Martin Knechtel

Learn More
Access control is crucial also for the Semantic Web. Technologies and Standards from the Semantic Web Community itself provide powerful means to model access control definitions and automatically reason about them. We extend Hierarchical Role Based Access Control by a class hierarchy of the accessed objects and give it the name RBAC-CH. We present a concept(More)
The framework developed in this paper can deal with scenarios where selected sub-ontologies of a large ontology are offered as views to users, based on contexts like the access rights of a user, the trust level required by the application, or the level of detail requested by the user. Instead of materializing a large number of different sub-ontologies, we(More)
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to users. It abstracts from specific users and binds permissions to user roles. Similarly, one can abstract from specific documents and bind permission to document types. In this paper, we apply Description Logics (DLs) to formalize(More)
This section gives a description of the overall research problem tackled in context of the Ph.D. and its relevance to the Semantic Web area. The problem domain for this extended abstract is a collaborative marketplace in the Semantic Web. In the planned pilot 2 of the application scenario PROCESSUS of the research program THESEUS [1], described products to(More)
Laboratories use pigmentation, antibiotic susceptibility, and biochemical tests to identify anaerobic organisms that play a role in bovine interdigital necrobacillosis (bovine foot rot). In this study, 16S rRNA gene sequencing was used to identify strains to the species level that were originally classified as Prevotella or Porphyromonas spp by conventional(More)
Recent research has shown that annotations are useful for representing access restrictions to the axioms of an ontology and their implicit consequences. Previous work focused on assigning a label, representing its access level, to each consequence from a given ontology. However, a security administrator might not be satisfied with the access level obtained(More)