<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>April</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Luca Costabello</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serena Villata</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nicolas Delaforge</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fabien Gandon INRIA Sophia Antipolis</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>France firstname.lastname@inria.fr</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2012</year>
      </pub-date>
      <volume>16</volume>
      <issue>2012</issue>
      <abstract>
        <p>To encourage data providers to publish a maximum of data on the Web, we propose a mechanism to de ne lightweight access control policies for graph stores. In uenced by the steep growth of the mobile web, our Linked Data access control framework features context-aware control policies. The proposed framework is exclusively grounded on standard Semantic Web languages. The framework architecture is designed as a pluggable lter for generic SPARQL endpoints, and it has been evaluated on a test dataset.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Linked Data</kwd>
        <kwd>Ubiquitous Web</kwd>
        <kwd>Access Control</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>
        Denying or allowing access to a set of resources or services is
a common problem in a large number of mobile computing
elds, from location-based services to personal area networks.
As ubiquitous connectivity spreads, access control has been
enhanced with location awareness and, to some extent, other
contextual dimensions such as the proximity of nearby
people or objects. The open nature of current Web of Data
information and the consumption of web resources on the go
may give providers the impression that their content is not
safe, thus preventing further publication of datasets, at the
expense of the growth of the Web of Data itself [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Access
control is therefore necessary, and context must be part of
the access control evaluation, given that such Ubiquitous
Web of Data enables new linked data fruition scenarios.
      </p>
      <p>In this paper we address the problem of de ning an access
control framework for querying Web of Data servers from
mobile environments. Let us consider a content sharing
service compliant with the Web of Data: Alice uploads some
pictures together with the reviews of a rock concert to the
platform. She prefers to share these media to everyone but
her boss. Since her colleagues might view the content at
work with their smartphones, moving from o ce to o ce, she
decides that nobody is allowed to access the shared media
from a mobile device if the boss is in the same room.
Such application scenario raises three major challenges:
(i) how to de ne a ne-grained access control model for
the Web of Data, (ii) how to model context-aware,
mobile consumption of such information, and (iii) how to
integrate mobile context in the access control model, providing
an evaluation of the overall framework. We answer these
questions adopting exclusively Web of Data languages and
reusing, when possible, already existing proposals, to avoid
re-inventing the wheel.</p>
      <p>
        First, we describe the S4AC1 vocabulary, a lightweight
ontology which de nes ne-grained access control policies for
RDF data [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. We adopt the PRISSMA2 vocabulary to model
the mobile context in which linked data consumption takes
place. Third, we combine the access control model and the
contextual vocabulary into context-aware access conditions
de ned by data providers. Prototype evaluation shows that
contextual access control comes with a cost, but performance
still remains acceptable for most Web of Data applications.
The main advantage of our proposal is to provide a pluggable
and easy-to-integrate lter for generic SPARQL endpoints,
without modifying the endpoint itself. We rely on W3C
recommendations only, as we do not introduce any new language
or technology. For the time being, our framework assumes
the trustworthiness of the information sent by the mobile
consumer, including data describing context (e.g. location,
device features, etc). Our approach focuses only on SPARQL
data servers. Other Web of Data access strategies, such as
dereferencing resources, are out of the scope of this work.
The reminder of the paper is organized as follows.
Section 2 compares the related work to the proposed framework.
Section 3 introduces the mobile context aspects. Section 4
describes the access control model, while the access
enforcement algorithm is detailed in Section 5. Section 6 shows the
experimental results of the prototype implementation of the
framework.
      </p>
      <sec id="sec-1-1">
        <title>1http://ns.inria.fr/s4ac/</title>
      </sec>
      <sec id="sec-1-2">
        <title>2http://ns.inria.fr/prissma/</title>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. RELATED WORK</title>
      <p>
        The Web Access Control vocabulary (WAC3) allows data
providers to specify access control lists de ned at RDF
document granularity (we grant access to speci c RDF data,
e.g. a few named graphs). Sacco and Passant [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] present a
Privacy Preference Ontology (PPO4) to express ne-grained
access control policies to an RDF le. The consumer asks for
a particular RDF le, e.g., a FOAF pro le and the system
selects and returns the accessible part of the le. They do
not propose a lter for generic SPARQL endpoints, nor they
consider contextual information. Muhleisen et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] present
a policy-enabled server for Linked Data called PeLDS, based
on SWRL5. They deal only with Read and Update actions
and they do not consider contextual information. Giunchiglia
et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] propose a Relation Based Access Control model
(RelBAC ). They require to specify who can access the data,
while we and [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] specify the attributes the consumer must
satisfy. Finin et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] study the relationship between OWL
and Role Based Access Control (RBAC). To go beyond
RBAC, they consider Attribute Based Access Control where,
similarly to our proposal, access constraints are based on
general attributes of an action. Hollenbach et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] present
a system where providers control the access to RDF
documents using WAC, but they do not rely on the consumer's
context. Abel et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] present a model of context-dependent
access control at triple level. Policies are not expressed
using Semantic Web languages, instead they introduce an
high-level syntax mapped to existing policy languages,
enforcing access control as a layer on top of RDF stores. They
pre-evaluate the contextual conditions before expanding the
queries sent to the database. Shen and Cheng [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] propose
a context-based access control model using Semantic Web
technologies, where policies are expressed using SWRL. They
consider four types of contexts: subject (our User and
Device dimensions), object, transaction (our Access Privilege)
and environment (our Environment dimension). They do
not apply their model to the Web of Data. Covington et
al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] use the notion of role proposed by RBAC to capture
the context of the environment in which the access requests
are made. Environmental roles are de ned using a
prologlike logical language for expressing policies. Hulsebosch et
al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] propose context-sensitive veri cation methods aimed
at checking the authenticity of the user's information.
