<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Obfuscation of Semantic Data: Restricting the Spread of Sensitive Information</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Federico Cerutti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Geeth R. de Mel</string-name>
          <email>grdemel@us.ibm.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Timothy J. Norman</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nir Oren</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artemis Parvizi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paul Sullivan</string-name>
          <email>paul.sullivan@intpt.net</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alice Toniolo</string-name>
          <email>a.toniolog@abdn.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computing Science, University of Aberdeen</institution>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>IBM TJ Watson Research Center</institution>
          ,
          <addr-line>NY</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>INTELPOINT Incorporated</institution>
          ,
          <addr-line>PA</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper investigates how to restrict the spread of sensitive information. This work is situated in a military context, and provides a tractable method to decide what semantic information to share, with whom, and how. The latter decision is supported by obfuscation, where a related concept or fact may be shared instead of the original. We consider uncertain information, and utilize Subjective Logic as an underlying formalism to further obfuscate concepts, and reason about obfuscated concepts.</p>
      </abstract>
      <kwd-group>
        <kwd>semantic knowledge</kwd>
        <kwd>strategic interaction</kwd>
        <kwd>knowledge obfuscation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        Controlling the spread of sensitive information is a problem in various contexts. In
everyday life, users share information across a plethora of social networks and other
media. This raises concerns about unwanted usage of such information [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. In
strategic contexts [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
        ], information sharing can have serious economic or life threatening
repercussions. This paper therefore examines how information sharing can take place
while minimizing its negative impact through the use of obfuscation.
      </p>
      <p>
        Following [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], a technique for restricting the spread of information to the “desired”
audience only is referred to as obfuscation, defined as:
      </p>
      <p>
        Information-obfuscation (or data-masking) is the practice of concealing,
restricting, fabricating, encrypting, or otherwise obscuring sensitive data. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
While other approaches [
        <xref ref-type="bibr" rid="ref1 ref2 ref6">1, 2, 6</xref>
        ] focused on obfuscation of quantitative information
— e.g. accelerometer data from a smartphone — we focus on qualitative information
linked through a semantic description of the domain. The main contribution of this
paper is an innovative and sound ontology based obfuscation technique, useable in
noncooperative environments.
      </p>
      <p>
        We consider an implicit exchange of information between two agents: a sender and
a receiver . The sender wants the receiver to know some pieces of information, and
at the same time it wants to keep some inferences4 that could be surmised from this
? Corresponding author.
4 In this paper, inference refers to any reasoning process that — when applying a specific rule
or rules (e.g. deductive modus ponens) — leads to a conclusion given a set of premises.
information private. This is analogous to the work described in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] where users wish to
share the activity level obtained from their smartphone accelerometer with an app for
medical advice, while keeping the specific activity type private.
      </p>
      <p>
        In this paper we present the Semantic Obfuscation Framework (SOF ), which adopts
the sender ’s point of view, and thus starts considering (1) its domain model (ontology),
(2) the information to be shared, and (3) the information to be kept private. Then it
identifies the relevant ontological relationships between the shared and the private
information, and computes, using Subjective Logic5 (SL) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the likelihood that the receiver
knows it thus leading to deriving the private information. Note that the use of SL in
such a context is not novel: SL is utilized in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] for evaluating source of ontological
information, and in [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ] for computing trust/reputation degrees with uncertainty.
      </p>
      <p>The paper is organized as follows. Section 2 shows a realistic military scenario
and the the main concepts of SL. Section 3 presents the requirements necessary for
applying our proposal for obfuscating semantic data, which is then illustrated in Section
4. Finally, Section 5 concludes the paper by discussing related and future work. Proofs
are omitted or sketched due to space constraints.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Motivation and Background</title>
      <p>
        A realistic military scenario [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] is used throughout this paper as a running example for
demonstrating our proposal. Such a scenario (x 2.1) is formalized using the Intelligence,
Surveillance, Target Acquisition and Reconnaissance (ISTAR) ontology OI [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]6.
2.1
      </p>
      <sec id="sec-2-1">
        <title>A Motivating Scenario</title>
        <p>
          In [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], a realistic military scenario is developed involving peace-keeping in the country
of Sincor where coalition forces successfully executed a campaign to liberate it from a
dictatorial regime. A military task force is made up of members from many different
nations working together as a coalition, including local forces. The coalition has divided
responsibility for the country into different sectors, with a field grade officer in charge
of each sector. The Combined Joint Task Force (CJTF) commander is in critical need
of a capability to know the movement of all Person of Interest (POI) and their activities
within the country and to have full situational awareness of the activities of the members
of various Violent Extremist Organizations (VEO) that work to destabilize the country
and push it back to war.
