Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sabrina Kirrane is active.

Publication


Featured researches published by Sabrina Kirrane.


international conference on logic programming | 2012

A Logic Programming approach for Access Control over RDF

Nuno Lopes; Sabrina Kirrane; Antoine Zimmermann; Axel Polleres; Alessandra Mileo

The Resource Description Framework (RDF) is an interoperable data representation format suitable for interchange and integration of data, especially in Open Data contexts. However, RDF is also becoming increasingly attractive in scenarios involving sensitive data, where data protection is a major concern. At its core, RDF does not support any form of access control and current proposals for extending RDF with access control do not fit well with the RDF representation model. Considering an enterprise scenario, we present a modelling that caters for access control over the stored RDF data in an intuitive and transparent manner. For this paper we rely on Annotated RDF, which introduces concepts from Annotated Logic Programming into RDF. Based on this model of the access control annotation domain, we propose a mechanism to manage permissions via application-specific logic rules. Furthermore, we illustrate how our Annotated Query Language (AnQL) provides a secure way to query this access control annotated RDF data.


international semantic web conference | 2013

Secure Manipulation of Linked Data

Sabrina Kirrane; Ahmed Abdelrahman; Alessandra Mileo; Stefan Decker

When it comes to publishing data on the web, the level of access control required (if any) is highly dependent on the type of content exposed. Up until now RDF data publishers have focused on exposing and linking public data. With the advent of SPARQL 1.1, the linked data infrastructure can be used, not only as a means of publishing open data but also, as a general mechanism for managing distributed graph data. However, such a decentralised architecture brings with it a number of additional challenges with respect to both data security and integrity. In this paper, we propose a general authorisation framework that can be used to deliver dynamic query results based on user credentials and to cater for the secure manipulation of linked data. Specifically we describe how graph patterns, propagation rules, conflict resolution policies and integrity constraints can together be used to specify and enforce consistent access control policies.


Sprachwissenschaft | 2016

Access control and the Resource Description Framework: A survey

Sabrina Kirrane; Alessandra Mileo; Stefan Decker

In recent years we have seen significant advances in the technology used to both publish and consume structured data using the existing web infrastructure, commonly referred to as the Linked Data Web. However, in order to support the next generation of e-business applications on top of Linked Data suitable forms of access control need to be put in place. This paper provides an overview of the various access control models, standards and policy languages, and the different access control enforcement strategies for the Resource Description Framework (the data model underpinning the Linked Data Web). A set of access control requirements that can be used to categorise existing access control strategies is proposed and a number of challenges that still need to be overcome are identified.


international conference on computer safety, reliability, and security | 2017

Transparent Personal Data Processing: The Road Ahead

Piero A. Bonatti; Sabrina Kirrane; Axel Polleres; Rigo Wenning

The European General Data Protection Regulation defines a set of obligations for personal data controllers and processors. Primary obligations include: obtaining explicit consent from the data subject for the processing of personal data, providing full transparency with respect to the processing, and enabling data rectification and erasure (albeit only in certain circumstances). At the core of any transparency architecture is the logging of events in relation to the processing and sharing of personal data. The logs should enable verification that data processors abide by the access and usage control policies that have been associated with the data based on the data subject’s consent and the applicable regulations. In this position paper, we: (i) identify the requirements that need to be satisfied by such a transparency architecture, (ii) examine the suitability of existing logging mechanisms in light of said requirements, and (iii) present a number of open challenges and opportunities.


information security conference | 2013

Applying DAC Principles to the RDF Graph Data Model

Sabrina Kirrane; Alessandra Mileo; Stefan Decker

In this paper we examine how Discretionary Access Control principles, that have been successfully applied to relational and XML data, can be applied to the Resource Description Framework (RDF) graph data model. The objective being to provide a baseline for the specification of a general authorisation framework for the RDF data model. Towards this end we provide a summary of access control requirements for graph data structures, based on the different characteristics of graph models compared to relational and tree data models. We subsequently focus on the RDF data model and identify a list of access rights based on SPARQL query operations; propose a layered approach to authorisation derivation based on the graph structure and RDFSchema; and demonstrate how SQL GRANT and REVOKE commands can be adapted to cater for delegation of privileges in SPARQL.


