Abstract
We illustrate several novel attacks to the confidentiality of knowledge bases (KB). Then we introduce a new confidentiality model, sensitive enough to detect those attacks, and a method for constructing secure KB views. We identify safe approximations of the background knowledge exploited in the attacks; they can be used to reduce the complexity of constructing secure KB views.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F.: The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press (2003)
Baader, F., Knechtel, M., Peñaloza, R.: A generic approach for large-scale ontological reasoning in the presence of access restrictions to the ontology”s axioms. In: Bernstein, A., Karger, D.R., Heath, T., Feigenbaum, L., Maynard, D., Motta, E., Thirunarayan, K. (eds.) ISWC 2009. LNCS, vol. 5823, pp. 49–64. Springer, Heidelberg (2009)
Bao, J., Slutzki, G., Honavar, V.: Privacy-preserving reasoning on the semantic web. In: Web Intelligence, pp. 791–797. IEEE Computer Society (2007)
Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199–222 (2001)
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14–27 (2004)
Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40(1-2), 37–62 (2004)
Chen, W., Stuckenschmidt, H.: A model-driven approach to enable access control for ontologies. In: Wirtschaftsinformatik, Österreichische Computer Gesellschaft. books@ocg.at, vol. 246, pp. 663–672 (2009)
Cuenca Grau, B.: Privacy in ontology-based information systems: A pending matter. Semantic Web 1(1-2), 137–141 (2010)
Cuenca Grau, B., Horrocks, I.: Privacy-preserving query answering in logic-based information systems. In: ECAI 2008, pp. 40–44. IOS Press (2008)
Cuenca Grau, B., Motik, B.: Importing ontologies with hidden content. In: Description Logics. CEUR Workshop Proceedings, vol. 477. CEUR-WS.org (2009)
Eiter, T., Fink, M., Krennwallner, T., Redl, C.: Conflict-driven ASP solving with external sources. Theory and Practice of Logic Programming 12(4-5), 659–679 (2012)
Eldora, M.K., Peñaloza, R.: Correcting access restrictions to a consequence more flexibly. In: Description Logics. CEUR Workshop Proc., vol. 745, CEUR-WS.org (2011)
Hitzler, P., Lukasiewicz, T. (eds.): RR 2010. LNCS, vol. 6333. Springer, Heidelberg (2010)
Knechtel, M., Stuckenschmidt, H.: Query-based access control for ontologies. In: Hitzler, Lukasiewicz (eds.) [13], pp. 73–87
Stouppa, P., Studer, T.: Data privacy for knowledge bases. In: Artemov, S., Nerode, A. (eds.) LFCS 2009. LNCS, vol. 5407, pp. 409–421. Springer, Heidelberg (2008)
Tao, J., Slutzki, G., Honavar, V.: Secrecy-preserving query answering for instance checking in \(\mathcal{EL}\). In: Hitzler, Lukasiewicz (eds.) [13], pp. 195–203
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bonatti, P.A., Sauro, L. (2013). A Confidentiality Model for Ontologies. In: Alani, H., et al. The Semantic Web – ISWC 2013. ISWC 2013. Lecture Notes in Computer Science, vol 8218. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41335-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-41335-3_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41334-6
Online ISBN: 978-3-642-41335-3
eBook Packages: Computer ScienceComputer Science (R0)