2010
DOI: 10.1007/978-3-642-11486-1_32
View full text |Buy / Rent full text
|
Sign up to set email alerts
|

Abstract: Abstract. Data privacy is an important application of ontology modularization. The aim is to publish one module while keeping the information of another module private. We show how locality and partitioningtwo basic concepts in the theory of modular ontologies -naturally lead to privacy preserving query answering over modular ontologies.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 8 publications
(6 reference statements)
0
2
0
Order By: Relevance
“…1 ----9 ACM 11 [253] ----1 1 10 ACM 13 [181] 1 --1 -11 ACM 14 [144] 1 1 1 1 -4 12 ACM 16 [28] 1 1 1 1 -13 ACM 17 [53] 1 ----1 14 ACM 18 [262] 1 ----15 ACM 19 [168] 1 ----1 16 ACM 22 [226] 1 1 -1 -17 ACM 23 [176] 1 --1 1 3 18 ACM 24 [227] -----19 ACM 26 [157] 1 ----1 20 ACM 28 [206] -----21 ACM 30 [258] 1 1 -1 -3 22 ACM 32 [5] 1 1 ---23 ACM 34 [80] ------24 ACM 35 [211] 1 1 1 1 -25 ACM 36 [22] --1 --1 26 ACM 37 [54] -----27 ACM 40 [248] 1 1 1 -1 4 28 IEEE 03 [142] 1 1 ---29 IEEE 09 [193] 1 --1 -2 30 IEEE 11 [151] 1 ----31 IEEE 12 [221] 1 1 1 1 1 5 32 IEEE 13 [56] -1 ---33 IEEE 14 [259] 1 ---1 2 34 IEEE 15 [235] 1 1 1 -1 35 IEEE 18 [223] 1 1 -1 -3 36 IEEE 19 [86] 1 1 ---37 IEEE 21 [249] 1 -1 1 -3 38 IEEE 25 [44] 1 --1 1 39 IEEE 26 [4] -----0 40 IEEE 28 [52] 1 ----41 IEEE 30 [160] 1 --1 -2 42 IEEE 33 [95] -----43 IEEE 35 [39] 1 1 -1 -3 44 IEEE 36 [209] 1 ----45 IEEE 38 [147] 1 --1 -2 46 IEEE 41 [96] 1 ----47 IEEE 42 [82] 1 --1 1 3 48 IEEE 48 [50] 1 --1 -49 IEEE 49 [21] 1 ---1 2 50 IEEE 50 [100] 1 1 1 1 1 51 IEEE 51 [110] 1 1 1 --3 52 IEEE 52 [105] 1 ----53 IEEE 54 [25] 1 --1 1 3 54 IEEE 56…”
Section: Signal Processing (Dsp) 2013 18th Internationalmentioning
confidence: 99%
“…1 ----9 ACM 11 [253] ----1 1 10 ACM 13 [181] 1 --1 -11 ACM 14 [144] 1 1 1 1 -4 12 ACM 16 [28] 1 1 1 1 -13 ACM 17 [53] 1 ----1 14 ACM 18 [262] 1 ----15 ACM 19 [168] 1 ----1 16 ACM 22 [226] 1 1 -1 -17 ACM 23 [176] 1 --1 1 3 18 ACM 24 [227] -----19 ACM 26 [157] 1 ----1 20 ACM 28 [206] -----21 ACM 30 [258] 1 1 -1 -3 22 ACM 32 [5] 1 1 ---23 ACM 34 [80] ------24 ACM 35 [211] 1 1 1 1 -25 ACM 36 [22] --1 --1 26 ACM 37 [54] -----27 ACM 40 [248] 1 1 1 -1 4 28 IEEE 03 [142] 1 1 ---29 IEEE 09 [193] 1 --1 -2 30 IEEE 11 [151] 1 ----31 IEEE 12 [221] 1 1 1 1 1 5 32 IEEE 13 [56] -1 ---33 IEEE 14 [259] 1 ---1 2 34 IEEE 15 [235] 1 1 1 -1 35 IEEE 18 [223] 1 1 -1 -3 36 IEEE 19 [86] 1 1 ---37 IEEE 21 [249] 1 -1 1 -3 38 IEEE 25 [44] 1 --1 1 39 IEEE 26 [4] -----0 40 IEEE 28 [52] 1 ----41 IEEE 30 [160] 1 --1 -2 42 IEEE 33 [95] -----43 IEEE 35 [39] 1 1 -1 -3 44 IEEE 36 [209] 1 ----45 IEEE 38 [147] 1 --1 -2 46 IEEE 41 [96] 1 ----47 IEEE 42 [82] 1 --1 1 3 48 IEEE 48 [50] 1 --1 -49 IEEE 49 [21] 1 ---1 2 50 IEEE 50 [100] 1 1 1 1 1 51 IEEE 51 [110] 1 1 1 --3 52 IEEE 52 [105] 1 ----53 IEEE 54 [25] 1 --1 1 3 54 IEEE 56…”
Section: Signal Processing (Dsp) 2013 18th Internationalmentioning
confidence: 99%
“…They look at privacy preserving query answering as reasoning problem and establish a connection between such reasoning problems and probabilistic privacy guarantees such as perfect privacy. Safe reasoning strategies for very expressive description logics and for hierarchical ontologies are studied in [9,24]. The approach used there is based on the principles of locality and conservative extensions for description logics.…”
Section: Related Workmentioning
confidence: 99%