Cuppens and Cuppens-Boulahia [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] propose an Organization
Based Access Control (OrBAC) model where contextual
conditions have to be satis ed to activate a security rule. They
introduce a context algebra whereas we rely on Semantic
Web languages. Moreover, we deal with a wider range of
contextual dimensions. Corradi et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] present UbiCOSM,
a security middleware adopting context for policy speci
cation and enforcement. They distinguish between physical
and logical contexts while we consider additional contextual
dimensions, e.g., the device. Policies are expressed at a
high level of abstraction in terms of RDF metadata. Their
approach does not apply to the Web of Data. Toninelli et
al. [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] follow two design guidelines: context-awareness to
control resource access and semantic technologies for context
and policy speci cation. They adopt spontaneous coalitions
as an application scenario, while we deal with the Web of
      </p>
      <sec id="sec-2-1">
        <title>3http://www.w3.org/wiki/WebAccessControl</title>
      </sec>
      <sec id="sec-2-2">
        <title>4http://vocab.deri.ie/ppo</title>
      </sec>
      <sec id="sec-2-3">
        <title>5http://www.w3.org/Submission/SWRL/</title>
        <p>
          Data. Moreover, the semantic technology adopted di ers, i.e.,
rule-based approach with description logic in their case and
SPARQL 1.1 in our proposal. Their contextual information
does not include the device dimension. Finally, their
solution is not meant to be a pluggable framework for SPARQL
endpoints. Flouris et al. [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] present a ne-grained access
control framework on top of RDF repositories. Both their
framework and our proposal are repository-independent. On
the other hand, their solution does not consider the
contextual dimension and they propose a high level speci cation
language to be translated into a SPARQL/SerQL/SQL query
to enforce the policy. They focus only on Read operations.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. HANDLING CONTEXT WITH PRISSMA</title>
      <p>
        Whenever a mobile application needs to access some
resources, the surrounding context (e.g. the physical
environment) must take part into the access evaluation procedure.
SPARQL queries must be associated with contextual data
for access evaluation, according to a proper model.
The choice and the design of a context model necessarily need
a context de nition rst: we agree on the widely-accepted
proposal by Dey [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. More speci cally, we rely on the work
by Fonseca et al. 6, that we adopt as a foundation for our
proposal. The mobile context is seen as an encompassing
term, an information space de ned as the sum of three di
erent dimensions: the mobile User model, the Device features
and the Environment in which the action is performed.
Our Web of Data scenario favours the adoption of an
ontologybased model. As pointed out by Korpipaa and Mantyjarvi [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ],
an ontological approach leads to simple and extensible
models. This is a common point with the Web of Data rationale:
linked data on the Web heavily relies on lightweight
vocabularies under the open world assumption (i.e. new ontologies
can be added at anytime about anything) and model
exchange and re-use are welcomed and promoted at Web scale.
A large number of ontology-based context models relying
on Dey's de nition have been proposed in the latter years,
as summarized by Baldauf et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] (e.g. CoOL, SOUPA,
COBRA-ONT). These works are grounded on RDF and
provide in-depth context expressivity, but for chronological
reasons they are far from the Web of Data best practices
(e.g. no lightweight approach, limited interlinking with other
vocabularies), thus discouraging the adoption and re-use in
the Web community.
      </p>
      <p>
        Our work targets access control in the mobile Web of Data:
we need therefore a context model compliant with the Web of
Data paradigm. Our context-aware access control framework
adopts PRISSMA, a lightweight vocabulary originally designed
for context-aware adaptation of RDF data [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. PRISSMA
provides classes and properties to model core mobile context
concepts, but is not meant to deliver yet another mobile
contextual model: instead, well-known Web of Data
vocabularies and recent W3C recommendations are reused (Figure 1).
