data privacy; description logic; ontologies; controlled query evaluation; workflow control-flow patterns; logic; knowledge representation
Studer Thomas (2013), A universal approach to guarantee data privacy, in Logica Universalis
, 7(2), 195-209.
Studer Thomas (2012), Justified Terminological Reasoning, in Perspectives of System Informatics PSI'11, Springer, LNCS 7162
, Springer, Berlin Heidelberg.
Studer Thomas (2011), An application of justification logic to protocol verification, in 7th Int. Conf. on Computational Intelligence and Security, IEEE, 2011
, IEEE, Los Alamitos, CA, USA.
Studer Thomas (2011), Justification Logic, Inference Tracking, and Data Privacy, in Logic and Logical Philosophy
, 20(4), 297-306.
The problem of data privacy is to verify that confidential information stored in an information system is not provided to unauthorized users and, therefore, personal and other sensitive data remain private. The main challenge in such a context is to share some data while protecting other personally identifiable information. The general aim of our project is to develop formal methods and the corresponding algorithms to enable automated reasoning about data privacy.Our concrete plan consists of (i) developing controlled query evaluation mechanisms for ontological knowledge base systems, and (ii) extending classical workflow patterns with privacy guarantees.