international semantic technology conference | 2012

Protect Your RDF Data

Sabrina Kirrane; Nuno Lopes; Alessandra Mileo; Stefan Decker

The explosion of digital content and the heterogeneity of enterprise content sources have pushed existing data integration solutions to their boundaries. Although RDF can be used as a representation format for integrated data, enterprises have been slow to adopt this technology. One of the primary inhibitors to its widespread adoption in industry is the lack of fine grained access control enforcement mechanisms available for RDF. In this paper, we provide a summary of access control requirements based on our analysis of existing access control models and enforcement mechanisms. We subsequently: (i) propose a set of access control rules that can be used to provide support for these models over RDF data; (ii) detail a framework that enforces access control restrictions over RDF data; and (iii) evaluate our implementation of the framework over real-world enterprise data.


Sprachwissenschaft | 2018

Privacy, security and policies: A review of problems and solutions with semantic web technologies

Sabrina Kirrane; Serena Villata; Mathieu d’Aquin

Semantic Web technologies aim to simplify the distribution, sharing and exploitation of information and knowledge, across multiple distributed actors on the Web. As with all technologies that manipulate information, there are privacy and security implications, and data policies (e.g., licenses and regulations) that may apply to both data and software artifacts. Additionally, semantic web technologies could contribute to the more intelligent and flexible handling of privacy, security and policy issues, through supporting information integration and sense-making. In order to better understand the scope of existing work on this topic we examine 78 articles from dedicated venues, including this special issue, the PrivOn workshop series, two SPOT workshops, as well as the broader literature that connects the Semantic Web research domain with issues relating to privacy, security and/or policies. Specifically, we classify each paper according to three taxonomies (one for each of the aforementioned areas), in order to identify common trends and research gaps. We conclude by summarising the strong focus on relevant topics in Semantic Web research (e.g. information collection, information processing, policies and access control), and by highlighting the need to further explore under-represented topics (e.g., malware detection, fraud detection, and supporting policy validation by data consumers).


european semantic web conference | 2018

Modeling and Reasoning over Data Licenses.

Oleksandra Panasiuk; Simon Steyskal; Giray Havur; Anna Fensel; Sabrina Kirrane

In this paper, we propose an extension of the Open Digital Right Language for modeling well-known licenses and propose an approach to automatically check license compatibility.


european semantic web conference | 2018

A Scalable Consent, Transparency and Compliance Architecture

Sabrina Kirrane; Javier D. Fernández; Wouter Dullaert; Uros Milosevic; Axel Polleres; Piero A. Bonatti; Rigo Wenning; Olha Drozd; Philip Raschke

In this demo we present the SPECIAL consent, transparency and compliance system. The objective of the system is to afford data subjects more control over personal data processing and sharing, while at the same time enabling data controllers and processors to comply with consent and transparency obligations mandated by the European General Data Protection Regulation. A short promotional video can be found at https://purl.com/specialprivacy/demos/ESWC2018.


Semantic Applications | 2018

Automated Rights Clearance Using Semantic Web Technologies: The DALICC Framework

Tassilo Pellegrini; Víctor Mireles; Simon Steyskal; Oleksandra Panasiuk; Anna Fensel; Sabrina Kirrane

The creation of derivative data works, e.g. for purposes such as content creation, service delivery or process automation, is often accompanied by legal uncertainty about usage rights and high costs in the clearance of licensing issues. DALICC stands for Data Licenses Clearance Center. It supports legal experts, innovation managers and application developers in the legally secure reutilization of third party data and software. DALICC is a Semantic Web enabled software framework which allows the attaching of licenses in a machine readable format to a specific asset and supports the clearance of rights by providing the user with information about equivalence, similarity and compatibility between licenses if used in combination in a derivative work. In essence, DALICC helps to determine which information can be shared with whom, to what extent and under which conditions, thus lowering the costs of rights clearance and stimulating the data economy.

Collaboration


Dive into the Sabrina Kirrane's collaboration.

Top Co-Authors

Avatar

Axel Polleres

Vienna University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar

Simon Steyskal

Vienna University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar

Alessandra Mileo

National University of Ireland

View shared research outputs
Top Co-Authors

Avatar

Stefan Decker

National University of Ireland

View shared research outputs
Top Co-Authors

Avatar

Anna Fensel

University of Innsbruck

View shared research outputs
Top Co-Authors

Avatar

Javier D. Fernández

Vienna University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Olha Drozd

Vienna University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge