Triple Stores from a Semantic Wiki Perspective</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sebastian Dietzold</string-name>
          <email>dietzold@informatik.uni-leipzig.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>S¨oren Auer</string-name>
          <email>auer@informatik.uni-leipzig.de</email>
          <email>auer@seas.upenn.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Universit ̈at Leipzig Department of Computer Science</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Pennsylvania Department of Computer and Information Science</institution>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>RDF triple stores are used to store and query large RDF models. Semantic Web applications built on top of such triple stores require methods allowing high-performance access control not restricted to per model directives. For the growing number of lightweight, scripted Semantic Web applications it is crucial to rely on access control methods which maintain a balance between expressiveness, simplicity and scalability. Starting from a Semantic Wiki application scenario we collect requirements for useful access control methods provided by the triple store. We derive a basic model for triple store access according to these requirements and review existing approaches in the field of policy management with regard to the requirements. Finally, a lightweight access control framework based on rule-controlled query filters is described.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The efficient implementation of a Semantic Web application particularly
depends on the underlying RDF API and triple store. Today’s RDF triple stores
are mostly build upon relational database management systems with dedicated
database schemata and corresponding API methods which rewrite knowledge
base queries into database queries (e.g. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]). However, access control at
the level of the underlying relational database lacks granularity if based on the
entities table, row and database. There exist APIs which do not depend on a
relational database (e.g. Redland [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and Sesame [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]) but also when basing on
them, the Semantic Web application has to establish access control mechanisms
on their own.
      </p>
      <p>We are convinced, that future RDF triple stores will be used as backends for
application systems in analogy to existing relational databases. Assuming this,
it is important to develop access control methods which do rely on the RDF
data model and enable access controll with respect to metamodels based on the
RDF data model, such as RDF-Schema and the different OWL flavors. A longer
term aim is to make such methods integral part of future triple stores.</p>
      <p>
        To have a more solid starting point for the formulation of requirements we
selected the application scenario of Semantic Wikis. We define a Semantic Wiki
as a collaborative software for modifying a shared knowledge base. Further, we
assume this knowledge base to be an RDF graph which consists of RDF triples.
A Semantic Wiki supports the collaborative process of instance acquisition and
curation with respect to an often fuzzy and not well defined goal. This definition
does not make any assumptions about the user frontend, because these wiki
design principles are defined in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and are independent of the prefix ”semantic”.
1
      </p>
    </sec>
    <sec id="sec-2">
      <title>Requirements on Access Control for a Semantic Wiki</title>
    </sec>
    <sec id="sec-3">
      <title>RDF Triple Store</title>
      <p>In a ‘classic’ wiki we are used to think in access categories like account and page:
an account has certain rights with respect to a page1. The specific rights which
can be granted or revoked are typically the rights to read, modify, delete and
annotate the page and to grant such rights for this page to some other account.
Further, pages can be arranged in a page tree, which makes the application of
access control rules on a page subtree necessary.</p>
      <p>For a Semantic Wiki, the base entities we have to consider are not accounts
and pages but sets of triples. Also, accounts and annotations can be identified
using URI references and information about them represented as triples. Hence,
access control should work on the granularity level of triples as well as on higher
levels, such as the description of a resource (i.e. all triples having the same
subject) or instances of a certain class.</p>
      <p>
        Based upon our Semantic Wiki definition and the work with our prototype
3ba.se [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] we identified the following requirements for access control on the
underlying RDF triple store:
– Efficiency and scalability should have precedence over expressive power. In
modern web applications with complex and dynamic user frontends, query
processing has to be as fast as possible. This requirement is more important
than expressive power of the access control language since there are usually
hundreds of queries to the store triggered by a single web request.
– As a minimal requirement we need context- and content-sensitive triple
filtering in a declarative way. This means the access to a tiple set depends on
the accounts metadata (e.g. membership information) as well as on the
content of the wanted triple set itself (e.g. enforce to give all needed attributes
to some resource).
– Access control declaration should be able to use organisational information
like command structure and group membership information from inside the
controlled or another RDF model. For the most common architectures used
for the storage of organisational data inside a company etc., methods exist
to migrate or RDF-ify such organizational memory (e.g. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] for relational
1 It is important to distinguish between an idealistic wiki with absolutely no access
control and realistic wikis, where access control and wiki are not mutually exclusive.
databases and [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] for LDAP directories). It should be possible to use this
data to express access control declarations.
