You are on page 1of 1

1) Ontology-based Access Control Management: Two Use Cases:

In this paper author just focused on the very basic level of ontologies and there is no
practical implementation of ontologies just write different cases of ontologies by taking
two practical examples of OSNS and clouds.
Result:
It seems to be irrelevant with our approach.

2) Semantically Enriched Data Access Policies in eHealth:


We may use Fig 1 of this paper in our approach by using semantic PIP and context
handler.
Result:
In my opinion, this approach is far better than other paper’ approaches.

3) Supporting Attribute-based Access Control with Ontologies


OAP logic discuss in this paper also very helpful for our scenario and yeah it is very
simple as well so in my opinion we may proceed with above approach or maybe this one
it's totally up to you further we may discuss it in detail in the meeting.

4) Other 3 paper seems to be totally useless for our approach that’s why I don’t mention
them here.

You might also like