{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:35:16Z","timestamp":1754156116586,"version":"3.41.2"},"reference-count":28,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2015,2,9]],"date-time":"2015-02-09T00:00:00Z","timestamp":1423440000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2,9]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 This paper provides a new Digital Library architecture that supports polyhierarchic ontology structure where a child concept representing an interdisciplinary subject area can have multiple parent concepts. The paper further proposes an access control mechanism for controlled access to different concepts by different users depending on the authorizations available to each such user. The proposed model thus provides a better knowledge representation and faster searching possibility of documents for modern Digital Libraries with controlled access to the system. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 Since the proposed Digital Library Architecture considers polyhierarchy, the underlying hierarchical structure becomes a Directed Acyclic Graph instead of a tree. A new access control model has been developed for such a polyhierarchic ontology structure. It has been shown that such model may give rise to undecidability problem. A client specific view generation mechanism has been developed to solve the problem. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The paper has three major contributions. First, it provides better knowledge representation for present-day digital libraries, as new interdisciplinary subject areas are getting introduced. Concepts representing interdisciplinary subject areas will have multiple parents, and consequently, the library ontology introduces a new set of nodes representing document classes. This concept also provides faster search mechanism. Secondly, a new access control model has been introduced for the ontology structure where a user gets authorizations to access a concept node only if its credential supports it. Lastly, a client-based view generation algorithm has been developed so that a client\u2019s access remains limited to its view and avoids any possibility of undecidability in authorization specification. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title>\n               <jats:p> \u2013 The proposed model, in its present form, supports only read and browse facilities. It would later be extended for addition and update of documents. Moreover, the paper explains the model in a single user environment. It will be augmented later to consider simultaneous access from multiple users. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 The paper emphasizes the need for changing the present digital library ontology to a polyhierarchic structure to provide proper representation of knowledge related to the concepts covering interdisciplinary subject areas. Possible implementation strategies have also been mentioned. This design method can also be extended for other semantic web applications. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This paper offers a new knowledge management strategy to cover the gradual proliferation of interdisciplinary subject areas along with a suitable access control model for a digital library ontology. This methodology can also be extended for other semantic web applications. <\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/jkm-10-2014-0435","type":"journal-article","created":{"date-parts":[[2015,2,13]],"date-time":"2015-02-13T05:57:23Z","timestamp":1423807043000},"page":"45-59","source":"Crossref","is-referenced-by-count":5,"title":["Resolving authorization conflicts by ontology views for controlled access to a digital library"],"prefix":"10.1108","volume":"19","author":[{"given":"Subhasis","family":"Dasgupta","sequence":"first","affiliation":[]},{"given":"Pinakpani","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Chandan","family":"Mazumdar","sequence":"additional","affiliation":[]},{"given":"Aditya","family":"Bagchi","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122619473635700_b1","doi-asserted-by":"crossref","unstructured":"Adam, N.\n               , \n                  Atluri, V.\n               , \n                  Bertino, E.