      </p>
      <p>In the next section we survey shortly existing research projects which are
related to the topic of access control on RDF triple stores.
2</p>
    </sec>
    <sec id="sec-4">
      <title>Related work</title>
      <p>
        The research field policy management for the Semantic Web addresses machine
interpretable policies to control programs, services and agents on the Web. It is
not restricted to security and privacy but also tackles problems related to trust
(e.g. trust in resource quality or agents), information filtering, accountability
and others. An overview of the current projects is available in the workshop
proceedings [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]).
      </p>
      <p>
        However, most projects have a different intentions than this work. A
policybased management framework in the sense of [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] aims at an open semantic
network environment. In this network the behavior of agents and services is
controlled by reasoned decisions over policies. This is necessary due to the
complexity of the global approach of controlling all possible agents and services with
all possible actions. An example for such a system is Rei [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] which supports
specification of policies, analysis and reasoning in pervasive computing
applications.
      </p>
      <p>Due to the fact that reasoning procedures are still not scalable to scope with
larger knowledge bases, such capabilities can not applied in RDF triple stores
today. Another objection to reasoning is the open world assumption, because no
external sources are used and access control answers in a closed triple store are
limited to yes and no.</p>
      <p>
        Policy management is not only access control but also information filtering
based on quality and trust properties. This is necessary whilst operating in a
network of distributed resources which are not trustworthy per default. The
TriQL.P [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] browser uses queries for filtering information from different sources
and qualities. This filter approach is also part of the framework described here.
      </p>
      <p>
        Another possible approach is the usage of explicit rules (which our approach
also makes use of). An example for such a system is [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Again, the scope of
this system is not an RDF triple store but distributed resources on a network
and the access to these resources.
      </p>
      <p>Summarizing we can state that all these systems operate with a different
communication model. However, an RDF triple store can be seen as an agent in
these frameworks, while the access control layer for the RDF triple store itself
operates on a more basic and lightweight model.
3</p>
    </sec>
    <sec id="sec-5">
      <title>A Basic Model for Access on RDF Triple Stores</title>
      <p>
        In order that we can develop an access control framework which solves the given
requirements, we have to specify a clear communication model for the target
environment. In this basic model for access on RDF triple stores, we define
three atomic actions:
– Reading a set of triples from a stored model: The account queries the triple
store with a formal query language (e.g. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] and [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]) or selects some
triples with a more simple method (e.g. a triple pattern). The answer of the
triple store is a set of triples which constitutes the intersection of the wanted
and the allowed triple set. Most of todays query languages can query not
only for submodels. A common result value is a set of variable bindings.
Nevertheless there was a requested set of triple which was necessary for the
computation of the result set.
– Adding a set of triples to a stored model: The account sends the dedicated
triple set to the triple store. The store removes all the triples which are not
allowed to be written and adds each of the remaining triples, if they are not
already contained in the model.
– Removing a set of triples from a stored model: The account sends the
dedicated triple set to the triple store. The store removes all the triples which
are not allowed to be deleted and deletes each of the remaining triples, if
they exist in the stored model.
      </p>
      <p>The approach presented in [18] adds more atomic actions here to the above
listed ones. They distinguish between one-triple actions, triple-set actions and
reasoned-set actions. In this basic model neither one-triple actions nor
reasonedset actions need to be considered because:
– A one-triple action can be seen as a specialization of a triple-set action.
– We define a reasoner application as an agent which holds a specific account
with certain rights to a triple store. Following this, reasoned-set actions are
combinations of normal triple-set actions which are performed by the
reasoner agent.</p>
      <p>In the next section, we describe an access control framework which is based
on this communication model.
4</p>
    </sec>
    <sec id="sec-6">
      <title>Lightweight Framework for Access Control on RDF</title>
    </sec>
    <sec id="sec-7">
      <title>Triple Stores</title>
      <p>
        As denoted in section 2, we use explicit rules and query filters as the primarily
parts of our framework. The whole framework consists of four parts:
– A query engine which can apply subset selection query filters to a given
model. In this paper we assume that this is a query engine for the SPARQL
query language [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] but generally the approach is not limited to a specific
query language.
– A rule processor which decides whether a query filter is fired for a given
action or not. We assume that the used decision rules are described by using
the Semantic Web Rule Language (SWRL, [19]) but also, this part can be
replaced by an equivalent one.
