We propose a general framework for assessing the exposure of sensitive knowledge in policy-protected knowledge bases (KBs), where knowledge is represented as logical theories and data protection policies are defined declaratively using epistemic dependencies. The framework models scenarios in which confidential parts of the KB may be publicly known due to security breaches. We study two fundamental decision problems: determining whether the exposed knowledge violates the data protection policy (leakage), and whether there exists a secure view of the KB that complies with the policy. We analyze the computational complexity (specifically, data complexity) of these problems, focusing on the DL-Lite_R and EL_\bot Description Logics. Our findings show that, for DL-Lite_R with restricted forms of policy, both the problems can be efficiently solved through query rewriting methods. For EL_\bot, we establish conditions for tractable computational bounds. Our results highlight the potential of this framework for practical applications in confidentiality-preserving knowledge management.
Assessing the Exposure to Public Knowledge in Policy-Protected Description Logic Ontologies / Cima, Gianluca; Lembo, Domenico; Marconi, Lorenzo; Rosati, Riccardo; Savo, Domenico Fabio. - (2025), pp. 4436-4444. ( International Joint Conference on Artificial Intelligence Montreal; Canada ) [10.24963/ijcai.2025/494].
Assessing the Exposure to Public Knowledge in Policy-Protected Description Logic Ontologies
Gianluca Cima
;Domenico Lembo
;Lorenzo Marconi
;Riccardo Rosati
;Domenico Fabio Savo
2025
Abstract
We propose a general framework for assessing the exposure of sensitive knowledge in policy-protected knowledge bases (KBs), where knowledge is represented as logical theories and data protection policies are defined declaratively using epistemic dependencies. The framework models scenarios in which confidential parts of the KB may be publicly known due to security breaches. We study two fundamental decision problems: determining whether the exposed knowledge violates the data protection policy (leakage), and whether there exists a secure view of the KB that complies with the policy. We analyze the computational complexity (specifically, data complexity) of these problems, focusing on the DL-Lite_R and EL_\bot Description Logics. Our findings show that, for DL-Lite_R with restricted forms of policy, both the problems can be efficiently solved through query rewriting methods. For EL_\bot, we establish conditions for tractable computational bounds. Our results highlight the potential of this framework for practical applications in confidentiality-preserving knowledge management.| File | Dimensione | Formato | |
|---|---|---|---|
|
Cima_Assessing_postprint_2025.pdf
Open Access dal 17/08/2025
Note: https://doi.org/10.24963/ijcai.2025/494
Tipologia:
Documento in Post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
189.97 kB
Formato
Adobe PDF
|
189.97 kB | Adobe PDF | |
|
Cima_Assessing_2025.pdf
accesso aperto
Note: https://doi.org/10.24963/ijcai.2025/494
Tipologia:
Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
206.07 kB
Formato
Adobe PDF
|
206.07 kB | Adobe PDF |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


