Ontology-based data integration systems allow users to effectively access data sitting in multiple sources by means of queries over a global schema described by an ontology. In practice, data sources often contain sensitive information that the data owners want to keep inaccessible to users. Our aim in this paper is to lay the logical foundations of information disclosure in ontology-based data integration. Our focus is on the semantic requirements that a data integration system should satisfy before it is made available to users for querying, as well as on the computational complexity of checking whether such requirements are fulfilled. In particular, we formalise and study the problem of determining whether a given data integration system...
Companies and organizations collect and use vast troves of sensitive user data whose release must be...
Ontology-based data access is concerned with querying incom-plete data sources in the presence of do...
Increasingly, there is a recognized need for secure information sharing. In order to implement infor...
Ontology-based data integration systems allow users to effectively access data sitting in multiple s...
Data integration systems allow users to access data sitting in multiple sources by means of queries ...
We perform a theoretical study of the following queryview security problem: given a view V to be pub...
In this paper, we encompass and extend previous ontology-based data integration system. A semantic p...
AbstractWe perform a theoretical study of the following query-view security problem: given a view V ...
We explore how an ontology may be used with a database to support reasoning about the “information c...
In this paper we study the problem of information disclosure in ontology-based data access (OBDA). F...
We extend ontology-based data access with integrity constraints over both the source and target sche...
Recent trends in ubiquitous computing target to provide user-controlled servers, providing a single ...
In previous work, we have investigated privacy-preserving publishing of Description Logic (DL) ontol...
Many organizations nowadays face the problem of accessing existing data sources by means of flexible...
Data Mining analyses the stocked data and helps in foretelling the future trends. There are differen...
Companies and organizations collect and use vast troves of sensitive user data whose release must be...
Ontology-based data access is concerned with querying incom-plete data sources in the presence of do...
Increasingly, there is a recognized need for secure information sharing. In order to implement infor...
Ontology-based data integration systems allow users to effectively access data sitting in multiple s...
Data integration systems allow users to access data sitting in multiple sources by means of queries ...
We perform a theoretical study of the following queryview security problem: given a view V to be pub...
In this paper, we encompass and extend previous ontology-based data integration system. A semantic p...
AbstractWe perform a theoretical study of the following query-view security problem: given a view V ...
We explore how an ontology may be used with a database to support reasoning about the “information c...
In this paper we study the problem of information disclosure in ontology-based data access (OBDA). F...
We extend ontology-based data access with integrity constraints over both the source and target sche...
Recent trends in ubiquitous computing target to provide user-controlled servers, providing a single ...
In previous work, we have investigated privacy-preserving publishing of Description Logic (DL) ontol...
Many organizations nowadays face the problem of accessing existing data sources by means of flexible...
Data Mining analyses the stocked data and helps in foretelling the future trends. There are differen...
Companies and organizations collect and use vast troves of sensitive user data whose release must be...
Ontology-based data access is concerned with querying incom-plete data sources in the presence of do...
Increasingly, there is a recognized need for secure information sharing. In order to implement infor...