6 CONCLUSIONS
In this paper we have studied the problem of secrecy-
preserving query answering over acyclic DL-Lite
R
KBs. We have extended the conceptual logic-based
framework for secrecy-preserving reasoning which
was introduced by Tao et al., see (Tao et al., 2015),
so as to allow BCQs. As the OWA underlies the foun-
dational aspects of KBs, to show that the reasoner is
sound and complete we used the semantics based on
Kleene’s 3-valued logic, see (Avron, 1991; Tao et al.,
2015). We provide syntactic characterizations for en-
tailment and disentailment of BCQs in terms of prop-
erties of mappings (Section 4).
ACKNOWLEDGMENTS
This research work was done by the first author while
he was a graduate student of Department of Computer
Science, Iowa State University. This work was sup-
ported by the NSF grant CNS1116050. Any opin-
ion, finding, and conclusions contained in this article
are those of authors and do not necessarily reflect the
views of the National Science Foundation.
REFERENCES
Artale, A., Calvanese, D., Kontchakov, R., and Za-
kharyaschev, M. (2009). The dl-lite family and re-
lations. J. of Artificial Intelligence Research, 36:1–69.
Avron, A. (1991). Natural 3-valued logics–characterization
and proof theory. The Journal of Symbolic Logic,
56(01):276–294.
Bao, J., Slutzki, G., and Honavar, V. (2007). Privacy-
preserving reasoning on the semantic web. In
IEEE/ACM/WIC International Conference on Web In-
telligence, pages 791–797. IEEE CS Press.
Bell, D. and LaPadula, L. (1973). Secure computer sys-
tems: Mathematical foundations. Technical report,
DTIC Document.
Biskup, J. and Tadros, C. (2012). Revising belief witwith
revealing secrets. In Lukasiewiez, T, and Sali, A. (eds)
FoLKS 2012, volume 7153 of LNCS, pages 51–70.
Springer.
Biskup, J., Tadros, C., and Wiese, L. (2010). Towards
controlled query evaluation for incomplete first-order
databases. In Link, S. (ed) FoLKS 2010, volume 5956
of LNCS, pages 230–247. Springer.
Biskup, J. and Weibert, T. (2008). Keeping secrets in in-
complete databases. International Journal of Infor-
mation Security, 7,3:199–217.
Calvanese, D., De Giacomo, G., Lembo, D., Lenzerini, M.,
and Rosati, R. (2007). Tractable reasoning and effi-
cient query answering in description logics: The dl-
lite family. J. of Automated Reasoning, 39(3):385–
429.
Cuenca Grau, B., Kharlamov, E., Kostylev, E., and
Zheleznyakov, D. (2013). Controlled query evaluation
over owl 2 rl ontologies. In The Semantic Web–ISWC
2013, pages 49–65. Springer.
Denning, D. and Denning, P. (1979). Data security. ACM
Computing Surveys (CSUR), 11(3):227–249.
Halpern, J. and O’Neill, K. (2008). Secrecy in multiagent
systems. ACM Transactions on Information and Sys-
tem Security (TISSEC), 12(1):5.
Kagal, L., Finin, T., and Joshi, A. (2003). A policy based
approach to security for the semantic web. In The Se-
mantic Web-ISWC 2003, pages 402–418. Springer.
Krishnasamy Sivaprakasam, G. and Slutzki, G. (2016).
Secrecy-preserving query answering in ELH knowl-
edge bases. In Proceedings of 8th International Con-
ference on Agents and Artificial Intelligence, Rome,
Italy.
Krotzsch, M. (2012). Owl 2 profiles: An introduction to
lightweight ontology languages. In Eiter, T; and Kren-
nwallner, T. (eds) Reasoning Web Summer School Pro-
ceedings of Proc. of 8th Int. Summer school, volume
7487 of LNCS, pages 112–183. Springer.
Lutz, C., Toman, D., and Wolter, F. (2008). Conjunc-
tive query answering in EL using a database system.
In Proceedings of the 5th International Workshop on
OWL: Experiences and Directions (OWLED 2008).
Lutz, C., Toman, D., and Wolter, F. (2009). Conjunctive
query answering in the description logic EL using a
relational database system. In IJCAI, volume 9, pages
2070–2075.
Mei, J., Liu, S., Xie, G., Kalyanpur, A., Fokoue, A., Ni, Y.,
Li, H., and Pan, Y. (2009). A practical approach for
scalable conjunctive query answering on acyclicEL
+
knowledge base. In The Semantic Web-ISWC 2009,
pages 408–423. Springer.
Ortiz, M. and Simkus, M. (2012). Reasoning and query
answering in description logics. In Eiter, T; and Kren-
nwallner, T. (eds) Reasoning Web Summer School Pro-
ceedings of Proc. of 8th Int. Summer school, volume
7487 of LNCS, pages 1–53. Springer.
Papadimitriou, C. H. (2003). Computational complexity.
John Wiley and Sons Ltd.
Sicherman, G., De Jonge, W., and Van de Riet, R. (1983).
Answering queries without revealing secrets. ACM
Transactions on Database Systems (TODS), 8(1):41–
59.
Sivaprakasam, G. K. (2016). Secrecy-preserving reasoning
in simple description logic knowledge bases. PhD the-
sis, Iowa State University.
Stouppa, P. and Studer, T. (2009). Data privacy for ALC
knowledge bases. In Logical Foundations of Com-
puter Science, pages 409–421. Springer.
Tao, J., Slutzki, G., and Honavar, V. (2010). Secrecy-
preserving query answering for instance-checking in
EL. In Hitzler, P. and Lukasiwiez, T. (eds) RR 2010,
volume 6333 of LNCS, pages 195–203. Springer.
Tao, J., Slutzki, G., and Honavar, V. (2015). A concep-
tual framework for secrecy-preserving reasoning in
knowledge bases. ACM Transactions on Computa-
tional Logic (TOCL), 16(1):3.
Weitzner, D., Abelson, H., Berners-Lee, T., Feigenbaum,
J., Hendler, J., and Sussman, G. (2008). Information
accountability. Commun. ACM, 51, 6.
ICAART 2021 - 13th International Conference on Agents and Artificial Intelligence
372