We propose a general framework for assessing the exposure of sensitive knowledge in policy-protected knowledge bases (KBs), where knowledge is represented as logical theories and data protection policies are defined declaratively using epistemic dependencies. The framework models scenarios in which confidential parts of the KB may be publicly known due to security breaches. We study two fundamental decision problems: determining whether the exposed knowledge violates the data protection policy (leakage), and whether there exists a secure view of the KB that complies with the policy. We analyze the computational complexity (specifically, data complexity) of these problems, focusing on the DL-LiteR and EL⊥ Description Logics. Our findings show that, for DL-LiteR with restricted forms of policy, both the problems can be efficiently solved through query rewriting methods. For EL⊥, we establish conditions for tractable computational bounds. Our results highlight the potential of this framework for practical applications in confidentiality-preserving knowledge management.

(2025). Assessing the Exposure to Public Knowledge in Policy-Protected Description Logic Ontologies . In IJCAI. Retrieved from https://hdl.handle.net/10446/317745

Assessing the Exposure to Public Knowledge in Policy-Protected Description Logic Ontologies

Savo, Domenico F.
2025-01-01

Abstract

We propose a general framework for assessing the exposure of sensitive knowledge in policy-protected knowledge bases (KBs), where knowledge is represented as logical theories and data protection policies are defined declaratively using epistemic dependencies. The framework models scenarios in which confidential parts of the KB may be publicly known due to security breaches. We study two fundamental decision problems: determining whether the exposed knowledge violates the data protection policy (leakage), and whether there exists a secure view of the KB that complies with the policy. We analyze the computational complexity (specifically, data complexity) of these problems, focusing on the DL-LiteR and EL⊥ Description Logics. Our findings show that, for DL-LiteR with restricted forms of policy, both the problems can be efficiently solved through query rewriting methods. For EL⊥, we establish conditions for tractable computational bounds. Our results highlight the potential of this framework for practical applications in confidentiality-preserving knowledge management.
2025
Cima, Gianluca; Lembo, Domenico; Marconi, Lorenzo; Rosati, Riccardo; Savo, Domenico Fabio
File allegato/i alla scheda:
File Dimensione del file Formato  
0494.pdf

accesso aperto

Versione: publisher's version - versione editoriale
Licenza: Licenza Free to read
Dimensione del file 206.07 kB
Formato Adobe PDF
206.07 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

Aisberg ©2008 Servizi bibliotecari, Università degli studi di Bergamo | Terms of use/Condizioni di utilizzo

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10446/317745
Citazioni
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact