<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Access rights and collaborative ontology integration for reuse across security domains ?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Martin Knechtel</string-name>
          <email>martin.knechtel@sap.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>SAP AG, SAP Research CEC Dresden Chemnitzer Str.</institution>
          <addr-line>48, 01187 Dresden</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This section gives a description of the overall research problem tackled in context of the Ph.D. and its relevance to the Semantic Web area. The problem domain for this extended abstract is a collaborative marketplace in the Semantic Web. In the planned pilot 2 of the application scenario PROCESSUS of the research program THESEUS [1], described products to be sold are Web services. They are traded like goods and described in documents. Ontologies can be used to define a shared vocabulary with concepts, properties and axioms. By referencing this shared vocabulary in product descriptions, a conceptual navigation over heterogeneous resources is possible.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>response
response
This induces that the ontology alone already contains insights about
resources’ contents. Different user roles are involved when accessing a semantic
marketplace, e.g. visitor, customer, high volume customer, provider. Since all of
them get different conditions and information detail about products, they get
different answers for ontology queries when posing the same question (cf. Fig. 1).
Access Control inside ontologies is one focus of the thesis.</p>
      <p>A second focus is collaborative ontology integration. Given the
functionality to have different views on a ontology for different user roles, one might also
? The project was funded by means of the German Federal Ministry of Economy and
Technology under the promotional reference "01MQ07012". The author takes the
responsibility for the contents.</p>
      <p>organization
marketplace
company B
company A
selected reuse of:
ontology modules</p>
      <p>only
ontology modules
+ resources
intranet portal</p>
      <p>marketplace portal
team portal
internal
restricted</p>
      <p>Intranet portal</p>
      <p>
        company web site
internal
public
security
domain
define a public view on the ontology which can be distributed for from a
company internal server to a Web marketplace (cf. Fig. 2). In opposite direction, a
company can also import the marketplace ontology, which might be based on a
product standard like eCl@ss [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>This section discusses the state of the art in the fields affected by the given
scenario.</p>
      <p>
        Semantic content management is studied e.g. for semantic portals [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Also
wikis can be used for semantic content management [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The contributions
describe the motivation and implementation of content management with ontology
support.
      </p>
      <p>
        Collaborative Ontology Engineering seems well investigated. Examples are
Ontolingua Server [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and Collaborative Protégé [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Since the marketplace is
a Web application, it is desirable to edit the ontology directly in the browser
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. This makes no tool change for contribution and consumption necessary and
changes can be tested directly in the application. This thesis’ focus is how
ontology contextualization can support collaboration.
      </p>
      <p>
        To reuse parts of an ontology from a company internal context, ontology
modularization is involved to decide if a module is complete [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In the other
direction conservative extensions are extensions of an ontology without
changing existing subsumption relations [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. An interesting question for the thesis is
how ontology modularization is influenced by assigned access rights. This is not
investigated so far.
      </p>
      <p>
        Fine grained access control inside ontologies is not well investigated in the
research community yet. The contribution [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] presents basic access control
methods and brings them in relation to ontologies. Although this work does not
provide technical details, recommendation for authority based access control
(ABAC) is given and justified. They propose that hierarchies can be used to
inherit rights. According to [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], information about axioms of an ontology can
be represented as context. This might be a starting point to represent access
rights.
      </p>
      <p>Authorization in other fields like file systems, content management systems,
database management systems etc. is modeled by access control lists or by
capabilities. Approaches often use hierarchies to inherit access rights. Due to the
nature of ontologies, having no tree but a graph structure, access rights
inheritance is of limited use. In the subsumption hierarchy a concept can be subconcept
of several others, which leads to multiple inheritance. Object relations between
concepts may form cycles. And it may be desired that a user can only see the
superconcepts but not the subconcepts or the other way round. There is a simliar
behaviour commonly used for FTP servers called chroot jail.</p>
      <p>
        There are approaches for access rights inside ontologies. While [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] is based
on a three-valued semantics and assumes an RDF tree without cyclic references,
we want to use Description Logics and not restrict ontology structure to a tree.
