-
2
-
-
48349128877
-
Privacy-preserving reasoning on the semantic web
-
IEEE Computer Society
-
J. Bao, G. Slutzki, and V. Honavar. Privacy-preserving reasoning on the semantic web. In Proc. of WI-2007, pages 791-797. IEEE Computer Society, 2007.
-
(2007)
Proc. of WI-2007
, pp. 791-797
-
-
Bao, J.1
Slutzki, G.2
Honavar, V.3
-
3
-
-
19944380112
-
Database security-concepts, approaches, and challenges
-
E. Bertino and R. S. Sandhu. Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Sec. Com-put., 2(1):2-19, 2005.
-
(2005)
IEEE Trans. Dependable Sec. Com-put
, vol.2
, Issue.1
, pp. 2-19
-
-
Bertino, E.1
Sandhu, R.S.2
-
4
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
J. Biskup and P. A. Bonatti. Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec., 3(1):14-27, 2004.
-
(2004)
Int. J. Inf. Sec
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
5
-
-
44249126774
-
Keeping secrets in incomplete databases
-
J. Biskup and T. Weibert. Keeping secrets in incomplete databases. Int. J. Inf. Sec., 7(3):199-217, 2008.
-
(2008)
Int. J. Inf. Sec
, vol.7
, Issue.3
, pp. 199-217
-
-
Biskup, J.1
Weibert, T.2
-
6
-
-
84958817151
-
Reasoning about XACML policies using CSP
-
J. Bryans. Reasoning about XACML policies using CSP. In Proc. of SWS, 2005.
-
(2005)
Proc. of SWS
-
-
Bryans, J.1
-
8
-
-
84958817153
-
Privacy-preserving query answering in logic-based information systems
-
B. Cuenca Grau and I. Horrocks. Privacy-preserving query answering in logic-based information systems. In Proc. of ECAI. IOS Press, 2008.
-
(2008)
Proc. of ECAI. IOS Press
-
-
Cuenca Grau, B.1
Horrocks, I.2
-
9
-
-
78751695669
-
Import-by-Query: Ontology Reasoning under Access Limitations
-
AAAI Press
-
B. Cuenca Grau, B. Motik, and Y. Kazakov. Import-by-Query: Ontology Reasoning under Access Limitations. In Proc. IJ-CAI, pages 727-733. AAAI Press, 2009.
-
(2009)
Proc. IJ-CAI
, pp. 727-733
-
-
Cuenca Grau, B.1
Motik, B.2
Kazakov, Y.3
-
13
-
-
84860568667
-
Pushing the limits of reasoning over ontologies with hidden content
-
Toronto, ON, Canada, May AAAI Press. To appear
-
B. C. Grau and B. Motik. Pushing the Limits of Reasoning over Ontologies with Hidden Content. In Proc. of the 12th Int. Conference on Principles of Knowledge Representation and Reasoning (KR 2010), Toronto, ON, Canada, May 9-13, 2010. AAAI Press. To appear.
-
(2010)
Proc. of the 12th Int. Conference on Principles of Knowledge Representation and Reasoning (KR 2010)
, pp. 9-13
-
-
Grau, B.C.1
Motik, B.2
-
14
-
-
0035658039
-
Answering queries using views: A survey
-
A. Y. Halevy. Answering queries using views: A survey. VLDB J., 10(4):270-294, 2001.
-
(2001)
VLDB J
, vol.10
, Issue.4
, pp. 270-294
-
-
Halevy, A.Y.1
-
15
-
-
4344615591
-
From SHIQ and RDF to OWL: The making of a Web ontology language
-
Elsevier
-
I. Horrocks, P. F. Patel-Schneider, and F. van Harmelen. From SHIQ and RDF to OWL: The making of a Web ontology language. J. of Web Semantics, Elsevier, 1(1):7-26, 2003.
-
(2003)
J. of Web Semantics
, vol.1
, Issue.1
, pp. 7-26
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Van Harmelen, F.3
-
17
-
-
78751681051
-
Forgetting and uniform interpolation in large-scale description logic terminologies
-
B. Konev, D. Walter, and F. Wolter. Forgetting and uniform interpolation in large-scale description logic terminologies. In Proc. IJCAI. AAAI Press, 2009.
-
(2009)
Proc. IJCAI. AAAI Press
-
-
Konev, B.1
Walter, D.2
Wolter, F.3
-
18
-
-
0002842314
-
Obtaining complete answers from incomplete databases
-
A. Y. Levy. Obtaining complete answers from incomplete databases. In Proc. of VLDB, pages 402-412, 1996.
-
(1996)
Proc. of VLDB
, pp. 402-412
-
-
Levy, A.Y.1
-
20
-
-
33845891886
-
A formal analysis of information disclosure in data exchange
-
G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. J. Comput. Syst. Sci., 73(3):507-534, 2007.
-
(2007)
J. Comput. Syst. Sci
, vol.73
, Issue.3
, pp. 507-534
-
-
Miklau, G.1
Suciu, D.2
-
22
-
-
35348840321
-
Bridging the gap between OWL and Relational Databases
-
ACM Press
-
B. Motik, I. Horrocks, and U. Sattler. Bridging the Gap Between OWL and Relational Databases. In Proc. of WWW 2007, pages 807-816. ACM Press, 2007.
-
(2007)
Proc. of WWW 2007
, pp. 807-816
-
-
Motik, B.1
Horrocks, I.2
Sattler, U.3
-
23
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
ACM
-
S. Rizvi, A. O. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In Proc. of SIGMOD-04, pages 551-562. ACM, 2004.
-
(2004)
Proc. of SIGMOD-04
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.O.2
Sudarshan, S.3
Roy, P.4
-
24
-
-
79959252733
-
A formal model of data privacy
-
LNCS. Springer
-
P. Stouppa and T. Studer. A formal model of data privacy. In Proc. of PSI-06, volume 4378 of LNCS. Springer, 2007.
-
(2007)
Proc. of PSI-06
, vol.4378
-
-
Stouppa, P.1
Studer, T.2
-
25
-
-
67650486144
-
Data privacy for knowledge bases
-
P. Stouppa and T. Studer. Data privacy for knowledge bases. In LFCS, pages 409-421, 2009.
-
(2009)
LFCS
, pp. 409-421
-
-
Stouppa, P.1
Studer, T.2
-
27
-
-
33845388513
-
Evaluating access control policies through model checking
-
N. Zhang, M. Ryan, and D. Guelev. Evaluating access control policies through model checking. In Proc. of ISC, 2005.
-
(2005)
Proc. of ISC
-
-
Zhang, N.1
Ryan, M.2
Guelev, D.3
|