– A minimalistic RDF schema called Lightweight Access Control Schema (LACS,
[20]), which describes a basic vocabulary to store rules and query filters.
– The access control processor, which starts the query engine and rule processor
as needed and maintains some session data.
      </p>
      <p>A fundamental concept of the framework is the presentation of a virtual
model to the account instead of the real one. This virtual model is created
from the real model and modified through the query filters selected by the rule
processor. Thereby, the decision rules can reference to and use resources from
the following three different models:
– Session Model: This model holds information about the active session (which
account is doing what). The triple of this model are dynamically created for
every new action on the triple store.
– User model: This is the data which the account wants to get access to but
it can used by the decision rules too.
– Maintenance Model: This model consists of decision rules and filters as well
as all other maintenance data like group or account information. The
vocabulary for the filter and rule description comes from the lightweight access
control schema and from the SWRL specification. The maintenance data
which is used by the rules to decide the application of a query filter is not
fixed, so rules can be created for every available environment, e.g. a FOAF
database or an LDAP backend.</p>
      <p>The following example maintenance model consists of two filters and rules.
They are created for the following two reading conditions:
– All admins can read every triple.
– All accounts which are from type foaf:Person2 may read only triples where
the subject is of type foaf:Person.</p>
      <p>The rules to effect this behavior are:</p>
      <p>rdf:type(lacs:CurrentAction, lacs:Read)
∧ rdf:sameAs(lacs:CurrentAccount, ?a)
∧ foaf:member(:Admins, ?a)
→ lacs:addAndStop(:currentAction, :AllFilter)</p>
      <p>rdf:type(lacs:CurrentAction, lacs:Read)
∧ rdf:sameAs(lacs:CurrentAccount, ?a)
∧ rdf:type(foaf:Person, ?a)
→ lacs:add(:currentAction, :FoafOnlyFilter)</p>
      <p>They reference triples in the maintenance model, which describe a group and
a member of this groups with the commonly used FOAF vocabulary:
2 We assume, that the namespaces rdf, rdfs, foaf and ruleml are predefined for all
examples. The namespace lacs is used for the vocabulary described in [20]. All RDF
examples are given in Notation 3 (N3, [21]).
: Admins a foaf : Group ;</p>
      <p>foaf : member : UserSD .
: UserSD a foaf : Person ;
foaf : name " Sebastian Dietzold ".</p>
      <p>These rules reference two query filters. These query filters are given in a
specific query syntax and are represented in the RDF with the LACS vocabulary:
: AllFilter a lacs : Filter ;
rdfs : label " no restriction filter ";
lacs : sparql " CONSTRUCT { ?s ?p ?o } WHERE { ?s ?p ?o }".
: FoafOnlyFilter a lacs : Filter ;
rdfs : label " read only FOAF address book ";
lacs : sparql """ CONSTRUCT { ?s ?p ?o }</p>
      <p>WHERE {? s rdf : type foaf : Person . ?s ?p ?o }""".</p>
      <p>To give explicit instructions for the access control processor, the rules are
represented in RDF and enriched with metadata. The first one is annotated by
using the SWRL vocabulary referenced by the namespace ruleml, the latter by
using the LACS vocabulary.</p>
      <p>The next part defines two lacs:rule entities which references to SWRL
implication rules (not displayed here). Important for the access control processor
is the priority of the rules, since the rule selection (see figure 1) is ordered by
this property.
_ :123 a lacs : Rule ;
rdfs : label " Admins can read everything ";
lacs : priority 10;
lacs : swrlImp [
a ruleml : imp ;
# ... rule definition ...</p>
      <p>].
_ :321 a lacs : Rule ;
rdfs : label " User can read only foaf : Persons ";
lacs : priority 100;
lacs : swrlImp [
a ruleml : imp ;
# ... rule definition ...</p>
      <p>].</p>
      <p>Based on this example maintenance model, a sample reading action is
processed according figure 1.</p>
      <p>First of all, the Session Model is modified by the access control processor to
represent the current session. Again, the LACS vocabulary is used:
lacs : currentUser = : User2 .
lacs : currentAction a lacs : Read .</p>
      <p>After that, the first rule is selected and evaluated by the rule engine. In
the example maintenance model, this is the ”Admins can read everything” rule.
