Skip to Main Content
Secure Data Provenance and Inference Control with Semantic Web
book

Secure Data Provenance and Inference Control with Semantic Web

by Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
August 2014
Intermediate to advanced content levelIntermediate to advanced
478 pages
13h 49m
English
Auerbach Publications
Content preview from Secure Data Provenance and Inference Control with Semantic Web
266Secure Data Provenance and Inference Control
1. KB = Ans(Q
J
) Prov(Ans(Q
J
))
If answers are available from fulfilling the request of Q
J
from the set
DP
VV
, it is added to an empty knowledge base and we continue to the next
step. Otherwise, there are no answers for Q
J
. is case is most likely when
it is not possible to release answers after satisfying the constraints from the
privacy policies.
2. KB = KB′ ∪ H
Q
e query history is derived from all the queries answered so far (e.g.,
(Q
1
Q
j−1
) H
Q
. KB is updated from the history.
3. R(KB) KB + Inf(KB)
R is a decidable RDFS/OWL reasoner.
e reasoner performs inferencing over the knowledge base to determine
newly inferred triples that are different from those already in the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Protecting Data Privacy Beyond the Trusted System of Record

Protecting Data Privacy Beyond the Trusted System of Record

Bill White, Mark Moore, Phillip Wilson, Eva Yan
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran

Publisher Resources

ISBN: 9781466569430