1,702 Hits in 4.2 sec

Reasoning in Description Logic Ontologies for Privacy Management

Adrian Nuradiansyah
2020 Künstliche Intelligenz  
However, privacy compliance itself is not enough if a possible attacker can also obtain relevant information from other sources, which together with the modified ontologies might violate the privacy policy  ...  If it is the case that this information can be deduced from the ontologies, which implies certain privacy policies are not fulfilled, then one needs to consider methods to repair these ontologies in a  ...  The author is deeply grateful to Franz Baader for his supports and insightful comments. This work was funded by German Research Foundation (DFG) within the Research Training Group 1907 "RoSI".  ... 
doi:10.1007/s13218-020-00681-8 fatcat:xhbbv2czubbuvoaqei4wrlbr6u

Controlled Query Evaluation over OWL 2 RL Ontologies [chapter]

Bernardo Cuenca Grau, Evgeny Kharlamov, Egor V. Kostylev, Dmitriy Zheleznyakov
2013 Lecture Notes in Computer Science  
For the identified fragment, we design a CQE algorithm that has the same computational complexity as standard query answering and can be implemented by relying on state-of-the-art triple stores.  ...  We propose a fragment of OWL 2 RL for which all three requirements can be satisfied.  ...  Data privacy was studied for EL ontologies by Tao et al. [21] .  ... 
doi:10.1007/978-3-642-41335-3_4 fatcat:7a6fn4yhkffw3oxrwrnl2aoyqa

Applying the FAIR principles to data in a hospital: challenges and opportunities in a pandemic [article]

Núria Queralt-Rosinach, Rajaram Kaliyaperumal, César Henrique Bernabé, Qinqin Long, Simone A. Joosten, Henk Jan van der Wijk, Erik Flikkenschild, Kees Burger, Annika Jacobsen, Barend Mons, Marco Roos
2021 medRxiv   pre-print
With this objective, we conducted a coordinated FAIRification among stakeholders based on ontological models for data and metadata, and a FAIR based architecture that complements the existing data management  ...  Our work demonstrates that a FAIR research data management plan based on ontological models for data and metadata, open Science, Semantic Web technologies, and FAIR Data Points is providing data infrastructure  ...  For instance, the URI "" renders to the label "description" and the URI " 00001" renders to the label "EL 00001".  ... 
doi:10.1101/2021.08.13.21262023 fatcat:v7ft36xt25cn7nwjutthvz4p74

State-of-the-Art Instance Matching Methods for Knowledge Graphs

Alex Boyko, Siamak Farshidi, Zhiming Zhao
2021 Zenodo  
Instance matching has attracted a wide range of research attentions.  ...  It is difficult to compare the performance of different instance matching methods, even when the same benchmarking dataset is used.  ...  RQ3: How can data privacy be preserved during instance matching?  ... 
doi:10.5281/zenodo.6547684 fatcat:6awr6ln7yfbb5mpnqx5ehmbase

Towards Privacy-Preserving Ontology Publishing

Franz Baader, Adrian Nuradiansyah
2018 International Workshop on Description Logics  
We make a first step towards adapting the approach of Cuenca Grau and Kostylev for privacy-preserving publishing of linked data to Description Logic ontologies.  ...  We consider the case where both the knowledge about individuals and the privacy policies are expressed using EL concepts.  ...  More information on privacy-preserving data publishing can be found in the survey [7] .  ... 
dblp:conf/dlog/BaaderN18 fatcat:v3x2j2isbrd2pn7bdunywhfpiq

An Enhanced Privacy protection scheme for Profile-based personalized search

2020 International Journal of Advanced Trends in Computer Science and Engineering  
One of the major issues these systems face is the lack of user's trust due to the lack of privacy protection.  ...  Furthermore, we present a new model to protect the user's privacy on different levels, using homomorphic encryption to enhance data protection.  ...  For instance, the AOL query logs scandal [24] when the AOL Research released a file on its website containing twenty million search keywords for over 650,000 users, intended for research purposes [39  ... 
doi:10.30534/ijatcse/2020/241932020 fatcat:avo57gqdknhfjk4enqrecjspni

More Semantics in QoS Matching

Ester Giallonardo, Eugenio Zimeo
2007 IEEE International Conference on Service-Oriented Computing and Applications (SOCA '07)  
The paper presents the onQoS ontology, an openly available OWL ontology for QoS, and evaluates it in a QoS-aware matching environment.  ...  This gives the possibility of matching a QoS template with published Web Services by deriving different QoS parameters when a one-to-one matching fails.  ...  Acknowledgements The work presented in this paper is partially supported by LOCOSP and ArtDeco projects funded We also thank Giuseppe Damiano and Angelo Furno for their important support during the implementation  ... 
doi:10.1109/soca.2007.30 dblp:conf/soca/GiallonardoZ07 fatcat:3sk5ow26o5cpbph34frhho7dlu

Semantic-based policy management for cloud computing environments

Hassan Takabi, James B.D. Joshi
2012 International Journal of Cloud Computing  
data is stored.  ...  Currently, users must use diverse access control solutions available for each cloud service provider to secure their data.  ...  The authors would like to thank anonymous reviewers for their helpful comments.  ... 
doi:10.1504/ijcc.2012.046717 fatcat:jvnrlakt3rhzzp2iho5xi6frye