Moreover, it does not provide a comprehensive, exhaustive
context representation: the approach is to delegate re
nements and extensions to domain specialists. The overall
context is modelled by the class prissma:Context and is
determined by the following dimensions:
prissma:User represents the target mobile user associated
with a prissma:Context and consists in a foaf:Person
sub6http://bit.ly/XGR-mbui
      </p>
      <p>DisjunctiveACS</p>
      <p>ConjunctiveACS
prissma:
class. To provide more exibility, the class can be used to
model both user stereotypes and speci c users.
prissma:Device represents the mobile device on which Web
of Data resource consumption takes place, enabling
devicespeci c access control. The class inherits from W3C Delivery
Context Ontology 7 dcn:Device that provides an extensible
and ne-grained model for mobile device features.
prissma:Environment models the physical context in which
the Web of Data resource consumption takes place. Di erent
dimensions are involved in modelling the surrounding
environment, delegating re nements and extensions to domain
specialists. Location is modelled with the notion of Point of
Interest (POI). The prissma:POI class consists in a simpli ed,
RDFized version of the W3C Point of Interest Core speci
cations8. Each prissma:POI consists of a geo:SpatialThing9
and can be associated with a given geo:Point
coupled with a physical radius via the prissma:radius
property. The properties prissma:poiCategory and
prissma:poiLabel are used to assign a category and a
label. Time is modelled extending the time:TemporalEntity
class10. The prissma:descriptivePeriod property
associates a description to each temporal entity (e.g.
http://dbpedia.org/resource/Evening). Other
dimensions are considered: the motion property associates
any given high-level representation of motion to a
prissma:Environment. The environmental proximity of a
generic object can trigger di erent resource representations:
nearby objects are associated with the Environment with the
prissma:nearbyEntity property. The prissma:Activity
class is a placemark aimed at connecting third-party
solutions focused on inferring high-level representations of user
actions (e.g.`running', `driving', `shopping', etc).</p>
      <sec id="sec-3-1">
        <title>7http://bit.ly/dc-ontology</title>
      </sec>
      <sec id="sec-3-2">
        <title>8http://www.w3.org/TR/poi-core/ 9http://www.w3.org/2003/01/geo/wgs84_pos 10http://www.w3.org/TR/owl-time</title>
        <p>Example 1. Figure 2 visualizes a sample mobile context
featuring all the dimensions described above. The user, Bob,
knows Alice and is currently at work, near his and Alice's
boss. Bob is using an Android tablet with touch display and
is not moving.</p>
        <p>
          Other context-related issues need to be considered beyond
context-model de nition, such as context fetch, context
trustworthiness and privacy. PRISSMA supports both raw context
data fetched directly from mobile sensors (e.g. GPS location,
mobile features) and re ned information processed on board
or by third-party, server-side services (e.g. POI resolution
or user activity detection). The present paper assumes that
context data is fetched and pre-processed beforehand.
The trustworthiness of contextual information sent by
mobile consumers should not be taken for granted. The
prissma:User's identity needs to be certi ed: this is an open
research area in the Web, and initiatives such as WebID11
speci cally deal with this issue. Hulsebosch et al. [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]
provide a survey of context veri cation techniques (e.g.
heuristics relying on context history, collaborative authenticity
checks). A promising approach is mentioned in Kulkarni
and Tripathi [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], where context sensors are authenticated
beforehand by a trusted party. We plan to tackle the issue
of context-veri cation in future work.
        </p>
        <p>
          Context is sent to the data server along with the client query
for access evaluation (see Section 5 for details). Privacy
concerns arise while dealing with mobile user context. We
are aware that sensible data such as current location must be
handled with a privacy-preserving mechanism. In a previous
work, the myCampus experience [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], we deal with access
control and obfuscation rules for tracking mobile users. In
the present proposition, we do not address this issue, nor the
problem of context integrity.
11http://www.w3.org/2005/Incubator/webid/spec/
@prefix : &lt;http://example/contextgraphs/&gt;
[other prefixes omitted]
:bobCtx{
:ctx1 a prissma:Context;
prissma:user :usr1;
prissma:device :dev1;
prissma:environment :env1.
:usr1 a prissma:User;
foaf:name "Bob";
foaf:knows ex:alice#me.
        </p>
        <p>THE CONSUMER'S</p>
        <p>CONTEXT
THE USER DIMENSION
:dev1 a prissma:Device;
hard:deviceHardware :dev1hw;
soft:deviceSoftware :dev1sw.
:dev1hw a hard:DeviceHardware;</p>
        <p>dcn:display hard:TactileDisplay. THE DEVICE DIMENSION
:dev1sw a soft:DeviceSoftware;</p>
        <p>soft:operatingSystem :dev1os.
:dev1os a soft:OperatingSystem;</p>
        <p>common:name "Android".
:env1 a prissma:Environment;
prissma:motion "no";
prissma:nearbyEntity :ACME_boss#me;
prissma:currentPOI :ACMEoffice.
:ACMEoffice a prissma:POI;
prissma:poiCategory example:Office;
prissma:poiLabel example:ACMECorp.
}</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. WEB OF DATA ACCESS CONTROL</title>
      <p>
        In this section, we present our access control model and we
show how it is linked to the PRISSMA context vocabulary
presented in Section 3. Our access control model adopts the
granularity of named graphs [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], thus supporting ne-grained
access control policies, including the triple level. We choose
to rely on named graphs to not depend on documents (one
document can serialize several named graphs, one named
graph can be split over several documents, and not all graphs
come from documents). The named graph speci cation
permits to organize the RDF content of a dataset in multiple
graphs identi ed by given URIs12.