\n                and \n                  Ferrari, E.\n                (2002), \u201cA content-based authorization model for digital libraries\u201d, \n                  IEEE Transactions on Knowledge and Data Engineering\n               , Vol. 14 No. 2, pp. 296-315.","DOI":"10.1109\/69.991718"},{"key":"key2020122619473635700_b2","unstructured":"Carminati, B.\n               , \n                  Ferrari, E.\n                and \n                  Bertino, E.\n                (2005), \u201cSecuring XML data in third-party distribution systems\u201d, Proceedings of the 14th ACM international conference on Information and knowledge management \u2212 CIKM \u201905, Bremen, available at: http:\/\/doi.acm.org\/10.1145\/1099554.1099575"},{"key":"key2020122619473635700_b3","unstructured":"Chan, L.\n                (1986), \u201cLibrary of congress classification as an online retrieval tool: potentials and limitations\u201d, \n                  Information Technology and Libraries\n               , Vol. 5 No. 3, pp. 181-192, available at: http:\/\/dl.acm.org\/citation.cfm?id=11222.11223 (accessed 5 November 2014)."},{"key":"key2020122619473635700_b4","unstructured":"Cormen, T.\n               , \n                  Leiserson, C.\n               , \n                  Rivest, R.\n                and \n                  Stein, C.\n                (2009), \n                  Introduction to Algorithms\n               , MIT Press, Cambridge (Inglaterra)."},{"key":"key2020122619473635700_b5","doi-asserted-by":"crossref","unstructured":"Couto, T.\n               , \n                  Cristo, M.\n               , \n                  Gon\u00c3\u00a7alves, M.\n               , \n                  Calado, P.\n               , \n                  Ziviani, N.\n               , \n                  Moura, E.\n                and \n                  Ribeiro-Neto, B.\n                (2006), \u201cA comparative study of citations and links in document classification\u201d, Proceedings of the 6th ACM\/IEEE-CS joint conference on Digital libraries \u2013 JCDL \u201906, Chapel Hill, NC.","DOI":"10.1145\/1141753.1141766"},{"key":"key2020122619473635700_b6","doi-asserted-by":"crossref","unstructured":"Damiani, E.\n               , \n                  di Vimercati, S.\n               , \n                  Paraboschi, S.\n                and \n                  Samarati, P.\n                (2000), \u201cSecuring XML documents\u201d, Advances in Database Technology \u00e2 EDBT 2000, available at: http:\/\/doi.acm.org\/10.1145\/505586.505590, pp. 121-135.","DOI":"10.1007\/3-540-46439-5_8"},{"key":"key2020122619473635700_b7","doi-asserted-by":"crossref","unstructured":"Damiani, E.\n               , \n                  De Capitani di Vimercati, S.\n               , \n                  Paraboschi, S.\n                and \n                  Samarati, P.\n                (2002), \u201cA fine-grained access control system for XML documents\u201d, \n                  ACM Transactions on Information and System Security\n               , Vol. 5 No. 2, pp. 169-202.","DOI":"10.1145\/505586.505590"},{"key":"key2020122619473635700_b8","doi-asserted-by":"crossref","unstructured":"Dasgupta, S.\n                and \n                  Bagchi, A.\n                (2011), \u201cControlled access over documents for concepts having multiple parents in a digital library ontology\u201d, \n                  Computer Information Systems \u00e2\u201c Analysis and Technologies\n               , Springer Berlin Heidelberg, available at: http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-642-27245-5_33, pp. 277-285.","DOI":"10.1007\/978-3-642-27245-5_33"},{"key":"key2020122619473635700_b9","doi-asserted-by":"crossref","unstructured":"Dasgupta, S.\n                and \n                  Bagchi, A.\n                (2012a), \u201cA graph-based formalism for controlling access to a digital library ontology\u201d, \n                  Computer Information Systems and Industrial Management\n               , IEEE, available at: http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6408004, pp. 111-122.","DOI":"10.1007\/978-3-642-33260-9_9"},{"key":"key2020122619473635700_b10","doi-asserted-by":"crossref","unstructured":"Dasgupta, S.\n                and \n                  Bagchi, A.