        </p>
        <p>Last night, two American diplomats were kidnapped, and their current whereabouts
are unknown. The main VEO suspected of the kidnapping is Sumer, which operates
from a safe haven in the hills just outside of Kish. The CJTF Commander
“standsup” a Crisis Action Team (CAT) to help manage the fluid situation. Intelligence has
contacted other intelligence organizations within the coalition to try and determine the
exact whereabouts of the hostages and the size of the force holding them. CJTF
Intelligence is also preparing intelligence products for the CAT on the kidnapping and any
5 Subjective Logic extends probability theory by expressing uncertainty about the probability
values themselves.
6 http://goo.gl/feTio9
coalition forces in the area as well as the available capabilities of coalition local
partners. This information will be used by members of the CAT in formulating possible
Courses of Actions (COA) for the commander to consider.</p>
        <p>A few hours ago, Intelligence determined a POI who is very likely to be involved
in the kidnapping. The CJTF Commander needs to contact the coalition local partners
because he will need support for constant surveillance of such a POI, but only if it is
unlikely that they will infer that this is a hostage rescue operation: the coalition local
partners might otherwise jeopardize the operation due to insufficient training.</p>
        <p>Therefore, the CJTF Commander asks Intelligence to evaluate the likelihood of
inferences that could be made by coalition local partners. In particular, he informs
Intelligence that he needs to keep the nature of the operation (i.e. hostage rescue) confidential.
Intelligence, following the approach presented in this paper, replies that the probability
that the coalition partners will infer the nature of the operation is 12%, a value that the
CJTF considers acceptable. Thus the CJTF asks the coalition local partners to support
its operation with constant surveillance of a POI.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Overview of Subjective Logic</title>
        <p>
          To assess the uncertainty in reasoning about another agent’s knowledge and, ultimately,
to derive a metric of obfuscation (x 4), we rely on Subjective Logic (SL) [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], which
extends probability theory by expressing uncertainty about the probability values
themselves. Like Dempster-Shafer evidence theory [
          <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
          ], SL operates on a frame of
discernment — i.e. a set of atomic or primitive states, namely variable assignments, e.g.
if d represents the possible results of rolling a dice, atomic states are d = 1, d = 2, . . . ,
d = 6 — denoted by .
        </p>
        <p>Definition 1 (Belief Mass Assignment). Given a frame of discernment , we can
associate a belief mass assignment (BMA) m (x) with each substate x 2 2 such that
1. m (x) 0
2. m (;) = 0
3. Px22 m (x) = 1</p>
        <p>When we speak of belief in a certain state, we refer not only to the belief mass in
the state, but also to the belief masses of the state’s substates. Similarly, when we speak
about disbelief, that is, the total belief that a state is not true, we need to take substates
into account. Finally, SL also introduces the concept of uncertainty, that is, the amount
of belief that might be in a superstate or a partially overlapping state. These concepts
can be formalized as follows.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Definition 2 (Belief/Disbelief/Uncertainty Functions/Relative atomicity/Probabil</title>
        <p>ity Expectation). Given a frame of discernment , a belief mass assignment m on ,
and a state x, we define:
– the belief function for x: b(x) = X m (y); x; y 2 2 ;</p>
        <p>y x
– the disbelief function for x: d(x) =</p>
        <p>X
y\x=;
– the uncertainty function for x: u(x) =
– the relative atomicity for x w.r.t. y 2 2 : a(x=y) = jxj\yjyj ; x; y 2 2 ; y 6= ;;
– the probability expectation for x: E[x] = X m (y)a(x=y); x; y 2 2 .</p>
        <p>In particular, let us consider a focused frame of discernment, viz. a binary frame of
discernment containing a state and its complement.</p>
      </sec>
      <sec id="sec-2-4">
        <title>Definition 3 (Focused Frame of Discernment/Focused BMA/Focused Relative</title>
        <p>Atomicity). Given x 2 2 , the frame of discernment denoted by ~x, which contains
two atomic states, x and :x, where :x is the complement of x in , is the focused frame
of discernment with focus on x. Let ~x be the focused frame of discernment with focus
on x of . Given a belief mass assignment m and the belief, disbelief and uncertainty
functions for x (b(x), d(x) and u(x) respectively), the focused belief mass assignment,
m ~x on ~x is defined as
m ~x (x) = b(x)
m ~x (:x) = d(x)
m ~x ( ~x) = u(x)
The focused relative atomicity of x (which approximates the role of a prior probability
distribution within probability theory, weighting the likelihood of some outcomes over
others) is defined as
a ~x (x= ) = [E[x]
b(x)]=u(x)
For convenience, and when clear from the context, the focused relative atomicity of x is
abbreviated to a(x).</p>
        <p>An opinion consists of the belief, disbelief, uncertainty and relative atomicity as
computed over a focused frame of discernment.</p>
        <p>Definition 4 (Opinion). Given a focused frame of discernment containing x and
its complement :x, and assuming a belief mass assignment m with belief, disbelief,
uncertainty and relative atomicity functions on x in of b(x), d(x), u(x), and a(x),
we define an opinion over x, written ox as
ox</p>
        <p>hb(x); d(x); u(x); a(x)i
We denote the set of all possible SL opinion 4-ples with O [0; 1]4.</p>
        <p>The probability expectation of an opinion is denoted as E[ox] = b(x) + u(x) a(x).</p>
        <p>
          Given two opinions about propositions x1 and x2, [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] defines a conjunction operator
as follows.