      </p>
      <p>The model is grounded on the S4AC ontology (Figure 1). Our
access control model is integrated with lightweight ontologies
adopted in the Social Web and the Web of Data. In
particular, S4AC reuses concepts from SIOC13, SKOS14, WAC,
SPIN15 and Dublin Core16.</p>
      <p>The main component of the S4AC model is the Access Policy,
as presented in De nition 1. Roughly, an Access Policy
denes the constraints that must be satis ed to access a given
named graph or a set of named graphs. If the Access Policy
is satis ed the data consumer is allowed to access the data.
Otherwise, the access is denied. The constraints speci ed
by the Access Policies may concern the data consumer, the
device, the environment, or any given combination of these
dimensions (see Section 3).</p>
      <p>De nition 1. (Access Policy) An Access Policy (P ) is a
tuple of the form P = hACS; AP; S; R; AECi where (i) ACS
is a set of Access Conditions to satisfy, (ii) AP is an Access
Privilege, (iii) S is the subject of the set of resources to
be protected by P , (iv) R is the (set of) resource(s) to
be protected by P , and (v) AEC is the Access Evaluation
Context of P .
12The discussion about the use of named graphs in RDF 1.1
can be found at http://www.w3.org/TR/rdf11-concepts
13http://rdfs.org/sioc/spec
14http://www.w3.org/TR/skos-reference
15http://spinrdf.org
16http://dublincore.org/documents/dcmi-terms
An Access Condition, as de ned in De nition 2, expresses
a constraint which needs to be veri ed in order to have the
Access Policy satis ed.</p>
      <p>De nition 2. (Access Condition) An Access Condition
(AC) is a condition which tests whether or not a query
pattern has a solution.</p>
      <p>In the S4AC model, we express Access Conditions as SPARQL
1.1 ASK queries. Note that no information is returned about
the possible query solutions, just whether or not a solution
exists.</p>
      <p>De nition 3. (Access Condition veri cation) If the query
pattern has a solution (i.e., the ASK query returns true), then
the Access Condition is said to be veri ed. If the query
pattern has no solution (i.e., the ASK query returns false),
then the Access Condition is said not to be veri ed.
Each Access Policy P is composed by a set of Access
Conditions, as de ned in De nition 4.</p>
      <p>De nition 4. (Access Condition Set) An Access Condition
Set (ACS) is a set of access conditions of the form ACS =
fAC1; AC2; : : : ; ACng.</p>
      <p>Roughly, the veri cation of an Access Condition Set returns a
true/false answer. We consider two standard ways to provide
such an evaluation: conjunctively and disjunctively.
De nition 5. (Conjunctive Access Condition Set) A
Conjunctive Access Condition Set (CACS) is a
logical conjunction of Access Conditions of the form
CACS = AC1 ^ AC2 ^ : : : ^ ACn.</p>
      <p>De nition 6. (Conjunctive ACS evaluation) A CACS is
veri ed if and only if every contained Access Condition is
veri ed.</p>
      <p>De nition 7. (Disjunctive Access Condition Set) A
Disjunctive Access Condition Set (DACS) is a
logical disjunction of Access Conditions of the form
DACS = AC1 _ AC2 _ : : : _ ACn.</p>
      <p>De nition 8. (Disjunctive ACS evaluation) A DACS is
veri ed if and only if at least one of the contained Access
Conditions is veri ed.</p>
      <p>We introduce the ACS, instead of using for instance the
SPARQL UNION clause inside the ASK, because the idea is
to de ne basic ACs with a simple and focused goal to allow
their reuse by users without a SPARQL background.
The second component of the Access Policy is the Access
Privilege. The privilege speci es the kind of operation the
data consumer is allowed to perform on the resource(s)
protected by the Access Policy.</p>
      <p>De nition 9. (Access Privilege) An Access Privilege (AP )
is a set of allowed operations on the protected resources of
the form AP = fCreate; Read; U pdate; Deleteg.</p>
      <p>We model the Access Privileges as four classes of operations
to keep a close relationship with CRUD-oriented access
control systems, allowing a ner-grained access control beyond
simple read/write privileges. Moreover, we relate the four
privilege classes to SPARQL 1.1 query and update language
primitives through the SPIN ontology, which models the
SPARQL primitives as SPIN classes. We show how this
matching is actually used in Section 5.</p>
      <p>As previously explained, policies protect data at named
graph level. We o er two di erent ways of specifying the
protected object: the provider may target one or more
speci c named graphs, or a set of named graphs associated
with a common subject. The former is achieved by
providing the URI(s) of the named graph(s) to protect using
the s4ac:appliesTo property. The latter is implemented
by listing the subjects of the named graphs to protect
using the property dcterms:subject. The assumption here
is that named graphs have been previously annotated with
such metadata. Summarizing, both S and R represent the
data to protect, but R speci es the URI(s) of the named
graphs, while S speci es the subject of the graphs (e.g., the
policy protects the named graphs whose subject is Concert,
http://dbpedia.org/resource/Concert).</p>
      <p>Finally, the Access Policy is associated with an Access
Evaluation Context. The latter provides an explicit link between
the policy and the actual context data (in the case of the
mobile context it is modelled with PRISSMA) that will be used