\n                (2012b), \u201cResolving conflicts between role-hierarchy and concept-hierarchy in a digital library ontology\u201d, 2012 Third International Conference on Emerging Applications of Information Technology, Kolkata.","DOI":"10.1109\/EAIT.2012.6408004"},{"key":"key2020122619473635700_b11","doi-asserted-by":"crossref","unstructured":"Gabillon, A.\n                (2005), \u201cA formal access control model for XML databases\u201d, \n                  Secure Data Management\n               , Springer Berlin Heidelberg, available at: http:\/\/link.springer.com\/chapter\/10.1007%2F11552338_7, pp. 86-103.","DOI":"10.1007\/11552338_7"},{"key":"key2020122619473635700_b13","doi-asserted-by":"crossref","unstructured":"Gon\u00c3\u00a7alves, M.\n               , \n                  Fox, E.\n                and \n                  Watson, L.\n                (2008), \u201cTowards a digital library theory: a formal digital library ontology\u201d, \n                  International Journal on Digital Libraries\n               , Vol. 8 No. 2, pp. 91-114.","DOI":"10.1007\/s00799-008-0033-1"},{"key":"key2020122619473635700_b12","doi-asserted-by":"crossref","unstructured":"Gon\u00c3\u00a7alves, M.\n               , \n                  Fox, E.\n               , \n                  Watson, L.\n                and \n                  Kipp, N.\n                (2004), \u201cStreams, structures, spaces, scenarios, societies (5s)\u201d, \n                  Transaction on Information Systems\n               , Vol. 22 No. 2, pp. 270-312.","DOI":"10.1145\/984321.984325"},{"key":"key2020122619473635700_b14","doi-asserted-by":"crossref","unstructured":"Kashyap, V.\n                and \n                  Sheth, A.\n                (1996), \u201cSemantic and schematic similarities between database objects: a context-based approach\u201d, \n                  The VLDB Journal The International Journal on Very Large Data Bases\n               , Vol. 5 No. 4, pp. 276-304.","DOI":"10.1007\/s007780050029"},{"key":"key2020122619473635700_b15","doi-asserted-by":"crossref","unstructured":"Kaushik, S.\n               , \n                  Wijesekera, D.\n                and \n                  Ammann, P.\n                (2005), \u201cPolicy-based dissemination of partial web-ontologies\u201d, Proceedings of the 2005 Workshop on Secure Web Services \u2013 SWS \u201905, Fairfax, VA.","DOI":"10.1145\/1103022.1103030"},{"key":"key2020122619473635700_b16","doi-asserted-by":"crossref","unstructured":"Kulikowski, J.\n                (2005), \u201cThe role of ontological models in pattern recognition\u201d, \n                  Advances in Soft Computing\n               , Springer Berlin Heidelberg, available at: http:\/\/link.springer.com\/chapter\/10.1007%2F3-540-32390-2_4, pp. 43-52.","DOI":"10.1007\/3-540-32390-2_4"},{"key":"key2020122619473635700_b17","doi-asserted-by":"crossref","unstructured":"Noy, N.\n                and \n                  Musen, M.\n                (2004), \u201cSpecifying ontology views by traversal\u201d, The Semantic Web \u00e2\u201c ISWC 2004, Hiroshima, available at: http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-540-30475-3_49, pp. 713-725.","DOI":"10.1007\/978-3-540-30475-3_49"},{"key":"key2020122619473635700_b18","doi-asserted-by":"crossref","unstructured":"Ouksel, A.\n                and \n                  Ahmed, I.\n                (1999), \u201cOntologies are not the panacea in data integration: a flexible coordinator to mediate context construction\u201d, \n                  Ontologies and Databases\n               , Kluwer Academic Publishers, available at: http:\/\/dx.doi.org\/10.1023\/A:1008626109650, pp. 7-35.","DOI":"10.1023\/A:1008626109650"},{"key":"key2020122619473635700_b19","unstructured":"Qin, L.\n                and \n                  Atluri, V.\n                (2010), \u201cSemantics-aware security policy specification for the semantic web data\u201d, \n                  International Journal of Information and Computer Security\n               , Vol. 4 No. 1, p. 52."},{"key":"key2020122619473635700_b20","doi-asserted-by":"crossref","unstructured":"Ray, I.\n                and \n                  Chakraborty, S.