        </p>
        <p>Definition 5 (Propositional Conjunction). Let ox1 = hb(x1); d(x1); u(x1); a(x1)i
and ox2 = hb(x2); d(x2); u(x2); a(x2)i be opinions about x1 and x2. Let ox1^x2 =
hb(x1 ^ x2); d(x1 ^ x2); u(x1 ^ x2); a(x1 ^ x2)i be the opinion such that:
b(x1 ^ x2) = b(x1) b(x2)
d(x1 ^ x2) = d(x1) + d(x2) d(x1) d(x2)
u(x1 ^ x2) = b(x1) u(x2) + u(x1) b(x2) + u(x1) u(x2)</p>
        <p>b(x1) u(x2) a(x2) + u(x1) a(x1) b(x2) + u(x1) a(x1) u(x2) a(x2)
a(x1 ^ x2) =</p>
        <p>b(x1) u(x2) + u(x1) b(x2) + u(x1) u(x2)
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Requirements for Semantic Obfuscation</title>
      <p>We now turn our attention to the requirements for providing a formal definition for an
obfuscation procedure. From a general perspective, we consider two agents: the sender
shares White knowledge — i.e. a piece of information somehow linked to a domain
ontology — with a receiver . The sender wants to keep private some pieces of information
— Black knowledge — that might be surmised from the White knowledge by
exploiting semantic connections. These connections are derived from the sender ’s domain
ontology which we assume has been built by an ontology engineer.</p>
      <p>
        From a formal perspective, if not explicitly mentioned, we refer to an arbitrary but
fixed ontology O built in the monotonic description logic language E L [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. O is a finite
set of axioms in E L; NCO is the set of concept names; NRO is the set of role names; N O
I
is the set of individual names. Concepts v2; v3 2 NCO can be inductively composed
twoipthc othnecefpotl;lo?widnegnoctoensstthruecbtso:tt&gt;omj ?conj cve1ptj;fv1g2j Nv2COu; av32j N9rIO:v;2rw2heNreRO&gt; denotes the
a
. E L supports
concept inclusion v2 v v3 and membership v1(a). An axiom is an assertion in E L
which is a well-formed formula; TBox represents all axioms in O which relate concepts
to each other; ABox represents all axioms which make assertions about individuals.
Hereafter, in order to be compliant with the methodology for reducing more expressive
languages to E L presented in [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ], we assume that ABox axioms are removed with
care. We use j= to denote that an ontology entails an axiom (i.e. O j= ): O is the
deductive closure of O, i.e. the set of axioms in E L that can be entailed by the axioms
in O.
      </p>
      <p>Returning to our running example (x 2.1), let us consider the relevant part of the
deductive closure of the ISTAR ontology (OI ) shown in Figure 1; r1 denotes the role
requiresOperationalCapability.</p>
      <p>Moreover, our ontology engineer releases a certificate assessing the degree of
confidence for the ontology: for instance, if the engineer is requested to describe each type
of operation that the US Army can perform, and he considered those for peace-keeping
only, the degree of confidence of this ontology will be quite low. Formally, the ontology
engineer’s degree of confidence about the ontology is a SL opinion.</p>
      <sec id="sec-3-1">
        <title>Definition 6 (Confidence Degree in the Completeness of an Ontology). Given an</title>
        <p>ontology O, ocO = hb(c)O ; d(c)O ; u(c)O ; a(c)O i is the confidence degree in O.</p>
        <p>Both the White knowledge and the Black knowledge are represented as subsets of
the concepts in the ontology.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Definition 7 (White and Black knowledge). The Black knowledge (resp. the White</title>
        <p>knowledge) associated to the interaction between sender and receiver is B NCO
(resp. W NCO , W \ B = ;).</p>
        <p>In Figure 1, the White knowledge is v1 and v2 (W = fv1; v2g), while the Black
knowledge is v7 (B = fv7g).</p>
        <p>We introduce a machinery for evaluating the White–Black knowledge connections.
For this purpose, we begin by describing a generic semantic relationship between two
concepts representing a semantic connection, i.e. being part of a role, or of a taxonomic
relation.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Definition 8 (Semantic Relationship). A semantic relationship !</title>
        <p>symmetric function on the domain of concepts.</p>
        <p>NCO</p>
        <p>NCO is a</p>
        <p>As before, if not explicitly mentioned, we always refer to an arbitrary but fixed
semantic relationship ! NCO NCO .</p>
        <p>Let us introduce !R, a more specific semantic relationship on the concepts names,
which is parametric in the domain of the roles.</p>
        <p>Definition 9 (Relationship !R). Given R NRO , !R NCO NCO is a symmetric</p>
        <p>R R
relationship such that: v1 ! v2 and v2 ! v1 iff (v1 v v2) 2 O or (v1 u (9r:v2)) 2
O ; r 2 R
Proposition 1. For every R 2 2NRO , the relationship !R is a semantic relationship.
the case of v6, but sender is very biased; sender has no clue about v7 f!r1g v2. The other SL
labelling do not affect our running example and are left in their symbolic form.</p>
        <p>
          A semantic relationship induces an indirect graph (semantic relationship graph). We
then label each edge in such a graph with a SL opinion, which represents the likelihood
that the receiver is aware of the semantic relationship represented by such an edge.
These SL opinions can be derived from past interactions with the receiver [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ], or by a
priori knowledge.
        </p>
        <sec id="sec-3-3-1">
          <title>Definition 10 (SL Labelling of Semantic Relationship). The function !! :!7! O</title>
          <p>is a SL labelling of !: !!(v1 ! v2) = !!(v2 ! v1).</p>
          <p>In our running example, the semantic relationship graph induced by the semantic
relation fr1g on OI is depicted in Figure 2. The meaning of the area comprised in the
!
dotted lines will be explained following Alg. 1.</p>
          <p>We can now define a semantic path as a path in the semantic relationship graph.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Definition 11 (Semantic Path). A semantic path between vA and vB p! (vA; vB) is</title>
      <p>a sequence of nodes p! (vA; vB) = hv1; : : : ; vni s.t. v1 = vA, vn = vB, and 8i &lt; n,
vi ! vi+1 holds.</p>
      <p>In order to assess the likelihood of surmising a concept, we rely on the intuition
that the closer — in terms of semantic relationship — two concepts, the greater the
likelihood to predict one from the other. Therefore, we need a measure of the semantic
distance w.r.t. a semantic relationship between two sets of concepts. To this end, we first
need to define the set of minimal semantic paths between two set of concepts, which is
necessary to assess the distance among them.</p>
      <sec id="sec-4-1">
        <title>Definition 12 (Set of Minimal Paths). Given Z1; Z2</title>
        <p>between Z1 and Z2 is
NCO , the set of minimal paths
P! (Z1; Z2) = fp! (v1; v2) j v1 2 Z1; v2 2 Z2;
p! (v1; v2) 2 arg min (jp! (v1; v2) j)g
p!(v1;v2)
such that 8v1 2 Z1; v2 2 Z2, 9!p! (v1; v2) 2 P! (Z1; Z2) .</p>
        <p>Then, the semantic distance w.r.t. a semantic relationship between two sets of
concepts is the maximum among the lengths of minimal paths between them.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Definition 13 (Semantic distance). Given Z1; Z2</title>
        <p>the semantic relationship ! between Z1 and Z2 is</p>
        <p>NCO , the semantic distance w.r.t.
d! (Z1; Z2) =</p>
        <p>max
p!(v1;v2)2P!(Z1;Z2)
(jp! (v1; v2) j)
Note that Z1</p>
        <p>NCO , d! (Z1; Z1) = 0.</p>
        <p>Finally, in order to take into account the receiver ’s believed knowledge, a
cumulative SL labelling between two concepts is defined as the conjunction of the SL labelling
of the minimal paths between them.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Definition 14 (Cumulative SL Labelling). Given !! a SL labelling of</title>
      <p>Z1; Z2 NCO , the cumulative SL labelling between Z1 and Z2 is
!,
Z1!Z2 =
^
^</p>
      <p>!!(vi ! vi+1)
p!(vA;vB)2P!(Z1;Z2) i&lt;jp!(vA;vB)j</p>
      <p>Although multiple minimal paths can exist between v1 2 Z1 and v2 2 Z2, we
require (Def. 12) that only one of them is included in P! (Z1; Z2). We do not enforce
a specific method for choosing the one: the most reasonable is to include the minimal
path which maximize a metric, like the cumulative SL labelling (Def. 14).
4</p>
    </sec>
    <sec id="sec-6">
      <title>SOF : a Framework for Ontology Obfuscation</title>
      <p>We are now able to provide a formalization for semantic obfuscation. We call our
approach the Semantic Obfuscation Framework (SOF ). This measures the quality of
obfuscation in terms of the “likelihood” that the receiver will surmise the Black
knowledge from the White knowledge. First, we formalize the concept of “surmise” based on
a semantic relationship.</p>
      <p>Definition 15 (Semantic Surmise). The surmise from a node v1 is SO! (v1) = fv1g [
fv2 j v1 ! v2g.</p>
      <p>With a little abuse of notation, we define surmise on a set of concepts.</p>
      <sec id="sec-6-1">
        <title>Definition 16 (Semantic Surmise of a Set). Given Z1</title>
        <p>NCO :
SO! (Z1) = Z1 [</p>
        <p>\
v12Z1</p>
        <p>SO! (v1)</p>
        <p>Moreover, given the confidence degree, we define a function for estimating the
dimension (in terms of number of concept) of the “perfect” domain ontology.</p>
        <sec id="sec-6-1-1">
          <title>Definition 17 (Estimative Function). A function : O R 7! R is an estimative</title>
          <p>function iff (o;n) n and (o;n) = n iff o = h1; 0; 0; i; and (o;n + m) = (o;n) +
(o;m).</p>
          <p>In particular, let us introduce a cautious estimative function.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Definition 18 (Cautious Estimative Function). The cautious estimative function C :</title>
      <p>n
O R 7! R is defined as: C (o; n) = . If E[o] = 0, C (o; n) = K 1.</p>
      <p>E[o]
Proposition 2. The cautious estimative function C is an estimative function.</p>
      <p>We can provide now a computational procedure (Alg. 1) for deriving the degree of
likelihood that a receiver will surmise the Black knowledge from the White knowledge.
Alg. 1 requires as input an ontology O, the White and Black knowledge (resp. W and
B), a semantic relationship !, an estimative function , and the confidence degree ocO .</p>
      <p>Algorithm 1 performs several computations. First of all, it determines S (l. 1 of Alg.
1), namely the minimum set of surmised concept names from the White Knowledge
which includes the Black Knowledge also.</p>
      <p>
        It then considers the focused frame of discernment composed by two disjoint
primitive states, viz. B and S n B. In particular, it uses the cumulative labelling between W
and both B and S n B (l. 2 of Alg. 1) for computing the mass assignment of the two
primitive states (l. 3 of Alg. 1). To this end, Alg. 1 exploits the well-known relationship
between SL opinions on a focused frame of discernment and the beta distribution [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>In order to prove the soundness of such approach, in the case of perfect knowledge,
the SL opinion must collapse to a traditional probability value. The following
propositions shows that this is the case.</p>
      <p>Proposition 3. If ocO = h1; 0; 0; 1i and 8v1; v2 2 NCO ; !!(v1 ! v2) = h1; 0; 0; 1i,
oB is equivalent to considering B as the set of outcomes of an experiment on the sample
space S, and thus computing the probability of B.</p>
      <p>Proof. From Def. 17, (ocO ; n) = n; from !!(v1 ! v2) = h1; 0; 0; 1i, W!B =
h1; 0; 0; 1i and W!SnB = h1; 0; 0; 1i. Therefore, r = jBj, s = jS n Bj, V = 0. tu</p>
      <p>In our running example, SI = fv4; v5; v6; v7g — the area comprised by dotted line
in Figure 2 — is the minimum set of surmised concepts needed to reach the Black
knowledge from the white knowledge. In the case of perfect knowledge, the probability
to surmise the Black knowledge is 0:25 (cf. Proposition 3).</p>
      <p>Let us consider instead the case where there is complete (unbiased) uncertainty
about the completeness of OI , i.e. ocOI = h0; 0; 1; 0:5i. Therefore, C (ocOI ; n) = 2 n.
Let us also suppose that the SL labelling are as depicted in Figure 2.</p>
      <p>Algorithm 1 Procedure for deriving the degree of likelihood about surmising Black
knowledge
DegreeBlackSurmising(O; W; B; !; ; ocO )
0</p>
      <p>V = u( W!SnB) u( W!B) jSj
4: return hb(B); d(B); u(B); a(B)i
d(B) =</p>
      <p>s</p>
      <p>V + (ocO ; r + s)
a(B) = minfa( W!B); a( W!(SnB))g
&gt;8 jS n Bj b( W!SnB)
s = &lt; u( W!SnB)
&gt;: jS n Bj
u( W!SnB) 6= 0
otherwise
Therefore, W!B = !fr1g(v7 f!r1g v2) and W!(SI nB) = h0:61; 0:36; 0:03; 0:25i.</p>
      <p>!
The result of the computation is oB = h0; 00; 0:49; 0:51; 0:25i: E[oB] = 0:12.</p>
      <p>Intelligence thus informs the CJTF Commander that the coalition local partners
will surmise that the operation will be a hostage rescue given the request for support
for constant surveillance of the POI with a 12% probability. Since the CJTF considers
12% a reasonable risk, he requests for constant surveillance of the member of the VEO
Sumer. This leads the coalition forces to the location of the two American diplomats
and to the solution of the situation.
5</p>
    </sec>
    <sec id="sec-8">
      <title>Discussion and Conclusions</title>
      <p>
        In this paper we introduce SOF , a Semantic Obfuscation Framework, which includes
a sound and effective procedure for evaluating the likelihood that the receiver of some
pieces of information will derive some additional information that the sender desires to
keep private. Related works can be found in two different areas. First, which is the main
line of investigation that motivates this work, regards multi-agents strategic interactions
and the assessment of risk-benefit trade-off of information sharing [
        <xref ref-type="bibr" rid="ref1 ref2 ref20 ref21 ref4 ref5 ref6">1,2,4,5,6,20,21</xref>
        ]. In
this context, past approaches relied on information theoretic metrics and on quantitative
data. We claim that a qualitative representation of the domain like the one proposed in
this paper has several advantages. First, encompassing contextual knowledge — e.g.
the receiver knows that the American diplomats have been kidnapped by reading the
newspaper — is possible by enlarging the ontology and applying the same methodology.
Second, such a formalization improves the users’ awareness of inferences that could
be surmised. For instance half of the elements in SI requires operational capability
related to Unmanned aerial vehicles (UAVs) (cf. Figure 2): this might suggest that there
could be a semantic connection between ConstantSurveillanceCapability
and UAV Performance. In future work we will enlarge this discussion and provide
both a formal and an experimental comparison with the quantitative approaches.
      </p>
      <p>
        The second trend in the literature regards ontology mapping under uncertainty.
Among others, the relevant work utilizes either supervised machine learning [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], or
unsupervised machine learning using Bayesian networks [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], Markov networks [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ],
and information theory [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]; or Fuzzy logic approaches [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. In addition, [
        <xref ref-type="bibr" rid="ref27 ref28">27, 28</xref>
        ]
address the topic of uncertainty management using qualitative techniques, in particular
beliefs networks and argumentation. However, the present paper is the first approach
aimed at “obfuscating” shared pieces of knowledge for a specific purpose: i.e., to
prevent the revelation of Black knowledge. This shift of paradigm thus makes a comparison
with ontology mapping approaches difficult.
      </p>
      <p>
        Although this paper is focused on sharing set of concepts, a natural evolution would
involve sharing set of axioms. In this area several approaches have been proposed for
modifying an ontology to conceal sensitive information both in E L [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] and in more
expressive languages [
        <xref ref-type="bibr" rid="ref30 ref31">30, 31</xref>
        ]. A discussion on this topic is beyond the scope of this
paper and is left for future work.
      </p>
      <p>Finally, it is worth mentioning that the impact of this line of research can spread
beyond the military context, which we considered in this paper: for instance it could form
the basis for an investigation on how to improve users’ awareness of the confidentiality
of the information shared across social media.</p>
      <p>
        On the other hand, considering the point of view of the receiver, such approach can
identify gaps in the received information, a relevant topic within intelligence analysis.
In intelligence analysis often the key information is lacking, and analysts must factor the
impact of missing data in their confidence when judging a situation. Failing to recognize
absence of evidence is one of the most important causes of cognitive bias [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]. However,
it is hard to identify what is known to be missing and why (e.g. different clearance
levels, hidden agenda, . . . ). Reversing our approach can support analysts in the quest
for further evidence to fill the gaps required to deliver more effective intelligence.
      </p>
    </sec>
    <sec id="sec-9">
      <title>Acknowledgments</title>
      <p>The authors thank the anonymous reviewers for their helpful comments.</p>
      <p>The research described in this article was sponsored by US Army Research
laboratory and the UK Ministry of Defence and was accomplished under Agreement Number
W911NF-06-3-0001. The views and conclusions contained in this document are those
of the authors and should not be interpreted as representing the official policies, either
expressed or implied, of the US Army Research Laboratory, the U.S. Government, the
UK Ministry of Defense, or the UK Government. The US and UK Governments are
authorized to reproduce and distribute reprints for Government purposes notwithstanding
any copyright notation hereon.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Chakraborty</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bitouz</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srivastava</surname>
            ,
            <given-names>M.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dolecek</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bitouze</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <article-title>DolecekLara: Protecting Data Against Unwanted Inferences</article-title>
          .
          <source>In: 2013 Information Theory Workshop</source>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Chakraborty</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raghavan</surname>
            ,
            <given-names>K.R.</given-names>
          </string-name>
          , Johnson,
          <string-name>
            <given-names>M.P.</given-names>
            ,
            <surname>Srivastava</surname>
          </string-name>
          , M.B.:
          <article-title>A framework for contextaware privacy of sensor data on mobile systems</article-title>
          .
          <source>In: Proceedings of the 14th Workshop on Mobile Computing Systems and Applications - HotMobile '13</source>
          , New York, New York, USA, ACM Press (
          <year>February 2013</year>
          )
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Goffman</surname>
            ,
            <given-names>E.: Strategic</given-names>
          </string-name>
          <string-name>
            <surname>Interaction</surname>
          </string-name>
          .
          <source>Basil Blackwell Oxford</source>
          (
          <year>1970</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Cerutti</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chakraborty</surname>
          </string-name>
          , S., de Mel, G.,
          <string-name>
            <surname>Gibson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaplan</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oren</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pipes</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sensoy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srivastava</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zafer</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A Principled Framework for Risk vs. Utility Management in Coalition Networks</article-title>
          .
          <source>In: Annual Fall Meeting of ITA</source>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bisdikian</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cerutti</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oren</surname>
          </string-name>
          , N.:
          <article-title>A Framework for Using Trust to Assess Risk in Information Sharing</article-title>
          . In Chesn˜ evar,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Onaindia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Ossowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Vouros</surname>
          </string-name>
          , G., eds.: Agreement Technologies - Second International Conference, AT 2013 Beijing, China,
          <year>August 2013</year>
          Proceedings, Springer Berlin Heidelberg (
          <year>2013</year>
          )
          <fpage>135</fpage>
          -
          <lpage>149</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Pipes</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hardill</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gibson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srivastava</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bisdikian</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Exploitation of Distributed, Uncertain and Obfuscated Information Experimental application of trust and obfuscation techniques in distributed middleware</article-title>
          .
          <source>Technical report</source>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Jøsang</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A Logic for Uncertain Probabilities</article-title>
          .
          <source>International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3)</source>
          (
          <year>2001</year>
          )
          <fpage>279</fpage>
          -
          <lpage>311</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. S¸ensoy,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Fokoue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.Z.</given-names>
            ,
            <surname>Norman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.J.</given-names>
            ,
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Oren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Sycara</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          :
          <article-title>Reasoning about uncertain information and conflict resolution through trust revision</article-title>
          .
          <source>In: Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, International Foundation for Autonomous Agents and Multiagent Systems (May</source>
          <year>2013</year>
          )
          <fpage>837</fpage>
          -
          <lpage>844</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Cerutti</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toniolo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oren</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
            ,
            <given-names>T.J.:</given-names>
          </string-name>
          <article-title>An Empirical Evaluation of Geometric Subjective Logic Operators</article-title>
          . In Chesn˜ evar,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Onaindia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Ossowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Vouros</surname>
          </string-name>
          , G., eds.: Agreement Technologies - Second International Conference, AT 2013 Beijing, China,
          <year>August 2013</year>
          Proceedings, Springer Berlin Heidelberg (
          <year>2013</year>
          )
          <fpage>90</fpage>
          -
          <lpage>104</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Jøsang</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pope</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marsh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Exploring Different Types of Trust Propagation</article-title>
          .
          <source>In: Proceedings of the 4th International Conference on Trust Management (iTrust'06)</source>
          . (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Sullivan</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Scenario stabilization operations</article-title>
          . https://www.usukitacs.com/ sites/default/files/Scenario%20stabilization%
          <fpage>20operations</fpage>
          %
          <fpage>20v2</fpage>
          .
          <string-name>
            <surname>doc</surname>
          </string-name>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. S¸ensoy, M.,
          <string-name>
            <surname>de Mel</surname>
          </string-name>
          , G.,
          <string-name>
            <surname>Vasconcelos</surname>
            ,
            <given-names>W.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
            ,
            <given-names>T.J.:</given-names>
          </string-name>
          <article-title>Ontological logic programming</article-title>
          .
          <source>In: Proceedings of the International Conference on Web Intelligence</source>
          , Mining and Semantics - WIMS '
          <fpage>11</fpage>
          , New York, New York, USA, ACM Press (May
          <year>2011</year>
          )
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. S¸ensoy,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Vasconcelos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.W.</given-names>
            ,
            <surname>Norman</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.J.:</surname>
          </string-name>
          <article-title>Combining Semantic Web and Logic Programming for Agent Reasoning</article-title>
          . In Dechesne, F.,
          <string-name>
            <surname>Hattori</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mors</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Such</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weyns</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dignum</surname>
          </string-name>
          , F., eds.:
          <source>Advanced Agent Technology. Volume 7068 of Lecture Notes in Computer Science</source>
          . Springer Berlin Heidelberg (
          <year>2012</year>
          )
          <fpage>428</fpage>
          -
          <lpage>441</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Dempster</surname>
            ,
            <given-names>A.P.:</given-names>
          </string-name>
          <article-title>A Generalization of Bayesian Inference</article-title>
          .
          <source>Journal of the Royal Statistical Society. Series B (Methodological)</source>
          <volume>30</volume>
          (
          <issue>2</issue>
          ) (
          <year>1968</year>
          ) pp.
          <fpage>205</fpage>
          -
          <lpage>247</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Shafer</surname>
          </string-name>
          , G.:
          <source>A Mathematical Theory of Evidence</source>
          . Princeton University Press (
          <year>1976</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Terminological Cycles in a Description Logic with Existential Restrictions</article-title>
          . In Gottlob, G.,
          <string-name>
            <surname>Walsh</surname>
          </string-name>
          , T., eds.: IJCAI, Morgan Kaufmann (
          <year>2003</year>
          )
          <fpage>325</fpage>
          -
          <lpage>330</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Ren</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Towards Soundness Preserving Approximation for ABox Reasoning of OWL2</article-title>
          . In Haarslev, V.,
          <string-name>
            <surname>Toman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weddell</surname>
          </string-name>
          , G.E., eds.
