2012
DOI: 10.1007/978-3-642-28472-4_4
|View full text |Cite
|
Sign up to set email alerts
|

Revising Belief without Revealing Secrets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…The last two AGM axioms are in fact not characteristic of the revision problem and one may argue that, by means of the two axioms, the AGM approach chooses as much an uncertainty framework that is not probabilistic by means of such two axioms as it provides core axioms for belief revision (the first six). Note that the converse belief revision problem discussed here is different from the converse problem of iterated belief revision addressed in [8] and the converse belief revision in multi-agent systems [5]. Here, the multiple revision scenarios do not correspond to a sequence of revision actions, where the iteration may cause successive changes of an agent's belief structure.…”
Section: Introductionmentioning
confidence: 94%
“…The last two AGM axioms are in fact not characteristic of the revision problem and one may argue that, by means of the two axioms, the AGM approach chooses as much an uncertainty framework that is not probabilistic by means of such two axioms as it provides core axioms for belief revision (the first six). Note that the converse belief revision problem discussed here is different from the converse problem of iterated belief revision addressed in [8] and the converse belief revision in multi-agent systems [5]. Here, the multiple revision scenarios do not correspond to a sequence of revision actions, where the iteration may cause successive changes of an agent's belief structure.…”
Section: Introductionmentioning
confidence: 94%
“…For semantic web applications, the authors of (Kagal et al, 2003) have proposed policy languages to represent obligation and delegation policies based on access control approach. Biskup et al in (Biskup and Weibert, 2008;Biskup and Tadros, 2012) studied secrecy in incomplete databases using controlled query evaluation (CQE). Since description logics (DLs) underlie web ontology languages (OWLs), recently researchers have shown an interest in studying secrecypreserving reasoning in DL knowledge bases (KBs).…”
Section: Introductionmentioning
confidence: 99%
“…One approach to secrecy in incomplete database was presented in Biskup and Weibert (2008); Biskup et al (2010); Biskup and Tadros (2012) in the form of controlled query evaluation (CQE). The idea behind CQE is that rather than providing strict access control to data, the CQE approach enforces secrecy by checking (at run time) whether from a truthful answer to a query a user can deduce secret information.…”
Section: Secrecy-preserving Query Answering Problemmentioning
confidence: 99%
“…For semantic web applications, the authors of Kagal et al (2003) have proposed policy languages to represent obligation and delegation policies based on access control approach. Biskup et al in Biskup and Weibert (2008); Biskup and Tadros (2012) studied secrecy in incomplete databases using controlled query evaluation (CQE). Since description logics (DLs) underlie web ontology languages (OWLs), recently researchers have shown an interest in studying secrecy-preserving reasoning in DL knowledge bases (KBs).…”
Section: Introductionmentioning
confidence: 99%