\n                (2006), \u201cA framework for flexible access control in digital library systems\u201d, \n                  Data and Applications Security XX\n               , Springer Berlin Heidelberg, available at: http:\/\/link.springer.com\/chapter\/10.1007%2F11805588_18, pp. 252-266.","DOI":"10.1007\/11805588_18"},{"key":"key2020122619473635700_b21","doi-asserted-by":"crossref","unstructured":"Saeed, H.\n                and \n                  Chaudhry, A.\n                (2002), \u201cUsing Dewey decimal classification scheme (DDC) for building taxonomies for knowledge organization\u201d, \n                  Journal of Documentation\n               , Vol. 58 No. 5, pp. 575-583.","DOI":"10.1108\/00220410210441595"},{"key":"key2020122619473635700_b22","doi-asserted-by":"crossref","unstructured":"Seidenberg, J.\n                and \n                  Rector, A.\n                (2006), \u201cWeb ontology segmentation\u201d, Proceedings of the 15th international conference on World Wide Web \u2013 WWW \u201906, New York, NY.","DOI":"10.1145\/1135777.1135785"},{"key":"key2020122619473635700_b23","unstructured":"Sowa, J.\n                (2000), \n                  Knowledge Representation\n               , Brooks\/Cole, Pacific Grove, CA."},{"key":"key2020122619473635700_b24","doi-asserted-by":"crossref","unstructured":"Spies, M.\n                (2010), \u201cAn ontology modelling perspective on business reporting\u201d, \n                  Information Systems\n               , Vol. 35 No. 4, pp. 404-416.","DOI":"10.1016\/j.is.2008.12.003"},{"key":"key2020122619473635700_b25","doi-asserted-by":"crossref","unstructured":"Torres, R.\n               , \n                  McNee, S.\n               , \n                  Abel, M.\n               , \n                  Konstan, J.\n                and \n                  Riedl, J.\n                (2004), \u201cEnhancing digital libraries with TechLens+\u201d, Proceedings of the 2004 joint ACM\/IEEE conference on Digital libraries \u2013 JCDL \u201904, Tuscon, AZ.","DOI":"10.1145\/996350.996402"},{"key":"key2020122619473635700_b26","unstructured":"Tudhope, D.\n               , \n                  Alani, H.\n                and \n                  Jones, C.\n                (2001), \u201cAugmenting thesaurus relationships: possibilities for retrieval\u201d, \n                  Journal of Digital Information\n               , No. 1, p. 8, available at: https:\/\/journals.tdl.org\/jodi\/index.php\/jodi\/article\/view\/181 (accessed 5 November 2014)."},{"key":"key2020122619473635700_b27","doi-asserted-by":"crossref","unstructured":"Van, T.\n                and \n                  Beigbeder, M.\n                (2008), \u201cHybrid method for personalized search in scientific digital libraries\u201d, \n                  Computational Linguistics and Intelligent Text Processing\n               , Springer Berlin Heidelberg, available at: http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-540-78135-6_44, pp. 512-521.","DOI":"10.1007\/978-3-540-78135-6_44"},{"key":"key2020122619473635700_b28","doi-asserted-by":"crossref","unstructured":"Vaughan, L.\n                and \n                  Shaw, D.\n                (2003), \u201cBibliographic and web citations: what is the difference?\u201d, \n                  Journal of the American Society for Information Science and Technology\n               , Vol. 54 No. 14, pp. 1313-1322.","DOI":"10.1002\/asi.10338"}],"container-title":["Journal of Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JKM-10-2014-0435","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JKM-10-2014-0435\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JKM-10-2014-0435\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:27:39Z","timestamp":1753396059000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jkm\/article\/19\/1\/45-59\/259766"}},"subtitle":[],"editor":[{"given":"Dr.","family":"Biswanath Dutta","sequence":"first","affiliation":[]},{"given":"Dr.","family":"Devika P. Madalli","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2015,2,9]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,2,9]]}},"alternative-id":["10.1108\/JKM-10-2014-0435"],"URL":"https:\/\/doi.org\/10.1108\/jkm-10-2014-0435","relation":{},"ISSN":["1367-3270"],"issn-type":[{"type":"print","value":"1367-3270"}],"subject":[],"published":{"date-parts":[[2015,2,9]]}}}