An End-user Tailorable Generic Framework for Privacy-preserving Location-based Mobile Applications

Dhiah el Diehn I. Abou-Tair, Mohamed Bourimi, Ricardo Tesoriero, Marcel Heupel, Dogan Kesdogan, Bernd Uebersch�r
2013 Applied Mathematics & Information Sciences  
We present a generic privacy-preserving framework for supporting such end-user tailorability on both user interface and server-side ends.  ...  In this paper, we discuss the emerging need for supporting end-user tailorability and privacy with respect to collaborative location-based applications in mobile environments.  ...  By default the persistence of model instances are stored in XML using the XMI (XML Metadata Interchange) format 22 .  ... 
doi:10.12785/amis/070604 fatcat:v5vmpgmg7jd2re2jpfzovpkv5i

The Systematic Literature Review of Privacy-Preserving Solutions in Smart Healthcare Environment

Driss El Majdoubi, Hanan El Bakkali, Souad Sadki, Zaina Maqour, Asmae Leghmid, Thippa Reddy G
2022 Security and Communication Networks  
Finally, we summarize our results showing privacy-preserving trends and identifying recommendations to involve privacy principles coverage in smart healthcare applications.  ...  In fact, collecting, transmitting, storing, and using data in IoMT applications raises issues regarding privacy and data protection, especially with the multitude of stakeholders involved during the whole  ...  For the same purpose, another recent work carried out by El Zouka et al.  ... 
doi:10.1155/2022/5642026 fatcat:ge6jgibhxvgd7gc7i3tsuzhnh4

D1.7 - Policy, transparency and compliance guidelines V2

Piero Bonatti, Sabrina Kirrane, Rigo Wenning, Philip Raschke
2018 Zenodo  
For instance, extensions based on Circumscription or the typicality operator make entailment reasoning EXPTIME hard also in the case of OWL2 EL [42, 73] .  ...  Privacy-preserving Data Mining In this section we review the main privacy-preserving data mining methods introduced in the literature.  ... 
doi:10.5281/zenodo.2549549 fatcat:5xwvoijxubb7xg4xerjdtekjq4

DITrust Chain: Towards Blockchain-based Trust Models for Sustainable Healthcare IoT Systems

Eman M Abou-Nassar, Abdullah M. Iliyasu, Passent M El-Kafrawy, Oh-Young Song, Ali Kashif Bashir, Ahmed A. Abd El-Latif
2020 IEEE Access  
Sustainable integration of healthcare nodes (i.e. devices, users, providers, etc.) resulting in healthcare IoT (or simply IoHT) provides a platform for efficient service delivery for the benefit of care  ...  Next generation communication technologies, such as Blockchains (BC), Internet of Things (IoT), cloud computing, etc. offer limitless capabilities for different applications and scenarios including industries  ...  In [45] , an online machine learning based Blockchain (ModelChain) was constructed for privacy preservation.  ... 
doi:10.1109/access.2020.2999468 fatcat:yavbtc2lpvh2dbtkdxp2lmhav4

Machine Learning-Based Semantic Entity Alignment for Multi-Source Data: a Systematic Literature Review

Alex Boyko, Siamak Farshidi, Zhiming Zhao
2021 Zenodo  
We also investigate recent studies that touch upon user experience, privacy preservation, decentralized environment and other properties related to entity alignment.  ...  It has become more common to store data about real-world entities, where this data is often distributed across multiple data sources.  ...  [55] also addresses privacy preservation in its implementation.  ... 
doi:10.5281/zenodo.6328248 fatcat:kl4julgduffzzhyxztsfxzsw3a

Ontological Representation of Healthcare Application Security Using Blockchain Technology

Raimundas Matulevičius, Mubashar Iqbal, Emna Ammar Elhadjamor, Sonia Ayachi Ghannouchi, Mariia Bakhtina, Slaheddine Ghannouchi
2022 Informatica  
We evaluate the ontology by performing the SRM of a back-pain patient's healthcare application case.  ...  Blockchain is gaining traction for improving the security of healthcare applications, however, it does not become a silver bullet as various security threats are observed in blockchain-based applications  ...  Therefore, more research is required in the area of privacy-preserving blockchains for healthcare applications.  ... 
doi:10.15388/22-infor486 fatcat:sn4vbasabfgzfj25ybuqnqkx4a

A Fog Computing-based Framework for Privacy Preserving IoT Environments

Dhiah el Diehn Abou-Tair, Simon Büchsenstein, Ala' Khalifeh
2020 ˜The œinternational Arab journal of information technology  
In this paper, a security and privacy preserving framework is proposed, which utilizes Fog and cloud computing in conjunction with IoT devices that aims at securing the users' data and protecting their  ...  Up to date, conventional security and privacy mechanisms are not well optimized for IoT devices due to their limited energy, storage capacity, communication functionality and computing power, which influenced  ...  [20] proposed a privacy preserving content based publish/subscribe scheme utilizing differential privacy in Fog computing. Sha et al.  ... 
doi:10.34028/iajit/17/3/4 fatcat:3bdvyma6kbc3hdd5nybqa66h5q
« Previous Showing results 1 — 15 out of 1,702 results