SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Policy-compliant data
processing: RDF-based
restrictions for data-protection
Sven Lieber, supervised by Anastasia Dimou and Ruben Verborgh
ISWC 2019, Doctoral Consortium in Auckland
2
Policy (App specific)
Religion
Email
Person
Sensitive
1
hasEmail maxCount
Birthday
Personal
Violation if personal data used
without informed consent
Closed world constraints on data
“Simple” modeling example: Person
Consent
1
hasEmail maxCount 3
3
Ontologies are carefully designed and a lot of design
decisions need to be made
Ontologies are the result of a carefully executed process
4
Ontology or
any knowledge
representation in RDF
Ontology Engineering process
Existing
ontologies
Needs and
Requirement
s
Concepts,
Relationships,
Restrictions
Currently unclear how needs and requirements are
addressed by expressed restrictions
5
Ontology
Ontology Engineering processNeeds and
Requirement
s
Constraints
Unknown how restrictions are used in existing ontologies
6
OntologyOntology Engineering process
Existing
ontologies
Needs and
Requirement
s
Concepts,
Relationships,
Restrictions
Relevancy
7
Different use cases and level of formality
Ontology with less and with more restrictions
Annotation
e.g. schema.org
Reasoning
e.g. pizza ontology
My research is relevant regarding the modeling of
constraints when developing ontologies
8
Ontology with axioms
RDFS, OWL
Constraints on ontology concepts’
Instance data
SHACL, ShEx
Restriction modeling in RDF as axioms, constraints or as
part of policies is relevant to compliance checking
9
Privacy-aware data processing
Compliance assessments to address this recognized need
Approach overview
10
Ontology
Ontology Engineering process
Existing
ontologies
Needs and
Requirement
s
Constraints
Concepts,
Relationships,
Restrictions
1) Inform
2) Compare existing activities
and propose new activities
3) Apply on privacy use case
Related work: Restrictions can be modeled in a lot of
different ways, but currently no guidelines when to use what
11
Existing
ontologies
Concepts,
Relationships,
Restrictions
Closed world constraints (SHACL, ShEx)
Open world axioms (OWL, RDFS)
Restriction types in data quality
12
Existing
ontologies
Concepts,
Relationships,
Restrictions
How can we measure ontologies’ restriction use in
a complete way?
We can measure restriction use by obtaining
statistics regarding restriction types and
their different expressions.
Research to understand the use of restrictions in RDF-
based vocabularies
13
Existing
ontologies
Concepts,
Relationships,
Restrictions
Create statistics about the use of restriction types
and expressions of ontologies from common
ontology repositories
Verify completeness of restriction type statistics
by comparison with ground truth
We want to create a statistical dataset about
restriction use and evaluate its completeness
Preliminary Results indicate different use of
Restrictions and implicit modeling patterns
14
Existing
ontologies
Concepts,
Relationships,
Restrictions
Restriction use analysis of LOV and BioPortal
MontoloStats -
Ontology Modeling Statistics
https://w3id.org/montolo
Different restriction types
Second part of PhD covers the engineering process
15
OntologyOntology Engineering process
Existing
ontologies
Needs and
Requirement
s
Concepts,
Relationships,
Restrictions
✓
16
Ontology Engineering processNeeds and
Requirement
s
Related work: Ontology Engineering methodologies and
Ontology Design patterns, but unclear how restriction
modeling is supported
Ontology
Constraints
17
How can we support users in restriction modeling
involving axioms and constraints?
We can define a restriction modeling activity which provides
more support to model restrictions compared to existing activities.
Extend existing ontology engineering
activities to support restriction modeling
Ontology Constraints
18
How applicable is our restriction modeling
activity in a privacy use case?
Automatic privacy compliance checks by supporting the
knowledge engineer in the creation of concepts, axioms,
constraints and policies.
Apply restriction modeling activity in privacy use case to
support users in compliance assessments
Our approach to addressing the research
19
Define an Ontology Engineering activity to model
restrictions based on existing best practices
Apply activity in a different use cases
Ontology
Ontology Engineering processNeeds and
Requirement
s
Constraints
User evaluations and case studies to evaluate our approach
20
Constraints
User evaluations comparing restriction modeling
activity with state-of-the-art activities
Perform a case study
in the privacy domain
Ontology
Ontology Engineering processNeeds and
Requirement
s
Preliminary Results cover proof-of-concepts
regarding privacy-related annotations and
a review of ontology engineering literature
21
Ontology Engineering processNeeds and
Requirement
s
Ontology
Complement open world axioms with closed world
constraints when systematically building knowledge
Compliance assessments of privacy-aware data
processing currently either axioms or constraints
Sven Lieber
PhD researcher semantic intelligence
E Sven.Lieber@ugent.be
T +32 9 331 49 59
https://sven-lieber.org
@SvenLieber
Interested in
- Ontology Engineering?
- Shapes?
- Privacy?
Come and talk to me!