Due to this rule, no filter is fired because the user is not member of the admin
group. The next rule will be selected and due to this rule, the filter ”read only
FOAF address book” is fired. So the query process creates the virtual model as
it applies filters to the user model. Because there is no other rule, the processor
leaves this cycle and presents the virtual model to the user.</p>
      <p>This was an example for a reading action. For this type of action, the user
query is processed against the virtual model. For writing actions, the filters are
not processed against the user model but rather against the model which is
supplied by the user (i.e. the triples, he wants to add or delete). After modifying
this model according the rules, the add or delete action is processed.
5</p>
    </sec>
    <sec id="sec-8">
      <title>Conclusion</title>
      <p>We have presented a lightweight access control framework for RDF triple stores
based on requirements derived from usage scenarios within a Semantic Wiki
application. The basic idea of this framework is the presentation of a virtual
model instead of the real one. This model is generated by filtering the original
model. Filter are selected by rules. In the examples, we use SPARQL for filtering
and SWRL as rule language.</p>
      <p>The presented framework strongly depends on the lightweight communication
model given in section 3. So it is not intended to be a general access control
framework for the Semantic Web. Instead it is designed to be a fast, reliable and
easy to implement as part of an RDF triple store. In order to achieve this, we
focused on a clear execution algorithm with explicit rules, but do not use any
reasoning capabilities.</p>
      <p>One important advantage when compared to other approaches is the
possibility to create both simple and complex access control environments as necessary.
Also, the minimal requirements to the underlying maintenance model are small,
so that administrators can maximally reuse existing models within their rules.
18. Reddivari, P., Finin, T., Joshi, A.: Policy based access control for an RDF store.</p>
      <p>In Kagal, L., Finin, T., Hendler, J., eds.: Policy Management for the Web. (2005)
78–81
19. Horrocks, I., Patel-Schneider, P.F., Boley, H., Tabet, S., Grosof, B., Dean,
M.: SWRL: A Semantic Web Rule Language Combining OWL and
RuleML. W3c member submission, World Wide Web Consortium (W3C) (2004)
http://www.w3.org/Submission/2004/SUBM-SWRL-20040521/.
20. Dietzold, S.: LACS: Lightweight Access Control Schema. OWL ontology (2006)
http://purl.org/net/lacs.
21. Berners-Lee, T.: Notation 3 - An readable language for data on the Web. Website
(1998) http://www.w3.org/DesignIssues/Notation3.html.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Wilkinson</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sayers</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuno</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reynolds</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Efficient RDF Storage and Retrieval in Jena2</article-title>
          .
          <source>In: Proceedings of First International Workshop on Semantic Web and Databases</source>
          <year>2003</year>
          . (
          <year>2003</year>
          )
          <fpage>131</fpage>
          -
          <lpage>150</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bizer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>RAP (RDF API for PHP)</article-title>
          .
          <source>Website</source>
          (
          <year>2004</year>
          ) http://www.wiwiss.fuberlin.de/suhl/bizer/rdfapi/.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Beckett</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The design and implementation of the Redland RDF application framework</article-title>
          .
          <source>Computer Networks</source>
          <volume>39</volume>
          (
          <year>2002</year>
          )
          <fpage>577</fpage>
          -
          <lpage>588</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Broekstra</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kampman</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van Harmelen</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Sesame: A Generic Architecture for Storing and Querying RDF and RDF Schema</article-title>
          . In Horrocks, I.,
          <string-name>
            <surname>Hendler</surname>
          </string-name>
          , J., eds.: The Semantic Web - ISWC
          <year>2002</year>
          . First International Semantic Web Conference, Sardinia, Italy, June 9-12,
          <year>2002</year>
          , Proceedings. Volume
          <volume>2342</volume>
          of Lecture Notes in Computer Science., Springer (
          <year>2002</year>
          )
          <fpage>54</fpage>
          -
          <lpage>68</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Leuf</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cunningham</surname>
            ,
            <given-names>W.:</given-names>
          </string-name>
          <article-title>The Wiki Way</article-title>
          .
          <string-name>
            <surname>Addison-Wesley</surname>
            <given-names>Longman</given-names>
          </string-name>
          , Amsterdam (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Auer</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dietzold</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Riechert</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>3ba.se Semantic Wiki</article-title>
          .
          <source>Prototype</source>
          (
          <year>2006</year>
          ) http://3ba.se.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bizer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seaborne</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>D2RQ -Treating Non-RDF Databases as Virtual RDF Graphs</article-title>
          .
