Preserving Confidentiality in Ontologies: Can we Develop Secure Ontologies?
نویسندگان
چکیده
Many semantic web applications require selective sharing of ontologies due to copyright, confidentiality, business, security concerns and others. Our motivation is to protect the possibility to infer sensitive information and improperly extract it from the connected knowledge bases represented in ontologies. Supporting the design knowledge bases in order to overcome possible types of attacks. We give a brief description of a software tool we are currently building. We propose heuristics based on properties of ontologies and their planned use to identify and apply confidentiality preservation techniques that minimize the risk of breaches. Finally, we discuss several open problems.
منابع مشابه
Inference-proof Data Filtering for a Probabilistic Setting
In querying semantic data, access control must take into account the information that is implicitly entailed by the accessible part of triple stores and ontologies. While there exist inference control frameworks for this purpose, they still have a limitation: the confidentiality criterion does not take into account the probabilistic knowledge of the attacker. Therefore, the existing controlled ...
متن کاملبررسی هستان شناسی های توسعه یافته مبتنی بر اصول هستان شناسی های منبع باز زیست پزشکی
Background and Aim: Ontologies facilitate data integration, exchange, searching and querying. Open Biomedical Ontologies (OBO) Foundry is a solution for creating reference ontologies. In this foundry, the design of ontologies is based on established principles which allow for their interactions as a single system. The purpose of this study is to determine the main features of ontologies develop...
متن کاملPrivacy-Preserving Schema Matching Using Mutual Information
The problem of schema or ontology matching is to define mappings among schema or ontology elements. Such mappings are typically defined between two schemas or two ontologies at a time. Ideally, using the defined mappings, one would be able to issue a single query that will be rewritten automatically to all the databases, instead of manually writing a query to each database. In a centrally media...
متن کاملControlled Query Evaluation over OWL 2 RL Ontologies
We study confidentiality enforcement in ontology-based information systems where ontologies are expressed in OWL 2 RL, a profile of OWL 2 that is becoming increasingly popular in Semantic Web applications. We formalise a natural adaptation of the Controlled Query Evaluation (CQE) framework to ontologies. Our goal is to provide CQE algorithms that (i) ensure confidentiality of sensitive informat...
متن کاملAutomatic Workflow Generation and Modification by Enterprise Ontologies and Documents
This article presents a novel method and development paradigm that proposes a general template for an enterprise information structure and allows for the automatic generation and modification of enterprise workflows. This dynamically integrated workflow development approach utilises a conceptual ontology of domain processes and tasks, enterprise charts, and enterprise entities. It also suggests...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017