to evaluate the Access Policy.</p>
      <p>De nition 10. (Access Evaluation Context) An
Access Evaluation Context (AEC) is a list of
predetermined bound variables of the form AEC = (hvar1; val1i;
hvar2; val2i; : : : ; hvarn; valni).</p>
      <p>In this paper, we focus on the mobile context, thus the
Access Evaluation Context list is composed only by a couple
AEC = (hctx; U RIctxi). We map therefore the variable ctx,
used in the policy's Access Conditions, to the URI identifying
the actual mobile context in which the SPARQL query has
been performed. More speci cally, we choose to implement
the Access Evaluation Context as a SPARQL 1.1 BINDINGS
clause to constrain the ASK evaluation, i.e. BINDINGS ?ctx
{(U RIctx)}. However, the same result can be obtained by
binding directly the variable ?ctx to the URI of the
contextual graph.</p>
      <p>The semantics of our Access Control Policies is mirrored in
the semantics of the SPARQL language, in particular
concerning the ASK query and the BINDINGS clause. The result
of the veri cation of each access condition is composed, in
case of multiple conditions, conjunctively or disjunctively
and this combination provides the overall result of the policy
evaluation. The Access Privilege and the resource to protect
are components of the policy which do not concur to its
veri cation.</p>
      <p>Con icts among policies might occur if the data provider
uses Access Conditions with contrasting FILTER clauses. For
instance, it is possible to de ne positive and negative
statements such as ASK{FILTER(?u=&lt;http://example#bob&gt;)} and
ASK{FILTER(!(?u=&lt;http://example#bob&gt;))}. If these two
Access Conditions are applied to the same data, a logical con ict
arises. This issue is handled in the framework by evaluating
policies applied to a resource in a disjunctive way. We expect
to add a mechanism to prevent the insertion of con icting
policies as a future work.</p>
      <p>Example 2. Let us consider the named graph
:al:alice_reviews {
ex:29900 a bibo:Article;
dcterms:title "A great festival";
dcterms:date "2011";
dcterms:creator example:alice#me;
bibo:abstract "Really enjoyed Coldplay".
ex:29655 a bibo:Article;
dcterms:title "Disappointed";
dcterms:date "2010";
dcterms:creator example:alice#me;
bibo:abstract "Not up to the standards".
}
ice_reviews whose content is shown in Figure 3. We now
present an example of Access Policy with a conjunctive
Access Condition Set associated with a Read privilege (Figure 4).
The policy protects the named graph :alice_reviews and
allows the access to the named graph only if the consumer
(i) knows Alice, and (ii) is not located near Alice's boss.
Policy validation can be addressed in two di erent ways.
First, the SPIN vocabulary can be used to express the literal
representing the ASK query as RDF statements. On the other
hand, we can perform a two-step validation, combining RDF
validation for the policy and SPARQL validation for the
literals of s4ac:hasQueryAsk, i.e. the ASK queries.</p>
    </sec>
    <sec id="sec-5">
      <title>5. CONTROL ENFORCEMENT</title>
      <p>Our Access Control Manager is designed as a pluggable
component for SPARQL endpoints (Figure 5). The access
control ow is described below:
1. the mobile consumer queries the SPARQL endpoint to
access the content. At the same time, contextual
information is sent with the query and saved as a named
graph using SPARQL 1.1 update language statements.
Each time a context element is added we use an
INSERT DATA, while we rely on a DELETE/INSERT when
the contextual information is already stored and has to
be updated. Summarizing, the mobile client sends two
SPARQL queries: the rst is the client query aimed at</p>
      <p>Query
Contextual
Information
3</p>
      <p>Access Control</p>
      <p>Manager</p>
      <p>Access
Enforc+ement</p>
      <p>Policies
Selection
"secured"</p>
      <p>Query
5</p>
      <p>SPARQL
endpoint</p>
      <p>Datastore
PAoclciceisess + Contextual</p>
      <p>Graphs
the datastore, the second provides contextual
information (like the one visualized in Figure 2).
2. the client query is ltered by the Access Control
Manager instead of being directly executed on the SPARQL
endpoint.
3. the Access Control Manager selects the set of policies
a ecting the client query and after their evaluation
returns the set of named graphs the consumer is granted
access to.
4. the client query is executed only on the accessible
named graphs.</p>
      <p>5. the result of the query is returned to the consumer.
The aim of the Access Control Manager is twofold: it rst
selects the Access Policies to assess and it veri es the set of
Access Conditions included in the selected policies to grant
or not the access. We describe the two algorithms to protect
the access to the data (Figure 8).</p>
      <p>Algorithm 1 is the main procedure for the execution of a
query with access enforcement. The input of the algorithm
is the client query Q and the RDF graph Gctx modeling
the client mobile context. It assumes the existence of a
repository of access policies AP S. The algorithm starts by
saving the contextual graph in a local cache (line 1). At the
beginning, the set of accessible named graph N GS is empty
(line 3). The selection of the Access Policies is addressed
by the sub-routine Access Policies Selection (line 4), which
returns the set of Access Policies the query is concerned by.
