Book section
Controlled query evaluation over OWL 2 RL ontologies
- Abstract:
-
We study confidentiality enforcement in ontology-based information systems where ontologies are expressed in OWL 2 RL, a profile of OWL 2 that is becoming increasingly popular in Semantic Web applications. We formalise a natural adaptation of the Controlled Query Evaluation (CQE) framework to ontologies. Our goal is to provide CQE algorithms that (i) ensure confidentiality of sensitive information; (ii) are efficiently implementable by means of RDF triple store technologies; and (iii) ensure maximality of the answers returned by the system to user queries (thus restricting access to information as little as possible). We formally show that these requirements are in conflict and cannot be satisfied without imposing restrictions on ontologies. We propose a fragment of OWL 2 RL for which all three requirements can be satisfied. For the identified fragment, we design a CQE algorithm that has the same computational complexity as standard query answering and can be implemented by relying on state-of-the-art triple stores.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 424.0KB, Terms of use)
-
- Publisher copy:
- https://dx.doi.org/10.1007/978-3-642-41335-3_4
Authors
- Funding agency for:
- Kharlamov, E
- Zheleznyakov, D
- Grant:
- FP7-IP-318338
- FP7-IP-318338
- Funding agency for:
- Cuenca Grau, B
- Grant:
- grant EP/J017728/1
- Publisher:
- Springer Berlin Heidelberg
- Host title:
- The Semantic Web – ISWC 2013 : 12th International Semantic Web Conference, Sydney, NSW, Australia, October 21-25, 2013, Proceedings, Part I
- Volume:
- 8218
- Pages:
- 49-65
- Publication date:
- 2013-01-01
- Edition:
- Accepted Manuscript
- DOI:
- ISSN:
-
0302-9743
- ISBN:
- 9783642413346
- Language:
-
English
- Keywords:
- Subjects:
- UUID:
-
uuid:e90c7336-e719-4940-8a8e-8eb47afeb4f7
- Local pid:
-
ora:9540
- Deposit date:
-
2014-12-05
Terms of use
- Copyright holder:
- Springer-Verlag Berlin Heidelberg
- Copyright date:
- 2013
- Notes:
- Part of series Lecture Notes in Computer Science (VOL 8218). © Springer-Verlag Berlin Heidelberg 2013. The final publication is available at http://link.springer.com/chapter/10.1007%2F978-3-642-41335-3_4
If you are the owner of this record, you can report an update to it here: Report update to this record