M. Chowdhury, J. Gómez, Josef Noll, Á. García-Crespo
{"title":"SemID: Combining Semantics with Identity Management","authors":"M. Chowdhury, J. Gómez, Josef Noll, Á. García-Crespo","doi":"10.1109/SECUREWARE.2007.4385304","DOIUrl":null,"url":null,"abstract":"The need for information security and privacy in today's connected systems is overwhelming. In this paper, we focus on the identity management in corporate environment to access various project resources. Capabilities of semantic web technology facilitate the development of proposed SemID ontology that formally represents the identity management domain. It contains roles, policies and rules to control access to resources and to ensure privacy. A use case scenario of project oriented corporate working environment is introduced and then modeled using Protege ontology editor platform.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECUREWARE.2007.4385304","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The need for information security and privacy in today's connected systems is overwhelming. In this paper, we focus on the identity management in corporate environment to access various project resources. Capabilities of semantic web technology facilitate the development of proposed SemID ontology that formally represents the identity management domain. It contains roles, policies and rules to control access to resources and to ensure privacy. A use case scenario of project oriented corporate working environment is introduced and then modeled using Protege ontology editor platform.