Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Access Control Framework for Social Network System using Ontology

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 79 - Number 4
Year of Publication: 2013
Vipin Kumar
Sachin Kumar

Vipin Kumar and Sachin Kumar. Article: Access Control Framework for Social Network System using Ontology. International Journal of Computer Applications 79(4):10-18, October 2013. Full text available. BibTeX

	author = {Vipin Kumar and Sachin Kumar},
	title = {Article: Access Control Framework for Social Network System using Ontology},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {79},
	number = {4},
	pages = {10-18},
	month = {October},
	note = {Full text available}


In recent years, we have seen unprecedented growth in the area of Online Social Networking (OSN) that is still keeping on day by day. Social networking websites such as Facebook, Google+, and Twitter are using widely by people to share personal and public information with friends, coworkers, colleagues, family and even with strangers . Facebook, one of the most popular social network sites, has million of active users and billions of pieces of content or data that use daily like web links, news stories, blog posts, notes, photo albums, etc. shared each month. To protect such kind for huge or big data or information need more secured and flexible access control model. There are so many access control policies are available for controlling online social network, but all social networking sites like Facebook or Twitter has their own access control mechanism that is not standard and still not more secured or flexible. To protect such kind of publically oriented user data need more dynamic access control model. In order to protect OSN, in this paper an innovative or dynamic access control framework for social networking systems using semantic web ontology has been proposed which addresses the protection of semantic-rich information in a knowledge base ontology


  • Long Qin, Liu Peng, Pan Aimin. Research and Implementation of an Extended Administrative Role-Based Access Control Model. Journal of Computer Research and Development. 2005, 42(5):868- 876.
  • HUANG Jian, QING Si-Han, WEN Hong-Zi. Timed Role-Based Access Control. Journal of Software. 2003, 14(11):1945-1954.
  • DENG Ji-Bo, HONG Fan. Task-Based Access Control Model. Journal of Software. 2003, 14(1):77- 82.
  • Ll Xiao-feng, FENG Deng-guo, CHEN Zhao-wu,etal. Model for attribute based access control. Journal on Communications. 2008, 29(4):90-98.
  • http://wikipedia. org
  • Ferraiolo, D. F. , Kuhn, D. R. : Role Based Access Control. in 15th National Computer Security Conference. 1992.
  • Sandhu, R. S. , Coyne, E. J. , Feinstein, H. L. , Youman, C. E. : Role-Based Access Control Models. IEEE Computer, 1996. 29(2): p. 38-47.
  • Kolter, J. , Schillinger, R. , Pernul, G. : A Privacy-Enhanced Attribute-Based Access Control System. inDBSec. 2007: Springer.
  • Shen, H. , Dewan, P. : Access Control for Collaborative Environments. in Computer- Supported Cooperative Work Conference. 1992: ACM Press.
  • Zhao, B. : Collaborative Access Control, in Seminar on Network Security. 2001.
  • Tolone, W. , Ahn, G. , Pai, T. , Hong, S. : Access control in collaborative systems. ACM Computing Surveys, 2005. 37: p. 29-41.
  • Jaeger, T. , Prakash, A. : Requirements of role-based access control for collaborative systems, in 1st ACM Workshop on Role-based access control. 1996: ACM Press.
  • Gutierrez Vela, F. L. , Isla Montes, J. L. , Paderewski, P. , Sanchez, M. : Organization Modelling to Support Access Control for Collaborative Systems, in Software Engineering Research and Practice. 2006.
  • Kern, A. , Walhorn, C. : Rule support for role-based access control, in 10th ACM symposium on Access Control Models and Technologies. 2005: ACM Press
  • Alotaiby, F. T. , Chen, J. X. : A Model for Team-based Access Control, in International Conference on Information Technology: Coding and Computing. 2004: IEEE Computer Society.
  • Periorellis, P. , Parastatidis, S. : Task-Based Access Control for Virtual Organizations, in Scientific Engineering of Distributed Java Applications. 2005.
  • Toninelli, A. , Bradshaw, J. , Kagal, L. , Montanari, R. : Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments, in Semantic Web and Policy Workshop. 2005.
  • Demchenko, Y. , Gommans, L. , Tokmakoff, A. , van Buuren, R. : Policy Based Access Control in Dynamic Grid-based Collaborative Environment, in International Symposium on Collaborative Technologies and Systems. 2006: IEEE Computer Society.
  • Massa, P. , Avesani, P. : Trust Metrics on Controversial Users: Balancing Between Tyranny of the Majority and Echo Chambers. International Journal on Semantic Web & Information Systems, 2007. 3(1): p. 39-64.
  • Breu, R. , Popp, G. and Alam, M. , Model based development of access policies, International Journal on Software Tools for Technology Transfer, 9(5) (2007) 457, 470.
  • Bertino, E. , Bonatti, P. and Ferrari, E. , TRBAC: a temporal role?based access control model, ACM Transactions on Information and System Security, 4(3) (2001) 191–233.
  • Wainer, J. , Barthelmess, P. and Kumar, A. , W?RBAC a workflow security model incorporating controlled overriding of constraints, International Journal of Cooperative Information Systems, 12(4) (2003) 455?485.
  • Moses, T. , OASIS eXtensible Access Control Markup Language 2. 0, core specification. OASIS XACML Technical Committee StandarD, 2005.
  • Wu, D. , Chen, X. , Lin, J. & Zhu, M. , Ontology?Based RBAC Specification for Interoperation in Distributed Environment. First Asian Semantic Web Conference, Beijing, China, September 3-7, 2006, pp. 179-190.