          <source>Poster</source>
          (
          <year>2004</year>
          ) 3rd
          <source>International Semantic Web Conference (ISWC2004)</source>
          , Hiroshima, Japan.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Dietzold</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Generating RDF Models from LDAP Directories</article-title>
          . In Auer, S.,
          <string-name>
            <surname>Bizer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
          </string-name>
          , L., eds.
          <source>: Proceedings of the SFSW 05 Workshop on Scripting for the Semantic Web</source>
          , Hersonissos, Crete, Greece, May
          <volume>30</volume>
          ,
          <year>2005</year>
          . Volume 135 of CEUR Workshop Proceedings.,
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kagal</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
          </string-name>
          , J., eds.:
          <article-title>Policy Management for the Web</article-title>
          .
          <article-title>(</article-title>
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Kagal</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
          </string-name>
          , J., eds.
          <source>: Proceedings of the Semantic Web and Policy Workshop</source>
          , held in
          <source>conjunction with the 4th International Semantic Web Conference, 7 November</source>
          ,
          <year>2005</year>
          ,
          <string-name>
            <given-names>Galway</given-names>
            <surname>Ireland</surname>
          </string-name>
          . (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Tonti</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bradshaw</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jeffers</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Montanari</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Suri</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uszok</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and</article-title>
          <string-name>
            <given-names>Ponder. In</given-names>
            <surname>Fensel</surname>
          </string-name>
          , D.,
          <string-name>
            <surname>Sycara</surname>
            ,
            <given-names>K.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
          </string-name>
          , J., eds.:
          <source>The Semantic Web - ISWC</source>
          <year>2003</year>
          , Second International Semantic Web Conference, Sanibel Island, FL, USA, October
          <volume>20</volume>
          -
          <issue>23</issue>
          ,
          <year>2003</year>
          , Proceedings. Volume
          <volume>2870</volume>
          of Lecture Notes in Computer Science., Springer (
          <year>2003</year>
          )
          <fpage>419</fpage>
          -
          <lpage>437</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Kagal</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Rei: A Policy Language for the Me-Centric Project</article-title>
          .
          <source>Technical report, HP Labs</source>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Bizer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cyganiak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gauss</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maresch</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>The TriQL</article-title>
          .P Browser:
          <article-title>Filtering Information using Context-</article-title>
          ,
          <string-name>
            <surname>Content</surname>
          </string-name>
          - and
          <string-name>
            <surname>Rating-Based Trust</surname>
          </string-name>
          <article-title>Policies</article-title>
          . In Kagal, L.,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
          </string-name>
          , J., eds.
          <source>: Proceedings of the Semantic Web and Policy Workshop</source>
          , held in
          <source>conjunction with the 4th International Semantic Web Conference, 7 November</source>
          ,
          <year>2005</year>
          ,
          <string-name>
            <given-names>Galway</given-names>
            <surname>Ireland</surname>
          </string-name>
          . (
          <year>2005</year>
          )
          <fpage>12</fpage>
          -
          <lpage>20</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Design and Application of Rule Based Access Control Policies</article-title>
          . In Kagal, L.,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
          </string-name>
          , J., eds.
          <source>: Proceedings of the Semantic Web and Policy Workshop</source>
          , held in
          <source>conjunction with the 4th International Semantic Web Conference, 7 November</source>
          ,
          <year>2005</year>
          ,
          <string-name>
            <given-names>Galway</given-names>
            <surname>Ireland</surname>
          </string-name>
          . (
          <year>2005</year>
          )
          <fpage>34</fpage>
          -
          <lpage>41</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Prud'hommeaux</surname>
          </string-name>
          , E.,
          <string-name>
            <surname>Seaborne</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>SPARQL Query Language for RDF (Working Draft)</article-title>
          .
          <source>W3c working draft, World Wide Web Consortium (W3C)</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Seaborne</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>RDQL - A Query Language for RDF. W3c member submission</article-title>
          ,
          <source>World Wide Web Consortium (W3C)</source>
          (
          <year>2004</year>
          ) http://www.w3.org/Submission/2004/SUBM-RDQL-
          <volume>20040109</volume>
          /.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Karvounarakis</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alexaki</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Christophides</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plexousakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scholl</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>RQL: A Declarative Query Language for RDF</article-title>
          .
          <source>In: Proceedings of the eleventh international conference on World Wide Web</source>
          , ACM Press (
          <year>2002</year>
          )
          <fpage>592</fpage>
          -
          <lpage>603</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>