Research on Policy Conflict Based on Layered Policy Representation Framework

Author(s):  
Jun Hu ◽  
Ye Sun ◽  
Bai-yun Wang
Author(s):  
Jian Li ◽  
William K. Cheung

Semantic Web technologies allow on-line resources to be semantically annotated to support more effective and intelligent online services. However, ontologies sometimes may contain sensitive information. Providing access to them requires proper control to ensure the data protection requirement. Yet, the protection should not be too restrictive to make the access management inflexible. While there has been recent work on policy-based access control, in this paper, the authors present a policy representation specifically for access control on ontology-based data and explain how issues like policy propagation and policy conflict resolution are addressed. The authors present bucket-based query rewriting algorithms for realizing the access control policies to avoid sensitive resources leakage in the context of the Semantic Web. The authors validate the correctness of the proposed mechanisms by going through some illustrative examples in detail.


Author(s):  
Jian Li ◽  
William K. Cheung

Semantic Web technologies allow on-line resources to be semantically annotated to support more effective and intelligent online services. However, ontologies sometimes may contain sensitive information. Providing access to them requires proper control to ensure the data protection requirement. Yet, the protection should not be too restrictive to make the access management inflexible. While there has been recent work on policy-based access control, in this paper, the authors present a policy representation specifically for access control on ontology-based data and explain how issues like policy propagation and policy conflict resolution are addressed. The authors present bucket-based query rewriting algorithms for realizing the access control policies to avoid sensitive resources leakage in the context of the Semantic Web. The authors validate the correctness of the proposed mechanisms by going through some illustrative examples in detail.


Author(s):  
Jian Li ◽  
William K. Cheung

Semantic Web technologies allow on-line resources to be semantically annotated to support more effective and intelligent online services. However, ontologies sometimes may contain sensitive information. Providing access to them requires proper control to ensure the data protection requirement. Yet, the protection should not be too restrictive to make the access management inflexible. While there has been recent work on policy-based access control, in this paper, the authors present a policy representation specifically for access control on ontology-based data and explain how issues like policy propagation and policy conflict resolution are addressed. The authors present bucket-based query rewriting algorithms for realizing the access control policies to avoid sensitive resources leakage in the context of the Semantic Web. The authors validate the correctness of the proposed mechanisms by going through some illustrative examples in detail.


Author(s):  
Ankur Chowdhary ◽  
Abdulhakim Sabur ◽  
Dijiang Huang ◽  
James Kirby ◽  
M. Kang

Author(s):  
Giampaolo Bonomi ◽  
Nicola Gennaioli ◽  
Guido Tabellini

Abstract We present a theory of identity politics that builds on two ideas. First, when policy conflict renders a certain social divide—economic or cultural—salient, a voter identifies with her economic or cultural group. Second, the voter slants her beliefs toward the stereotype of the group she identifies with. We obtain three implications. First, voters’ beliefs are polarized along the distinctive features of salient groups. Second, if the salience of cultural policies increases, cultural conflict rises, redistributive conflict falls, and polarization becomes more correlated across issues. Third, economic shocks hurting conservative voters may trigger a switch to cultural identity, causing these voters to demand less redistribution. We discuss U.S. survey evidence in light of these implications.


Sign in / Sign up

Export Citation Format

Share Document