2010
DOI: 10.1007/978-3-642-11829-6_16
|View full text |Cite
|
Sign up to set email alerts
|

Towards Controlled Query Evaluation for Incomplete First-Order Databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…In the literature of controlled query evaluation [Biskup 2011;Biskup and Weibert 2008;Biskup et al 2010Biskup and Tadros 2012], a secret is preserved if for any sequence of queries there are two different models that are indistinguishable in the sense that they produce the same answers to the queries; one being a model of the secret and the other a model of the negation of the secret. Our framework also respects this property of secrecy-preservation.…”
Section: Remark Regarding the Relationship Between Cqe And Our Msq Symentioning
confidence: 99%
“…In the literature of controlled query evaluation [Biskup 2011;Biskup and Weibert 2008;Biskup et al 2010Biskup and Tadros 2012], a secret is preserved if for any sequence of queries there are two different models that are indistinguishable in the sense that they produce the same answers to the queries; one being a model of the secret and the other a model of the negation of the secret. Our framework also respects this property of secrecy-preservation.…”
Section: Remark Regarding the Relationship Between Cqe And Our Msq Symentioning
confidence: 99%
“…u ∈ n ix i ∩ S(Vs) u = null ∨ ¬ϕ). 8 For distinction from the notion of relevant attribute/variable used in Sections II-A and II-B.…”
Section: Secrecy Instancesmentioning
confidence: 99%
“…If that is the case, the answer is distorted by either lying or refusal or combined lying and refusal. In [8], they extend CQE to restricted incomplete FO logic databases via a transformation into a propositional language. This approach seem to be incomparable to ours.…”
Section: Related Workmentioning
confidence: 99%
“…Preserving secrecy in a database setting is a problem of paramount importance and it has been studied for a long time, see Biskup and Weibert (2008); Biskup et al (2010);Sicherman et al (1983). With the advent of the semantic web and its increasingly pervasive usage, there is a lot of interest in studying this problem in knowledge base (KB) setting, see Bao et al (2007); Grau et al (2013); Tao et al (2010Tao et al ( , 2014.…”
Section: Secrecy-preserving Query Answering Problemmentioning
confidence: 99%
“…One approach to secrecy in incomplete database was presented in Biskup and Weibert (2008); Biskup et al (2010); Biskup and Tadros (2012) in the form of controlled query evaluation (CQE). The idea behind CQE is that rather than providing strict access control to data, the CQE approach enforces secrecy by checking (at run time) whether from a truthful answer to a query a user can deduce secret information.…”
Section: Secrecy-preserving Query Answering Problemmentioning
confidence: 99%