Then, the algorithm runs all the Access Conditions composing
the selected policies (lines 7-10). According to the type of
Access Condition Set (i.e., conjunctive or disjunctive), for
each veri ed policy, the associated named graph is added
to the set of accessible named graphs (lines 11-12). Finally,
after the execution of all Access Conditions, the client query
is sent to the SPARQL endpoint with the addition of the
FROM clause (line 16). Query execution is therefore performed
only on the accessible named graphs, given the consumer
contextual information. Line 18 outputs the triples resulting
from Q.</p>
      <p>Algorithm 2 is the Access Policies Selection routine. It
selects the Access Policies concerned by the client query.
The input of the algorithm is the query Q and the repository
of the policies AP S. We do not want to verify all the Access
Policies every time a query is run. Thus, we adopt a selection
mechanism to obtain only a subset of Access Policies to
PREFIX ctxgraphs: &lt;http://example/contextgraphs/&gt;
ASK{?context a prissma:Context.</p>
      <p>?context prissma:user ?u. THE CONSUMER'S
?u foaf:knows ex:alice#me.} CONTEXT</p>
      <p>BINDINGS ?context {(ctxgraphs:bobCtx)}
ASK {?context a prissma:Context.</p>
      <p>?context prissma:environment ?env.
?env prissma:based_near ?p.</p>
      <p>FILTER (!(?p=ex:ACME_boss#me))}</p>
      <p>BINDINGS ?context {(ctxgraphs:bobCtx)}
execute. In particular, the algorithm maps the client query
to one of the four access privileges S4AC de nes using the
SPIN vocabulary (line 1). Then, the algorithm selects all
the Access Policies which have the identi ed Access Privilege
(lines 3-7). The selected policies are returned to the main
Access Enforcement algorithm (Algorithm 1).</p>
      <p>Example 3. An example of client query is shown in
Figure 7.a, where Bob wants to access all rock festival's reviews
from the context described in Figure 2. When the query is
received by the Access Control Manager, the latter selects the
Access Policies concerning this query (for instance the policy
shown in Figure 4). The Access Conditions included in the
policies are then coupled with a BINDINGS clause, as shown
in Figure 6, where the ?context variable is bound to Bob's
actual context. The identi cation of the named graph(s)
accessible by Bob returns only the graph :peter_reviews.
The named graph :alice_reviews of Figure 3 is forbidden
because Access Conditions evaluation leads to a false
answer with Bob's context (Bob is near Alice's boss). The
Access Control Manager adds the FROM clause to constrain
the execution of the client query only on the allowed named
graph. The \secured" client query is shown in Figure 7.b.
Algorithm 1: Query Execution with Access Enforcement</p>
    </sec>
    <sec id="sec-6">
      <title>6. EVALUATION</title>
      <p>
        To assess the impact on response time, we implemented the
Access Control Manager as a Java EE component and we
plugged it to the Corese-KGRAM RDF store and SPARQL
1.1 query engine17 [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. We evaluate the prototype on an
Intel Xeon E5540, Quad Core 2.53 GHz machine with 48GB
of memory, using the Berlin SPARQL Benchmark (BSBM)
dataset 3.118.
      </p>
      <p>In Figure 9 we execute 10 independent runs of a test query
batch consisting in 50 identical queries of a simple SELECT
over bsbm:Review instances (tests are preceded by a warmup
run). We measure the response time with and without access
control. When executed against the Access Control Manager,
the test SPARQL query is associated with the mobile context
described in Figure 2. Each Access Policy contains exactly
one Access Condition. In Figure 9.a, to simulate a worst-case
scenario, access is granted to all named graphs de ned in
the base (i.e. all Access Conditions return true), so that
query execution does not bene t from cardinality reduction.
Larger datasets are less a ected by the delay introduced by
our prototype, as datastore size plays a predominant role in
query execution time (e.g. for 4M triples and 100 always-true
Access Policies we obtain a 32.6% response time delay).
In a typical scenario, the Access Control Manager restricts
the results of a query. In Figure 9.b we assess the impact
17http://tinyurl.com/corese-engine
18http://bit.ly/berlin-sparql
on performance for various levels of cardinality reduction,
using modi ed versions of the BSBM dataset featuring a
larger amount of named graphs (we de ne a higher number
of bsbm:RatingSites, thus obtaining more named graphs).
When access is granted to a small fraction of named graphs,
the query is executed faster than the case without access
control (e.g. if access is granted to only 1% of named graphs, the
query is executed 19% faster on the 1M triple test dataset).
As more named graphs and triples are accessible,
performance decreases. In particular, response time is a ected
by the construction of the active graph, determined by the
merge of graphs in FROM clauses. As shown in Figure 9.b,
the cost of this operation grows with the number of named
graphs returned by the evaluation of the Access Policies.
In Figure 9.c we analyse the overhead introduced on response
time by queries executed in dynamic mobile environments.
We execute independent runs of 100 identical SELECT queries,
dealing with a range of context change probabilities. In case
of a context update, the query is coupled with a SPARQL 1.1
update (Section 5). Not surprisingly, with higher chances of
updating the context, the response time of the query grows,
since more SPARQL queries need to be executed. The delay
of INSERT DATA or DELETE/INSERT operations depends on
the size of the triple store and on the number of named
graphs (e.g. after a DELETE query, the adopted triple store
refreshes internal structures to satisfy RDFS entailment).
