Upload
quentin-reul
View
266
Download
3
Embed Size (px)
DESCRIPTION
Presentation on how to use ontologies in access control systems.
Citation preview
2. Overview
3. TAS 3Architecture 4. Ontology-based Interoperability Traditional Sys A Sys C Sys B Sys D Sys E Sys A Sys C Sys B Sys D Sys E 5. Access Control Policy Interoperability (I)
6. Access Control Policy Interoperability (II) System B Sys A PEP PDP request (A,T,{N,V}) Interpreter 7. What is anontology ?
8. Triangle of Meaning Thing Symbol Person evokes stands for relates to 9. DOGMA
10. Lexons to RDF Person Name Identifier has of has of 11. Security Policy Ontology (I)
12. Security Policy Ontology (II) 13. Condition 14. Action 15. Target 16. Access Control Policy 17. ABAC Policy 18. Conclusion
19. DOGMA Reference