In [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] the focus is to restrict access on syntactically heterogeneous resources
with help of a harmonizing ontology. A security policy is stored separately from
the ontology, while we want to integrate it. An own ontology definition is used
which is not conform to OWL-DL [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] since e.g. axioms and individuals are
missing, while we want to use OWL-DL.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Contributions</title>
      <p>This section describes how the proposed project will advance state of the art
and summarizes expected contributions.</p>
      <p>From the related work section it seems that context can store information
about ontology axioms. The thesis will investigate if this context is suitable to
store access rights and collaboration information to support ontology reuse. The
following research questions will be subject of the thesis:
1. What is the right granularity for access control within an ontology: axiom,
module, whole ontology, others?
2. How are axiom rights propagated to resources?
3. Can ontology axiom rights be derived from resource rights, to improve
usability?
4. What effect has access control on reasoning and modularization?</p>
      <p>
        The contribution of the thesis will be a framework to answer the
conceptual questions, and an implementation to demonstrate the results. Therefore a
conception and a syntactical representation of access rights will be developed.
One candidate is to save context within an ontology with annotation
properties according to [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The OWL1.1 standard will allow annotation properties
for axioms and reference by axiom URI. This allows fine grained access control
similar to XML query languages. In the following example the URI is printed in
brackets following the axiom.
      </p>
      <p>DesignDocument v Document [axiom1]</p>
      <p>access(axiom1, companyInternal)
access(DesignDocument, companyInternal)</p>
      <p>Argumentations for axioms and other ontology elements can be recorded
analogously. In further processing steps the ontology can be stripped down to a
version which only contains elements for public use and is therefore
contextualized. But this naive syntactic process will not be enough since the remaining
axioms may not make sense alone. The implications of access rights assignment
concerning rights inheritance and ontology modularization will be investigated.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Evaluation</title>
      <p>This section describes the methodology used to evaluate and validate results of
the project.</p>
      <p>In the above mentioned application scenario PROCESSUS, different user
roles will get access to different parts and granularity level of the ontology. This
offers an evaluation opportunity for the thesis’ results.</p>
      <p>Also collaborative ontology integration might be evaluated in the application
scenario, since product descriptions on the marketplace have to be imported
from somewhere. They might be interpreted as a subset of the company internal
resources and ontology. It is a subset because, whitepapers and other marketing
documents are intended to be made publicly available whereas design documents
and test protocols which reference the same product are not.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Work Plan</title>
      <p>This section sketches the different stages of the project and differentiates between
current status, work in progress and planned future work.</p>
      <p>Results achieved. The overall thesis work time is planned to be three years.</p>
      <p>Six months have passed so far. Currently the idea outline exists as presented
in this abstract.</p>
      <p>Current work. Current work is to investigate the two considered aspects of
ontology reuse on behalf of an example case. Next planned step is to finish a
paper in 2008-07 to present a first concept and a deeper related work analysis
than given in this extended abstract.</p>
      <p>Planned work. Further coming steps are the following. Until 2008-08 a first
draft of the exposé is planned. Up to 2008-10 the structure of the manuscript
and potential diploma thesis topics are formulated. Until 2009-10 the
conceptual part of the thesis shall be finished, to have time for implementation
until 2010-05. The thesis manuscript is planned to be finished in 2010-09.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. THESEUS research program, “
          <article-title>PROCESSUS - optimisation of business processes</article-title>
          .” available at http://theseus-programm.de/scenarios/en/processus, retrieved March 7,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>M.</given-names>
            <surname>Hepp</surname>
          </string-name>
          and J. de Bruijn, “
          <article-title>GenTax: A generic methodology for deriving OWL and RDF-S ontologies from hierarchical classifications, thesauri, and inconsistent taxonomies,”</article-title>
          <source>in ESWC' 07: Proceedings of the 4th European Semantic Web Conference</source>
          , pp.
          <fpage>129</fpage>
          -
          <lpage>144</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>J.</given-names>
            <surname>Hartmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sure</surname>
          </string-name>
          , “
          <article-title>An infrastructure for scalable, reliable semantic portals,” IEEE Intelligent Systems</article-title>
          , vol.
          <volume>19</volume>
          , pp.
          <fpage>58</fpage>
          -
          <issue>65</issue>
          , 5
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>M.</given-names>
            <surname>Krötzsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Vrandecic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Völkel</surname>
          </string-name>
          , “Semantic MediaWiki,” in
          <source>ISWC '06: Proceedings of the 5th International Semantic Web Conference</source>
          , (Athens, GA, USA), pp.
