메뉴 건너뛰기




Volumn 7, Issue 3, 2014, Pages 223-252

Censors for Boolean description logic

Author keywords

Data privacy; Description logic; Information security; Knowledge base system; Query based evaluation

Indexed keywords

COMPUTER CIRCUITS; DATA PRIVACY; FORMAL LANGUAGES; KNOWLEDGE BASED SYSTEMS; SEARCH ENGINES; SECURITY OF DATA;

EID: 84912021270     PISSN: 18885063     EISSN: 20131631     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (19)

References (23)
  • 4
    • 4544311630 scopus 로고    scopus 로고
    • Basic description logics
    • Franz Baader, Diego Calvanese, Deborah L. McGuinness, Daniele Nardi, and Peter F. Patel-Schneider, editors. Cambridge University Press
    • Franz Baader and Werner Nutt. Basic description logics. In Franz Baader, Diego Calvanese, Deborah L. McGuinness, Daniele Nardi, and Peter F. Patel-Schneider, editors, The Description Logic Handbook, pages 43-95. Cambridge University Press, 2003.
    • (2003) The Description Logic Handbook , pp. 43-95
    • Baader, F.1    Nutt, W.2
  • 5
    • 48349128877 scopus 로고    scopus 로고
    • Privacy-preserving reasoning on the semantic web
    • Jie Bao, Giora Slutzki, and Vasant Honavar. Privacy-preserving reasoning on the semantic web. In Web Intelligence 2007, pages 791-797, 2007.
    • (2007) Web Intelligence 2007 , pp. 791-797
    • Bao, J.1    Slutzki, G.2    Honavar, V.3
  • 6
    • 0034174093 scopus 로고    scopus 로고
    • For unknown secrecies refusal is better than lying
    • Joachim Biskup. For unknown secrecies refusal is better than lying. Data & Knowledge Engineer- ing, 33(1):1-23, 2000.
    • (2000) Data & Knowledge Engineer- ing , vol.33 , Issue.1 , pp. 1-23
    • Biskup, J.1
  • 7
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Joachim Biskup and Piero A. Bonatti. Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security, 3(1):14-27, 2004.
    • (2004) International Journal of Information Security , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 8
    • 0347756656 scopus 로고    scopus 로고
    • Controlled query evaluation for known policies by combining lying and refusal
    • Joachim Biskup and Piero A. Bonatti. Controlled query evaluation for known policies by combining lying and refusal. Annals of Mathematics and Artificial Intelligence, 40(1-2):37-62, 2004.
    • (2004) Annals of Mathematics and Artificial Intelligence , vol.40 , Issue.1-2 , pp. 37-62
    • Biskup, J.1    Bonatti, P.A.2
  • 9
    • 34547684253 scopus 로고    scopus 로고
    • Controlled query evaluation with open queries for a decidable relational submodel
    • Joachim Biskup and Piero A. Bonatti. Controlled query evaluation with open queries for a decidable relational submodel. Annals of Mathematics and Artificial Intelligence, 50(1-2):39-77, 2007.
    • (2007) Annals of Mathematics and Artificial Intelligence , vol.50 , Issue.1-2 , pp. 39-77
    • Biskup, J.1    Bonatti, P.A.2
  • 16
    • 34447566308 scopus 로고    scopus 로고
    • A tableau decision algorithm for modalized ALC with constant domains
    • Carsten Lutz, Holger Sturm, Frank Wolter, and Michael Zakharyaschev. A tableau decision algorithm for modalized ALC with constant domains. Studia Logica, 72(2):199-232, 2002.
    • (2002) Studia Logica , vol.72 , Issue.2 , pp. 199-232
    • Lutz, C.1    Sturm, H.2    Wolter, F.3    Zakharyaschev, M.4
  • 18
    • 33845891886 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • Gerome Miklau and Dan Suciu. A formal analysis of information disclosure in data exchange. Journal of Computer and System Sciences, 73(3):507-534, 2007.
    • (2007) Journal of Computer and System Sciences , vol.73 , Issue.3 , pp. 507-534
    • Miklau, G.1    Suciu, D.2
  • 20
    • 26844576753 scopus 로고    scopus 로고
    • Provable data privacy
    • K. Viborg, J. Debenham, and R. Wagner, editors, volume 3588 of LNCS. Springer
    • Kilian Stoffel and Thomas Studer. Provable data privacy. In K. Viborg, J. Debenham, and R. Wagner, editors, Database and Expert Systems Applications (DEXA 2005), volume 3588 of LNCS, pages 324-332. Springer, 2005.
    • (2005) Database and Expert Systems Applications (DEXA 2005) , pp. 324-332
    • Stoffel, K.1    Studer, T.2
  • 21
    • 67650486144 scopus 로고    scopus 로고
    • Data privacy for ALC knowledge bases
    • S. Artemov and A. Nerode, editors, volume 5407 of LNCS. Springer
    • Phiniki Stouppa and Thomas Studer. Data privacy for ALC knowledge bases. In S. Artemov and A. Nerode, editors, Logical Foundations of Computer Science (LFCS 2009), volume 5407 of LNCS, pages 409-421. Springer, 2009.
    • (2009) Logical Foundations of Computer Science (LFCS 2009) , pp. 409-421
    • Stouppa, P.1    Studer, T.2
  • 22
    • 77951105251 scopus 로고    scopus 로고
    • Privacy preserving modules for ontologies
    • A. Pnueli, I. Virbitskaite, and A. Voronkov, editors, volume 5947 of LNCS. Springer
    • Thomas Studer. Privacy preserving modules for ontologies. In A. Pnueli, I. Virbitskaite, and A. Voronkov, editors, Perspectives of System Informatics (PSI'09), volume 5947 of LNCS, pages 380-387. Springer, 2010.
    • (2010) Perspectives of System Informatics (PSI'09) , pp. 380-387
    • Studer, T.1
  • 23
    • 84862063478 scopus 로고    scopus 로고
    • Justified terminological reasoning
    • E. Clarke, I. Virbitskaite, and A. Voronkov, editors, volume 7162 of LNCS. Springer
    • Thomas Studer. Justified terminological reasoning. In E. Clarke, I. Virbitskaite, and A. Voronkov, editors, Perspectives of System Informatics (PSI'11), volume 7162 of LNCS, pages 349-361. Springer, 2012.
    • (2012) Perspectives of System Informatics (PSI'11) , pp. 349-361
    • Studer, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.