Privacy, copyright, security and other concerns make it essential for many distributed web applications to support selective sharing of information while, at the same time, protecting sensitive knowledge. Secrecy-preserving reasoning refers to the answering of queries against a knowledge base involving inference that uses sensitive knowledge without revealing it. We present a general framework for secrecy-preserving reasoning over arbitrary entailment systems. This framework enables reasoning with hierarchical ontologies, propo-sitional logic knowledge bases (over arbitrary logics) and RDFS knowledge bases containing sensitive in-formation that needs to be protected. We provide an algorithm that, given a knowledge base over an ef-fectively ...
Authentication and secrecy properties are proved by very different methods: the former by local reas...
Authentication and secrecy properties are proved by very different methods: the former by local reas...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
Inmany applications of networked information systems, the need to share information often has to be ...
Applications of ontologies/knowledge bases (KBs) in many domains (healthcare, national security, int...
In many applications knowledge bases (KBs) contain confidential or private information (secrets). Th...
A distributed proof system is an effective way for deriving useful information by combining data fro...
A distributed proof system is an effective way for deriv-ing useful information by combining data fr...
In recent work the notion of a secrecy logic S over a given deductive system S was introduced. Secre...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Authentication and secrecy properties are proved by very different methods: the former by local reas...
We consider the problem of answering queries against a knowledge base (KB) using secrets, whenever i...
In previous work, we have investigated privacy-preserving publishing of Description Logic (DL) ontol...
Authentication and secrecy properties are proved by very different methods: the former by local reas...
Authentication and secrecy properties are proved by very different methods: the former by local reas...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
Inmany applications of networked information systems, the need to share information often has to be ...
Applications of ontologies/knowledge bases (KBs) in many domains (healthcare, national security, int...
In many applications knowledge bases (KBs) contain confidential or private information (secrets). Th...
A distributed proof system is an effective way for deriving useful information by combining data fro...
A distributed proof system is an effective way for deriv-ing useful information by combining data fr...
In recent work the notion of a secrecy logic S over a given deductive system S was introduced. Secre...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...
Authentication and secrecy properties are proved by very different methods: the former by local reas...
We consider the problem of answering queries against a knowledge base (KB) using secrets, whenever i...
In previous work, we have investigated privacy-preserving publishing of Description Logic (DL) ontol...
Authentication and secrecy properties are proved by very different methods: the former by local reas...
Authentication and secrecy properties are proved by very different methods: the former by local reas...
Distributed proof construction protocols have been shown to be valuable for reasoning about authoriz...