Weitere ähnliche Inhalte

Ähnlich wie Policy-compliant data processing: RDF-based restrictions for data-protection

MontoloStats - Ontology Modeling Statistics
MontoloStats - Ontology Modeling StatisticsMontoloStats - Ontology Modeling Statistics
MontoloStats - Ontology Modeling StatisticsSven Lieber
 
Elder Abuse Research
Elder Abuse ResearchElder Abuse Research
Elder Abuse ResearchLaura Torres
 
Extreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsExtreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsVon Welch
 
The Revolution Of Cloud Computing
The Revolution Of Cloud ComputingThe Revolution Of Cloud Computing
The Revolution Of Cloud ComputingCarmen Sanborn
 
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese..."Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...e-SIDES.eu
 
Mind the Gap: Reflections on Data Policies and Practice
Mind the Gap: Reflections on Data Policies and PracticeMind the Gap: Reflections on Data Policies and Practice
Mind the Gap: Reflections on Data Policies and PracticeLizLyon
 
2015-11-11 research seminar
2015-11-11 research seminar2015-11-11 research seminar
2015-11-11 research seminarifi8106tlu
 
Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...Tore Hoel
 
Scaling up learning analytics solutions: Is privacy a show-stopper?
Scaling up learning analytics solutions:  Is privacy a show-stopper?Scaling up learning analytics solutions:  Is privacy a show-stopper?
Scaling up learning analytics solutions: Is privacy a show-stopper?Tore Hoel
 
Linking Heterogeneous Scholarly Data Sources in an Interoperable Setting: the...
Linking Heterogeneous Scholarly Data Sources in an Interoperable Setting: the...Linking Heterogeneous Scholarly Data Sources in an Interoperable Setting: the...
Linking Heterogeneous Scholarly Data Sources in an Interoperable Setting: the...Platforma Otwartej Nauki
 
IRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect InformationIRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect InformationIRJET Journal
 
Griffiths lace workshop-eden-2016
Griffiths lace workshop-eden-2016Griffiths lace workshop-eden-2016
Griffiths lace workshop-eden-2016Dai Griffiths
 
Efficient Way to Identify User Aware Rare Sequential Patterns in Document Str...
Efficient Way to Identify User Aware Rare Sequential Patterns in Document Str...Efficient Way to Identify User Aware Rare Sequential Patterns in Document Str...
Efficient Way to Identify User Aware Rare Sequential Patterns in Document Str...ijtsrd
 
A Reuse-based Lightweight Method for Developing Linked Data Ontologies and Vo...
A Reuse-based Lightweight Method for Developing Linked Data Ontologies and Vo...A Reuse-based Lightweight Method for Developing Linked Data Ontologies and Vo...
A Reuse-based Lightweight Method for Developing Linked Data Ontologies and Vo...María Poveda Villalón
 
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESSA GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESSijseajournal
 
Ontology Engineering for Big Data
Ontology Engineering for Big DataOntology Engineering for Big Data
Ontology Engineering for Big DataKouji Kozaki
 
Classification of News and Research Articles Using Text Pattern Mining
Classification of News and Research Articles Using Text Pattern MiningClassification of News and Research Articles Using Text Pattern Mining
Classification of News and Research Articles Using Text Pattern MiningIOSR Journals
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigmMigrant Systems
 
Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Marlon Domingus
 

Ähnlich wie Policy-compliant data processing: RDF-based restrictions for data-protection (20)

MontoloStats - Ontology Modeling Statistics
MontoloStats - Ontology Modeling StatisticsMontoloStats - Ontology Modeling Statistics
MontoloStats - Ontology Modeling Statistics
 
Elder Abuse Research
Elder Abuse ResearchElder Abuse Research
Elder Abuse Research
 
Extreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsExtreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific Collaborations
 
The Revolution Of Cloud Computing
The Revolution Of Cloud ComputingThe Revolution Of Cloud Computing
The Revolution Of Cloud Computing
 
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese..."Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
 
Mind the Gap: Reflections on Data Policies and Practice
Mind the Gap: Reflections on Data Policies and PracticeMind the Gap: Reflections on Data Policies and Practice
Mind the Gap: Reflections on Data Policies and Practice
 
Research fall 2010
Research fall 2010Research fall 2010
Research fall 2010
 
2015-11-11 research seminar
2015-11-11 research seminar2015-11-11 research seminar
2015-11-11 research seminar
 
Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...
 
Scaling up learning analytics solutions: Is privacy a show-stopper?
Scaling up learning analytics solutions:  Is privacy a show-stopper?Scaling up learning analytics solutions:  Is privacy a show-stopper?
Scaling up learning analytics solutions: Is privacy a show-stopper?
 
Linking Heterogeneous Scholarly Data Sources in an Interoperable Setting: the...
Linking Heterogeneous Scholarly Data Sources in an Interoperable Setting: the...Linking Heterogeneous Scholarly Data Sources in an Interoperable Setting: the...
Linking Heterogeneous Scholarly Data Sources in an Interoperable Setting: the...
 
IRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect InformationIRJET - Deep Collaborrative Filtering with Aspect Information
IRJET - Deep Collaborrative Filtering with Aspect Information
 
Griffiths lace workshop-eden-2016
Griffiths lace workshop-eden-2016Griffiths lace workshop-eden-2016
Griffiths lace workshop-eden-2016
 
Efficient Way to Identify User Aware Rare Sequential Patterns in Document Str...
Efficient Way to Identify User Aware Rare Sequential Patterns in Document Str...Efficient Way to Identify User Aware Rare Sequential Patterns in Document Str...
Efficient Way to Identify User Aware Rare Sequential Patterns in Document Str...
 
A Reuse-based Lightweight Method for Developing Linked Data Ontologies and Vo...
A Reuse-based Lightweight Method for Developing Linked Data Ontologies and Vo...A Reuse-based Lightweight Method for Developing Linked Data Ontologies and Vo...
A Reuse-based Lightweight Method for Developing Linked Data Ontologies and Vo...
 
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESSA GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
 
Ontology Engineering for Big Data
Ontology Engineering for Big DataOntology Engineering for Big Data
Ontology Engineering for Big Data
 
Classification of News and Research Articles Using Text Pattern Mining
Classification of News and Research Articles Using Text Pattern MiningClassification of News and Research Articles Using Text Pattern Mining
Classification of News and Research Articles Using Text Pattern Mining
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
 
Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...Responsible research: professionalism and integrity. The practical, legal and...
Responsible research: professionalism and integrity. The practical, legal and...
 

