2010
DOI: 10.1007/978-3-642-13486-9_12
|View full text |Cite
|
Sign up to set email alerts
|

A Generic Approach for Correcting Access Restrictions to a Consequence

Abstract: Abstract. Recent research has shown that annotations are useful for representing access restrictions to the axioms of an ontology and their implicit consequences. Previous work focused on assigning a label, representing its access level, to each consequence from a given ontology. However, a security administrator might not be satisfied with the access level obtained through these methods. In this case, one is interested in finding which axioms would need to get their access restrictions modified in order to ge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
5
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 9 publications
2
5
0
Order By: Relevance
“…This paper extends and improves the results previously published in [14,15]. More precisely, the algorithms for computing the boundaries of consequences were presented in [14], while the problem of repairing the boundaries was addressed in [15].…”
Section: Introductionsupporting
confidence: 69%
See 1 more Smart Citation
“…This paper extends and improves the results previously published in [14,15]. More precisely, the algorithms for computing the boundaries of consequences were presented in [14], while the problem of repairing the boundaries was addressed in [15].…”
Section: Introductionsupporting
confidence: 69%
“…This paper extends and improves the results previously published in [14,15]. More precisely, the algorithms for computing the boundaries of consequences were presented in [14], while the problem of repairing the boundaries was addressed in [15]. Here, we (i) provide full proofs for all the theoretical results presented, (ii) present better optimizations to our algorithms, and (iii) provide a thorough comparison of the different algorithmic approaches through our experimental results.…”
Section: Introductionsupporting
confidence: 64%
“…Another application is in the context of access control, where one wants to provide only partial views to an ontology to different users [4]. Here, axiom pinpointing is not only useful to find out the access levels (that is, the contexts) where a consequence is derivable, but also to suggest changes in the access level of axioms in order to hide or open implicit consequences to some users [28].…”
Section: Applications and Variationsmentioning
confidence: 99%
“…Moreover, the modularization step is not included in the evaluation. [22] extends the approach towards explanations and debugging of access rights. In contrast, our approach is built on modularization at its core without a need for preprocessing and generates explanations while computing provenance.…”
Section: Related Workmentioning
confidence: 99%