Performance is therefore a ected by the number of active
mobile users, since each of them is associated with a mobile
context graph.</p>
    </sec>
    <sec id="sec-7">
      <title>7. CONCLUSIONS</title>
      <p>Accessing the Web of Data needs an access control
mechanism. Moreover, consumption and production of linked data
might origin from mobile devices immersed into pervasive
environments. This paper presents an approach towards
context-aware access control for the ubiquitous Web of Data.
The proposed solution is conceived as an easy-to-integrate
pluggable lter for data servers that support the SPARQL
query language. Our framework relies only on Web of Data
languages and existing vocabularies; no other formalism has
been added. The prototype evaluation shows that, despite
the overall performance needs to be ameliorated, the delay
introduced by our ne-grained, context-based access control
is acceptable given that data protection comes with a cost.
Future testing campaign will be carried out to provide a
thorough evaluation with other SPARQL query engines, such
as Virtuoso, Sesame, Jena and AllegroGraph. An e ective
backend user interface to de ne Access Policies has to be
designed, as user interaction issues should not be
underestimated. The trustworthiness of the information sent by the
mobile consumer, including data describing context (e.g.
location, device features, etc.) should not be taken for granted:
future work needs to investigate this issue. Privacy concerns
arise while dealing with mobile user context. We are aware
that sensible data such as current location must be handled
with a privacy-preserving mechanism, and we will therefore
focus on this issue in the future.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>F.</given-names>
            <surname>Abel</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. L. De Coi</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Henze</surname>
            ,
            <given-names>A. W.</given-names>
          </string-name>
          <string-name>
            <surname>Koesling</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Krause</surname>
            , and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Olmedilla</surname>
          </string-name>
          .
          <article-title>Enabling Advanced and Context-Dependent Access Control in RDF Stores</article-title>
          .
          <source>In Procs of the 6th Int. Semantic Web Conf. (ISWC-2007), LNCS 4825</source>
          , pages
          <fpage>1</fpage>
          {
          <fpage>14</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Baldauf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dustdar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Rosenberg</surname>
          </string-name>
          .
          <article-title>A survey on context-aware systems</article-title>
          .
          <source>Int. J. of Ad Hoc and Ubiquitous Computing</source>
          ,
          <volume>2</volume>
          (
          <issue>4</issue>
          ):
          <volume>263</volume>
          {
          <fpage>277</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Carroll</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Bizer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. J.</given-names>
            <surname>Hayes</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Stickler</surname>
          </string-name>
          .
          <article-title>Named graphs</article-title>
          .
          <source>J. Web Sem</source>
          .,
          <volume>3</volume>
          (
          <issue>4</issue>
          ):
          <volume>247</volume>
          {
          <fpage>267</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>O.</given-names>
            <surname>Corby</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Faron-Zucker</surname>
          </string-name>
          .
          <article-title>The KGRAM Abstract Machine for Knowledge Graph Querying</article-title>
          .
          <source>In Web Intelligence</source>
          , pages
          <fpage>338</fpage>
          {
          <fpage>341</fpage>
          . IEEE,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Corradi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Montanari</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Tibaldi</surname>
          </string-name>
          .
          <article-title>Context-based access control management in ubiquitous environments</article-title>
          .
          <source>In Procs of the 3rd IEEE Int. Symposium on Network Computing and Applications (NCA-2004)</source>
          , pages
          <fpage>253</fpage>
          {
          <fpage>260</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L.</given-names>
            <surname>Costabello</surname>
          </string-name>
          . DC Proposal:
          <article-title>PRISSMA, Towards Mobile Adaptive Presentation of the Web of Data</article-title>
          .
          <source>In Procs of the 10th Int. Semantic Web Conf. (ISWC-2011), LNCS 7032</source>
          , pages
          <fpage>269</fpage>
          {
          <fpage>276</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Covington</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Long</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Srinivasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Dey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ahamad</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. D.</given-names>
            <surname>Abowd</surname>
          </string-name>
          .
          <article-title>Securing context-aware applications using environment roles</article-title>
          .
          <source>In Procs of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT-2001)</source>
          , pages
          <fpage>10</fpage>
          {
          <fpage>20</fpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>F.</given-names>
            <surname>Cuppens</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Cuppens-Boulahia</surname>
          </string-name>
          .
          <article-title>Modeling contextual security policies</article-title>
          .
          <source>Int. J. Inf. Sec.</source>
          ,
          <volume>7</volume>
          (
          <issue>4</issue>
          ):
          <volume>285</volume>
          {
          <fpage>305</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Dey</surname>
          </string-name>
          .
          <article-title>Understanding and using context</article-title>
          .
          <source>Personal Ubiquitous Computing</source>
          ,
          <volume>5</volume>
          :
          <issue>4</issue>
          {
          <issue>7</issue>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T. W.</given-names>
            <surname>Finin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kagal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Niu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. S.</given-names>
            <surname>Sandhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. H.</given-names>
            <surname>Winsborough</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B. M.</given-names>
            <surname>Thuraisingham</surname>
          </string-name>
          . ROWLBAC:
          <article-title>representing role based access control in OWL</article-title>
          .