Mehr von Sven Lieber

Assessing, Creating and Using Knowledge Graph Restrictions
Assessing, Creating and Using Knowledge Graph RestrictionsAssessing, Creating and Using Knowledge Graph Restrictions
Assessing, Creating and Using Knowledge Graph RestrictionsSven Lieber
 
Harvesting Social Media (in BESOCIAL)
Harvesting Social Media (in BESOCIAL)Harvesting Social Media (in BESOCIAL)
Harvesting Social Media (in BESOCIAL)Sven Lieber
 
BESOCIAL A Knowledge Graph for Social Media Archiving
BESOCIAL A Knowledge Graph for Social Media ArchivingBESOCIAL A Knowledge Graph for Social Media Archiving
BESOCIAL A Knowledge Graph for Social Media ArchivingSven Lieber
 
Statistics about Data Shape Use in RDF Data
Statistics about Data Shape Use in RDF DataStatistics about Data Shape Use in RDF Data
Statistics about Data Shape Use in RDF DataSven Lieber
 
Poster Doctoral Consortium Model RDF-based restrictions
Poster Doctoral Consortium Model RDF-based restrictionsPoster Doctoral Consortium Model RDF-based restrictions
Poster Doctoral Consortium Model RDF-based restrictionsSven Lieber
 
Linked Data Generation for Adaptive Learning Analytics Systems
Linked Data Generation for Adaptive Learning Analytics SystemsLinked Data Generation for Adaptive Learning Analytics Systems
Linked Data Generation for Adaptive Learning Analytics SystemsSven Lieber
 

Mehr von Sven Lieber (6)

Assessing, Creating and Using Knowledge Graph Restrictions
Assessing, Creating and Using Knowledge Graph RestrictionsAssessing, Creating and Using Knowledge Graph Restrictions
Assessing, Creating and Using Knowledge Graph Restrictions
 
Harvesting Social Media (in BESOCIAL)
Harvesting Social Media (in BESOCIAL)Harvesting Social Media (in BESOCIAL)
Harvesting Social Media (in BESOCIAL)
 
BESOCIAL A Knowledge Graph for Social Media Archiving
BESOCIAL A Knowledge Graph for Social Media ArchivingBESOCIAL A Knowledge Graph for Social Media Archiving
BESOCIAL A Knowledge Graph for Social Media Archiving
 
Statistics about Data Shape Use in RDF Data
Statistics about Data Shape Use in RDF DataStatistics about Data Shape Use in RDF Data
Statistics about Data Shape Use in RDF Data
 
Poster Doctoral Consortium Model RDF-based restrictions
Poster Doctoral Consortium Model RDF-based restrictionsPoster Doctoral Consortium Model RDF-based restrictions
Poster Doctoral Consortium Model RDF-based restrictions
 
Linked Data Generation for Adaptive Learning Analytics Systems
Linked Data Generation for Adaptive Learning Analytics SystemsLinked Data Generation for Adaptive Learning Analytics Systems
Linked Data Generation for Adaptive Learning Analytics Systems
 

Kürzlich hochgeladen

办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一F sss
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
Business Analytics using Microsoft Excel
Business Analytics using Microsoft ExcelBusiness Analytics using Microsoft Excel
Business Analytics using Microsoft Excelysmaelreyes
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhYasamin16
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...ttt fff
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 

Kürzlich hochgeladen (20)

办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
Business Analytics using Microsoft Excel
Business Analytics using Microsoft ExcelBusiness Analytics using Microsoft Excel
Business Analytics using Microsoft Excel
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 

Policy-compliant data processing: RDF-based restrictions for data-protection

  • 1. Policy-compliant data processing: RDF-based restrictions for data-protection Sven Lieber, supervised by Anastasia Dimou and Ruben Verborgh ISWC 2019, Doctoral Consortium in Auckland
  • 2. 2 Policy (App specific) Religion Email Person Sensitive 1 hasEmail maxCount Birthday Personal Violation if personal data used without informed consent Closed world constraints on data “Simple” modeling example: Person Consent 1 hasEmail maxCount 3
  • 3. 3 Ontologies are carefully designed and a lot of design decisions need to be made
  • 4. Ontologies are the result of a carefully executed process 4 Ontology or any knowledge representation in RDF Ontology Engineering process Existing ontologies Needs and Requirement s Concepts, Relationships, Restrictions
  • 5. Currently unclear how needs and requirements are addressed by expressed restrictions 5 Ontology Ontology Engineering processNeeds and Requirement s Constraints
  • 6. Unknown how restrictions are used in existing ontologies 6 OntologyOntology Engineering process Existing ontologies Needs and Requirement s Concepts, Relationships, Restrictions
  • 7. Relevancy 7 Different use cases and level of formality Ontology with less and with more restrictions Annotation e.g. schema.org Reasoning e.g. pizza ontology
  • 8. My research is relevant regarding the modeling of constraints when developing ontologies 8 Ontology with axioms RDFS, OWL Constraints on ontology concepts’ Instance data SHACL, ShEx
  • 9. Restriction modeling in RDF as axioms, constraints or as part of policies is relevant to compliance checking 9 Privacy-aware data processing Compliance assessments to address this recognized need
  • 10. Approach overview 10 Ontology Ontology Engineering process Existing ontologies Needs and Requirement s Constraints Concepts, Relationships, Restrictions 1) Inform 2) Compare existing activities and propose new activities 3) Apply on privacy use case
  • 11. Related work: Restrictions can be modeled in a lot of different ways, but currently no guidelines when to use what 11 Existing ontologies Concepts, Relationships, Restrictions Closed world constraints (SHACL, ShEx) Open world axioms (OWL, RDFS) Restriction types in data quality
  • 12. 12 Existing ontologies Concepts, Relationships, Restrictions How can we measure ontologies’ restriction use in a complete way? We can measure restriction use by obtaining statistics regarding restriction types and their different expressions. Research to understand the use of restrictions in RDF- based vocabularies
  • 13. 13 Existing ontologies Concepts, Relationships, Restrictions Create statistics about the use of restriction types and expressions of ontologies from common ontology repositories Verify completeness of restriction type statistics by comparison with ground truth We want to create a statistical dataset about restriction use and evaluate its completeness
  • 14. Preliminary Results indicate different use of Restrictions and implicit modeling patterns 14 Existing ontologies Concepts, Relationships, Restrictions Restriction use analysis of LOV and BioPortal MontoloStats - Ontology Modeling Statistics https://w3id.org/montolo Different restriction types
  • 15. Second part of PhD covers the engineering process 15 OntologyOntology Engineering process Existing ontologies Needs and Requirement s Concepts, Relationships, Restrictions ✓
  • 16. 16 Ontology Engineering processNeeds and Requirement s Related work: Ontology Engineering methodologies and Ontology Design patterns, but unclear how restriction modeling is supported Ontology Constraints
  • 17. 17 How can we support users in restriction modeling involving axioms and constraints? We can define a restriction modeling activity which provides more support to model restrictions compared to existing activities. Extend existing ontology engineering activities to support restriction modeling Ontology Constraints
  • 18. 18 How applicable is our restriction modeling activity in a privacy use case? Automatic privacy compliance checks by supporting the knowledge engineer in the creation of concepts, axioms, constraints and policies. Apply restriction modeling activity in privacy use case to support users in compliance assessments
  • 19. Our approach to addressing the research 19 Define an Ontology Engineering activity to model restrictions based on existing best practices Apply activity in a different use cases Ontology Ontology Engineering processNeeds and Requirement s Constraints
  • 20. User evaluations and case studies to evaluate our approach 20 Constraints User evaluations comparing restriction modeling activity with state-of-the-art activities Perform a case study in the privacy domain Ontology Ontology Engineering processNeeds and Requirement s
  • 21. Preliminary Results cover proof-of-concepts regarding privacy-related annotations and a review of ontology engineering literature 21 Ontology Engineering processNeeds and Requirement s Ontology
  • 22. Complement open world axioms with closed world constraints when systematically building knowledge Compliance assessments of privacy-aware data processing currently either axioms or constraints
  • 23. Sven Lieber PhD researcher semantic intelligence E Sven.Lieber@ugent.be T +32 9 331 49 59 https://sven-lieber.org @SvenLieber Interested in - Ontology Engineering? - Shapes? - Privacy? Come and talk to me!