메뉴 건너뛰기




Volumn 1, Issue 1-2, 2010, Pages 137-141

Privacy in ontology-based information systems: A pending matter

Author keywords

Data privacy; Ontologies; Semantic web

Indexed keywords


EID: 84891914425     PISSN: 15700844     EISSN: 22104968     Source Type: Journal    
DOI: 10.3233/SW-2010-0009     Document Type: Article
Times cited : (19)

References (27)
  • 2
    • 48349128877 scopus 로고    scopus 로고
    • Privacy-preserving reasoning on the semantic web
    • IEEE Computer Society
    • J. Bao, G. Slutzki, and V. Honavar. Privacy-preserving reasoning on the semantic web. In Proc. of WI-2007, pages 791-797. IEEE Computer Society, 2007.
    • (2007) Proc. of WI-2007 , pp. 791-797
    • Bao, J.1    Slutzki, G.2    Honavar, V.3
  • 3
    • 19944380112 scopus 로고    scopus 로고
    • Database security-concepts, approaches, and challenges
    • E. Bertino and R. S. Sandhu. Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Sec. Com-put., 2(1):2-19, 2005.
    • (2005) IEEE Trans. Dependable Sec. Com-put , vol.2 , Issue.1 , pp. 2-19
    • Bertino, E.1    Sandhu, R.S.2
  • 4
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • J. Biskup and P. A. Bonatti. Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec., 3(1):14-27, 2004.
    • (2004) Int. J. Inf. Sec , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 5
    • 44249126774 scopus 로고    scopus 로고
    • Keeping secrets in incomplete databases
    • J. Biskup and T. Weibert. Keeping secrets in incomplete databases. Int. J. Inf. Sec., 7(3):199-217, 2008.
    • (2008) Int. J. Inf. Sec , vol.7 , Issue.3 , pp. 199-217
    • Biskup, J.1    Weibert, T.2
  • 6
    • 84958817151 scopus 로고    scopus 로고
    • Reasoning about XACML policies using CSP
    • J. Bryans. Reasoning about XACML policies using CSP. In Proc. of SWS, 2005.
    • (2005) Proc. of SWS
    • Bryans, J.1
  • 8
    • 84958817153 scopus 로고    scopus 로고
    • Privacy-preserving query answering in logic-based information systems
    • B. Cuenca Grau and I. Horrocks. Privacy-preserving query answering in logic-based information systems. In Proc. of ECAI. IOS Press, 2008.
    • (2008) Proc. of ECAI. IOS Press
    • Cuenca Grau, B.1    Horrocks, I.2
  • 9
    • 78751695669 scopus 로고    scopus 로고
    • Import-by-Query: Ontology Reasoning under Access Limitations
    • AAAI Press
    • B. Cuenca Grau, B. Motik, and Y. Kazakov. Import-by-Query: Ontology Reasoning under Access Limitations. In Proc. IJ-CAI, pages 727-733. AAAI Press, 2009.
    • (2009) Proc. IJ-CAI , pp. 727-733
    • Cuenca Grau, B.1    Motik, B.2    Kazakov, Y.3
  • 12
    • 3142749878 scopus 로고    scopus 로고
    • Secure xml querying with security views
    • W. Fan, C. Y. Chan, and M. N. Garofalakis. Secure xml querying with security views. In Proc. of SIGMOD, pages 587-598, 2004.
    • (2004) Proc. of SIGMOD , pp. 587-598
    • Fan, W.1    Chan, C.Y.2    Garofalakis, M.N.3
  • 14
    • 0035658039 scopus 로고    scopus 로고
    • Answering queries using views: A survey
    • A. Y. Halevy. Answering queries using views: A survey. VLDB J., 10(4):270-294, 2001.
    • (2001) VLDB J , vol.10 , Issue.4 , pp. 270-294
    • Halevy, A.Y.1
  • 15
    • 4344615591 scopus 로고    scopus 로고