          <source>In Procs of 13th ACM Symposium on Access Control Models and Technologies (SACMAT-2008)</source>
          , pages
          <fpage>73</fpage>
          {
          <fpage>82</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Flouris</surname>
          </string-name>
          , I. Fundulaki,
          <string-name>
            <given-names>M.</given-names>
            <surname>Michou</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G.</given-names>
            <surname>Antoniou</surname>
          </string-name>
          .
          <article-title>Controlling Access to RDF Graphs</article-title>
          .
          <source>In Procs of the 3rd Future Internet Symposium (FIS-2010), LNCS 6369</source>
          , pages
          <fpage>107</fpage>
          {
          <fpage>117</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Gandon</surname>
          </string-name>
          and
          <string-name>
            <given-names>N. M.</given-names>
            <surname>Sadeh</surname>
          </string-name>
          .
          <article-title>A semantic e-wallet to reconcile privacy and context awareness</article-title>
          .
          <source>In Procs of the 2nd Int. Semantic Web Conf. (ISWC-2003), LNCS 2870</source>
          , pages
          <fpage>385</fpage>
          {
          <fpage>401</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>F.</given-names>
            <surname>Giunchiglia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Crispo</surname>
          </string-name>
          .
          <article-title>Ontology driven community access control</article-title>
          .
          <source>In Procs of the 1st Workshop on Trust and Privacy on the Social and Semantic Web (SPOT-2009)</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>T.</given-names>
            <surname>Heath</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Bizer</surname>
          </string-name>
          .
          <article-title>Linked Data: Evolving the Web into a Global Data Space</article-title>
          . Morgan &amp; Claypool,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.</given-names>
            <surname>Hollenbach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Presbrey</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Berners-Lee</surname>
          </string-name>
          .
          <article-title>Using RDF Metadata To Enable Access Control on the Social Semantic Web</article-title>
          .
          <source>In Procs of the Workshop on Collaborative Construction</source>
          ,
          <article-title>Management and Linking of Structured Knowledge (CK-</article-title>
          <year>2009</year>
          ),
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Hulsebosch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Salden</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Bargh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. W. G.</given-names>
            <surname>Ebben</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Reitsma</surname>
          </string-name>
          .
          <article-title>Context sensitive access control</article-title>
          .
          <source>In Procs of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT-2005)</source>
          , pages
          <fpage>111</fpage>
          {
          <fpage>119</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P.</given-names>
            <surname>Korpipa</surname>
          </string-name>
          <article-title>a and</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Ma</surname>
          </string-name>
          <article-title>ntyjarvi. An ontology for mobile device sensor-based context awareness</article-title>
          .
          <source>In Procs of the 4th Int. and Interdisciplinary Conf</source>
          .
          <article-title>Modeling and Using Context (CONTEXT-</article-title>
          <year>2003</year>
          ),
          <source>LNCS 2680</source>
          , pages
          <fpage>451</fpage>
          {
          <fpage>458</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>D.</given-names>
            <surname>Kulkarni</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Tripathi</surname>
          </string-name>
          .
          <article-title>Context-aware role-based access control in pervasive computing systems</article-title>
          .
          <source>In Procs of 13th ACM Symposium on Access Control Models and Technologies (SACMAT-2008)</source>
          , pages
          <fpage>113</fpage>
          {
          <fpage>122</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Muhleisen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kost</surname>
          </string-name>
          , and J.
          <string-name>
            <surname>-C.</surname>
          </string-name>
          <article-title>Freytag</article-title>
          .
          <article-title>SWRL-based Access Policies for Linked Data</article-title>
          .
          <source>In Procs of the 2nd Workshop on Trust and Privacy on the Social and Semantic Web (SPOT-2010)</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O.</given-names>
            <surname>Sacco</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Passant. A Privacy Preference</surname>
          </string-name>
          <article-title>Ontology (PPO) for Linked Data</article-title>
          .
          <source>In Procs of the 4th Workshop about Linked Data on the Web (LDOW-2011)</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>H.</given-names>
            <surname>Shen</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cheng</surname>
          </string-name>
          .
          <article-title>A semantic context-based model for mobile web services access control</article-title>
          .
          <source>Int. J. Computer Network and Information Security</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Toninelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Montanari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kagal</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O.</given-names>
            <surname>Lassila</surname>
          </string-name>
          .
          <article-title>A semantic context-aware access control framework for secure collaborations in pervasive computing environments</article-title>
          .
          <source>In Procs of the 5th Int. Semantic Web Conf. (ISWC-2006), LNCS 4273</source>
          , pages
          <fpage>473</fpage>
          {
          <fpage>486</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Villata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Delaforge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gandon</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Gyrard</surname>
          </string-name>
          .
          <article-title>An access control model for linked data</article-title>
          .
          <source>In Procs of the 7th Int. IFIP Workshop on Semantic Web &amp; Web Semantics (SWWS-2011), LNCS 7046</source>
          , pages
          <fpage>454</fpage>
          {
          <fpage>463</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>