          <fpage>935</fpage>
          -
          <lpage>942</lpage>
          , Springer, 11
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>A.</given-names>
            <surname>Farquhar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Fikes</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Rice</surname>
          </string-name>
          , “
          <article-title>The Ontolingua server: a tool for collaborative ontology construction</article-title>
          ,”
          <source>International Journal of Human-Computer Studies</source>
          , vol.
          <volume>46</volume>
          , no.
          <issue>6</issue>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. Stanford University,
          <source>“Protégé 3.3</source>
          .1 ontology editor.” available at http://protege. stanford.edu,
          <source>retrieved January 3</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Zhdanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Krummenacher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Henke</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Fensel</surname>
          </string-name>
          , “
          <article-title>Community-driven ontology management: DERI case study,”</article-title>
          <source>in WI '05: Proceedings of the 2005 IEEE/WIC/ACM International Conference on Web Intelligence</source>
          , (Washington, DC, USA), pp.
          <fpage>73</fpage>
          -
          <lpage>79</lpage>
          , IEEE Computer Society,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Grau</surname>
          </string-name>
          , I. Horrocks,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kazakov</surname>
          </string-name>
          , and U. Sattler, “
          <article-title>Just the right amount: extracting modules from ontologies,”</article-title>
          <source>in WWW '07: Proceedings of the 16th international conference on World Wide Web</source>
          , (New York, NY, USA), pp.
          <fpage>717</fpage>
          -
          <lpage>726</lpage>
          , ACM,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>S.</given-names>
            <surname>Ghilardi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lutz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wolter</surname>
          </string-name>
          , “
          <article-title>Did I damage my ontology? a case for conservative extensions in description logics</article-title>
          ,”
          <source>in Proceedings of the Tenth International Conference on Principles of Knowledge Representation and Reasoning</source>
          (KR'06)
          <string-name>
            <surname>(P. Doherty</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Mylopoulos</surname>
          </string-name>
          , and C. Welty, eds.), pp.
          <fpage>187</fpage>
          -
          <lpage>197</lpage>
          , AAAI Press,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>M. Dzbor</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Kubias</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Gridinoc</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Lopez-Cima</surname>
            , and
            <given-names>C. B.</given-names>
          </string-name>
          <string-name>
            <surname>Aranda</surname>
          </string-name>
          , “
          <article-title>The role of access rights in ontology customization</article-title>
          ,
          <source>” Deliverable 4.4</source>
          .1,
          <string-name>
            <given-names>NeOn</given-names>
            <surname>Project</surname>
          </string-name>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. G. Qi,
          <string-name>
            <given-names>P.</given-names>
            <surname>Haase</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Pinto</surname>
          </string-name>
          , “Context representation formalism,
          <source>” Deliverable 3.1</source>
          .2,
          <string-name>
            <given-names>NeOn</given-names>
            <surname>Project</surname>
          </string-name>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>S.</given-names>
            <surname>Kaushik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wijesekera</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Ammann</surname>
          </string-name>
          , “
          <article-title>Policy-based dissemination of partial web-ontologies,”</article-title>
          <source>in SWS '05: Proceedings of the 2005 workshop on Secure web services</source>
          , (New York, NY, USA), pp.
          <fpage>43</fpage>
          -
          <lpage>52</lpage>
          , ACM,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>C. Farkas</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Wijesekera</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Singhal</surname>
            , and
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Thuraisingham</surname>
          </string-name>
          , “
          <article-title>Semanticaware data protection in web services,”</article-title>
          <source>in IEEE Web Services Security Symposium (WSSS)</source>
          <year>2006</year>
          , (Berkeley, California, USA),
          <year>5 2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bechhofer</surname>
          </string-name>
          ,
          <string-name>
            <surname>F. van Harmelen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hendler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. L.</given-names>
            <surname>McGuinness</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. F.</given-names>
            <surname>Patel-Schneider</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <source>OWL Web Ontology Language Reference. World Wide Web Consortium</source>
          ,
          <volume>2</volume>
          <fpage>2004</fpage>
          . W3C Recommendation, available at http://www. w3.org/TR/owl-ref/,
          <source>retrieved January 3</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>