    • From SHIQ and RDF to OWL: The making of a Web ontology language
    • Elsevier
    • I. Horrocks, P. F. Patel-Schneider, and F. van Harmelen. From SHIQ and RDF to OWL: The making of a Web ontology language. J. of Web Semantics, Elsevier, 1(1):7-26, 2003.
    • (2003) J. of Web Semantics , vol.1 , Issue.1 , pp. 7-26
    • Horrocks, I.1    Patel-Schneider, P.F.2    Van Harmelen, F.3
  • 16
    • 35348924314 scopus 로고    scopus 로고
    • Analyzing Web access control policies
    • V. Kolovski, J. A. Hendler, and B. Parsia. Analyzing Web access control policies. In Proc. of WWW, pages 677-686, 2007.
    • (2007) Proc. of WWW , pp. 677-686
    • Kolovski, V.1    Hendler, J.A.2    Parsia, B.3
  • 17
    • 78751681051 scopus 로고    scopus 로고
    • Forgetting and uniform interpolation in large-scale description logic terminologies
    • B. Konev, D. Walter, and F. Wolter. Forgetting and uniform interpolation in large-scale description logic terminologies. In Proc. IJCAI. AAAI Press, 2009.
    • (2009) Proc. IJCAI. AAAI Press
    • Konev, B.1    Walter, D.2    Wolter, F.3
  • 18
    • 0002842314 scopus 로고    scopus 로고
    • Obtaining complete answers from incomplete databases
    • A. Y. Levy. Obtaining complete answers from incomplete databases. In Proc. of VLDB, pages 402-412, 1996.
    • (1996) Proc. of VLDB , pp. 402-412
    • Levy, A.Y.1
  • 20
    • 33845891886 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. J. Comput. Syst. Sci., 73(3):507-534, 2007.
    • (2007) J. Comput. Syst. Sci , vol.73 , Issue.3 , pp. 507-534
    • Miklau, G.1    Suciu, D.2
  • 22
    • 35348840321 scopus 로고    scopus 로고
    • Bridging the gap between OWL and Relational Databases
    • ACM Press
    • B. Motik, I. Horrocks, and U. Sattler. Bridging the Gap Between OWL and Relational Databases. In Proc. of WWW 2007, pages 807-816. ACM Press, 2007.
    • (2007) Proc. of WWW 2007 , pp. 807-816
    • Motik, B.1    Horrocks, I.2    Sattler, U.3
  • 23
    • 3142702944 scopus 로고    scopus 로고
    • Extending query rewriting techniques for fine-grained access control
    • ACM
    • S. Rizvi, A. O. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In Proc. of SIGMOD-04, pages 551-562. ACM, 2004.
    • (2004) Proc. of SIGMOD-04 , pp. 551-562
    • Rizvi, S.1    Mendelzon, A.O.2    Sudarshan, S.3    Roy, P.4
  • 24
    • 79959252733 scopus 로고    scopus 로고
    • A formal model of data privacy
    • LNCS. Springer
    • P. Stouppa and T. Studer. A formal model of data privacy. In Proc. of PSI-06, volume 4378 of LNCS. Springer, 2007.
    • (2007) Proc. of PSI-06 , vol.4378
    • Stouppa, P.1    Studer, T.2
  • 25
    • 67650486144 scopus 로고    scopus 로고
    • Data privacy for knowledge bases
    • P. Stouppa and T. Studer. Data privacy for knowledge bases. In LFCS, pages 409-421, 2009.
    • (2009) LFCS , pp. 409-421
    • Stouppa, P.1    Studer, T.2
  • 27
    • 33845388513 scopus 로고    scopus 로고
    • Evaluating access control policies through model checking
    • N. Zhang, M. Ryan, and D. Guelev. Evaluating access control policies through model checking. In Proc. of ISC, 2005.
    • (2005) Proc. of ISC
    • Zhang, N.1    Ryan, M.2    Guelev, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.