{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:02:29Z","timestamp":1747224149650,"version":"3.40.5"},"reference-count":38,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10,1]]},"abstract":"<p>Fuzzy role-based access control (FRBAC) is essential for risk-based environments in many futuristic applications, even though role-based access control (RBAC) is the efficient and widely used access control model for enterprise applications. In FRBAC, authorization related information is vague. It brings the fuzziness in mapping among the components of FRBAC such as user, role and permission. Holding the fuzziness in FRBAC, it is challenging for the security engineer to verify the constraints and correctness of access control policy. On verifying the constraints and correctness of access control policy, knowledge representation techniques are much useful in practice. In this scenario, representing FRBAC using fuzzy ontology might be the right choice for semantic web application. The main objective of this article is to represent the access permissions of FRBAC using fuzzy ontology and verify whether the constraints of FRBAC are possible to get implemented in it or not.<\/p>","DOI":"10.4018\/ijitpm.2019100105","type":"journal-article","created":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T19:29:39Z","timestamp":1569526179000},"page":"118-136","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy Role Based Access Control Design using Fuzzy Ontology"],"prefix":"10.4018","volume":"10","author":[{"given":"Chandra Mouliswaran","family":"Subramanian","sequence":"first","affiliation":[{"name":"Vellore Institute of Technology, Vellore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8455-9108","authenticated-orcid":true,"given":"Aswani Kumar","family":"Cherukuri","sequence":"additional","affiliation":[{"name":"Vellore Institute of Technology, Vellore, India"}]}],"member":"2432","reference":[{"key":"IJITPM.2019100105-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2017.01.014"},{"key":"IJITPM.2019100105-1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0196-1.ch039"},{"key":"IJITPM.2019100105-2","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2015.2505329"},{"key":"IJITPM.2019100105-3","unstructured":"Calegari, S., & Sanchez, E. (2007). A fuzzy ontology-approach to improve semantic information retrieval. In Proceedings of the Third International Conference on Uncertainty Reasoning for the Semantic Web (pp. 117-122). CEUR-WS."},{"key":"IJITPM.2019100105-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2007.12.004"},{"key":"IJITPM.2019100105-5","doi-asserted-by":"publisher","DOI":"10.4018\/IJITPM.2018010103"},{"key":"IJITPM.2019100105-6","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0980-1"},{"key":"IJITPM.2019100105-7","doi-asserted-by":"publisher","DOI":"10.1109\/IIT.2007.4430476"},{"key":"IJITPM.2019100105-8","unstructured":"Covington, M. J., Moyer, M. J., & Ahamad, M. (2000). Generalized role-based access control for securing future applications. Georgia Institute of Technology. Retrieved from http:\/\/hdl.handle.net\/1853\/6580"},{"issue":"5","key":"IJITPM.2019100105-9","first-page":"4304","article-title":"Knowledge Representation using Fuzzy Ontologies\u2013A Review.","volume":"6","author":"N.Devadoss","year":"2015","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"IJITPM.2019100105-10","unstructured":"Di, W., Jian, L., Yabo, D., & Miaoliang, Z. (2005). Using semantic web technologies to specify constraints of RBAC. In Proceedings of the Sixth International Conference onParallel and Distributed Computing, Applications and Technologies PDCAT 2005, Dalian, China (pp. 543-545). IEEE."},{"key":"IJITPM.2019100105-11","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"IJITPM.2019100105-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2009.10.003"},{"key":"IJITPM.2019100105-13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_13"},{"key":"IJITPM.2019100105-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.12.006"},{"key":"IJITPM.2019100105-15","first-page":"244","article-title":"Ontology-based access control management: Two use cases.","author":"M.Imran-Daud","year":"2016","journal-title":"Proc. 8th Int. Conf. Agents Artif. Intell."},{"key":"IJITPM.2019100105-16","doi-asserted-by":"publisher","DOI":"10.1007\/11552338_6"},{"key":"IJITPM.2019100105-17","unstructured":"Knechtel, M. (2010). Access restrictions to and with description logic web ontologies [Doctoral dissertation]. Technische Universit\u00e4t Dresden, Dresden."},{"key":"IJITPM.2019100105-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.09.026"},{"key":"IJITPM.2019100105-19","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2012.648457"},{"key":"IJITPM.2019100105-20","doi-asserted-by":"publisher","DOI":"10.1002\/sec.589"},{"key":"IJITPM.2019100105-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2011.02.010"},{"issue":"1","key":"IJITPM.2019100105-22","first-page":"59","article-title":"Ontology-based access control for social network systems. International Journal of Information Privacy","volume":"1","author":"A.Masoumzadeh","year":"2011","journal-title":"Security and Integrity"},{"key":"IJITPM.2019100105-23","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275915"},{"key":"IJITPM.2019100105-24","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367575"},{"key":"IJITPM.2019100105-25","doi-asserted-by":"publisher","DOI":"10.4018\/IJITPM.2016100101"},{"key":"IJITPM.2019100105-26","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968575"},{"key":"IJITPM.2019100105-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.05.028"},{"key":"IJITPM.2019100105-28","doi-asserted-by":"publisher","DOI":"10.4018\/IJITPM.2018040101"},{"key":"IJITPM.2019100105-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.122"},{"key":"IJITPM.2019100105-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.04.016"},{"key":"IJITPM.2019100105-31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_17"},{"key":"IJITPM.2019100105-32","doi-asserted-by":"publisher","DOI":"10.4018\/IJITPM.2017010103"},{"key":"IJITPM.2019100105-33","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-018-0840-7"},{"key":"IJITPM.2019100105-34","doi-asserted-by":"crossref","unstructured":"Takabi, H., Amini, M., & Jalili, R. (2007). Enhancing role-based access control model through fuzzy relations. In Proceedings of the Third International Symposium onInformation Assurance and Security IAS 2007, Manchester, UK (pp. 131-136). IEEE.","DOI":"10.1109\/ISIAS.2007.4299763"},{"key":"IJITPM.2019100105-35","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.87"},{"key":"IJITPM.2019100105-36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14049-5_67"},{"key":"IJITPM.2019100105-37","doi-asserted-by":"publisher","DOI":"10.1007\/11560647_25"}],"container-title":["International Journal of Information Technology Project Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=238846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T21:54:18Z","timestamp":1651874058000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJITPM.2019100105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10,1]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijitpm.2019100105","relation":{},"ISSN":["1938-0232","1938-0240"],"issn-type":[{"type":"print","value":"1938-0232"},{"type":"electronic","value":"1938-0240"}],"subject":[],"published":{"date-parts":[[2019,10,1]]}}}