Inmany applications of networked information systems, the need to share information often has to be balanced against the need to protect secret information from unintended disclosure, e.g., due to copyright, privacy, security, or commercial considerations. We study the problem of secrecy-preserving reasoning, that is, answering queries using secret information, whenever it is possible to do so, without compromising secret information. In the case of a knowledge base that is queried by a single querying agent, we introduce the notion of a secrecy envelope. This is a superset of the secret part of the knowledge base that needs to be concealed from the querying agent in order to ensure that the secret information is not compromised. We establi...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
Kevin O'Neill's Ph.D. DissertationWhen building systems that guarantee confidentiality, system desig...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
In many applications knowledge bases (KBs) contain confidential or private information (secrets). Th...
We consider the problem of answering queries against a knowledge base (KB) using secrets, whenever i...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
Applications of ontologies/knowledge bases (KBs) in many domains (healthcare, national security, int...
In recent work the notion of a secrecy logic S over a given deductive system S was introduced. Secre...
AbstractWe perform a theoretical study of the following query-view security problem: given a view V ...
The article of record as published may be found at http://dx.doi.org/10.1145/340855.34102
We propose a general framework of secrecy and preservation of secrecy for labeled transition systems...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
In this paper, we revisit formalizations of information-theoretic security for symmetric-key encrypt...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
Kevin O'Neill's Ph.D. DissertationWhen building systems that guarantee confidentiality, system desig...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
In many applications knowledge bases (KBs) contain confidential or private information (secrets). Th...
We consider the problem of answering queries against a knowledge base (KB) using secrets, whenever i...
Privacy, copyright, security and other concerns make it essential for many distributed web applicati...
Applications of ontologies/knowledge bases (KBs) in many domains (healthcare, national security, int...
In recent work the notion of a secrecy logic S over a given deductive system S was introduced. Secre...
AbstractWe perform a theoretical study of the following query-view security problem: given a view V ...
The article of record as published may be found at http://dx.doi.org/10.1145/340855.34102
We propose a general framework of secrecy and preservation of secrecy for labeled transition systems...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Abstract. Secrecy and authenticity properties of protocols are mutu-ally dependent: every authentica...
In this paper, we revisit formalizations of information-theoretic security for symmetric-key encrypt...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
Kevin O'Neill's Ph.D. DissertationWhen building systems that guarantee confidentiality, system desig...