          <source>: Proceedings of the 23rd International Workshop on Description Logics (DL</source>
          <year>2010</year>
          ), Waterloo, Ontario, Canada, May 4-
          <issue>7</issue>
          ,
          <year>2010</year>
          2010), Waterloo, Ontario, Canada, May 4-
          <issue>7</issue>
          ,
          <year>2010</year>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Ren</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Soundness Preserving Approximation for TBox Reasoning</article-title>
          . In Fox,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Poole</surname>
          </string-name>
          , D., eds.
          <source>: Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence</source>
          ,
          <source>AAAI</source>
          <year>2010</year>
          , Atlanta, Georgia, USA, July
          <volume>11</volume>
          -
          <issue>15</issue>
          ,
          <year>2010</year>
          . (
          <year>2010</year>
          )
          <fpage>351</fpage>
          -
          <lpage>356</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Mitra</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wiederhold</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kersten</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A Graph-Oriented Model for Articulation of Ontology Interdependencies</article-title>
          . In Zaniolo,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Lockemann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Scholl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Grust</surname>
          </string-name>
          , T., eds.
          <source>: Advances in Database Technology EDBT 2000. Volume 1777 of Lecture Notes in Computer Science</source>
          . Springer Berlin Heidelberg (
          <year>2000</year>
          )
          <fpage>86</fpage>
          -
          <lpage>100</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Pipes</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cerutti</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chakraborty</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gibson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
            ,
            <given-names>T.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oren</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srivastava</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Architecture Options for Realization of Inference Management in Information Fabric</article-title>
          . https://www.usukitacs.com/node/2633 (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Bisdikian</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cerutti</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oren</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          :
          <source>Reasoning about the Impacts of Information Sharing. Information Systems Frontiers Journal, under submission</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Duan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fokoue</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srinivas</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>One Size Does Not Fit All: Customizing Ontology Alignment Using User Feedback</article-title>
          .
          <source>In: The Semantic Web ISWC</source>
          <year>2010</year>
          .
          <article-title>(</article-title>
          <year>2010</year>
          )
          <fpage>177</fpage>
          -
          <lpage>192</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Mitra</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Noy</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jaiswal</surname>
            ,
            <given-names>A.R.</given-names>
          </string-name>
          :
          <article-title>Ontology mapping discovery with uncertainty</article-title>
          .
          <source>In: Proc. 4th International Semantic Web Conference (ISWC)</source>
          . Volume
          <volume>3729</volume>
          . (
          <year>2005</year>
          )
          <fpage>537</fpage>
          -
          <lpage>547</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Albagli</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ben-</surname>
            Eliyahu-Zohary,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shimony</surname>
            ,
            <given-names>S.E.</given-names>
          </string-name>
          :
          <article-title>Markov network based ontology matching</article-title>
          .
          <source>Journal of Computer and System Sciences</source>
          <volume>78</volume>
          (
          <issue>1</issue>
          ) (
          <year>2012</year>
          )
          <fpage>105</fpage>
          -
          <lpage>118</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Blasch</surname>
            ,
            <given-names>E.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dorion</surname>
            ,
            <given-names>E</given-names>
          </string-name>
          ´.,
          <string-name>
            <surname>Valin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , Bosse´, E.:
          <article-title>Ontology alignment using relative entropy for semantic uncertainty analysis</article-title>
          .
          <source>In: Aerospace and Electronics Conference (NAECON)</source>
          ,
          <source>Proceedings of the IEEE 2010 National, IEEE</source>
          (
          <year>2010</year>
          )
          <fpage>140</fpage>
          -
          <lpage>148</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Gal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Managing uncertainty in schema matching with top-k schema mappings</article-title>
          .
          <source>In: Journal on Data Semantics VI</source>
          . Springer (
          <year>2006</year>
          )
          <fpage>90</fpage>
          -
          <lpage>114</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Nagy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vargas-Vera</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motta</surname>
          </string-name>
          , E.:
          <article-title>Dssim-managing uncertainty on the semantic web</article-title>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Trojahn</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Quaresma</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vieira</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>An extended value-based argumentation framework for ontology mapping with confidence degrees</article-title>
          .
          <source>In: Argumentation in Multi-Agent Systems</source>
          . Springer (
          <year>2008</year>
          )
          <fpage>132</fpage>
          -
          <lpage>144</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Konev</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walther</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Forgetting and uniform interpolation in large-scale description logic terminologies</article-title>
          .
          <source>In: 21st International Joint Conference on Artificial Intelligence</source>
          , Morgan Kaufmann Publishers Inc. (
          <year>July 2009</year>
          )
          <fpage>830</fpage>
          -
          <lpage>835</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Koopmann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmidt</surname>
          </string-name>
          , R.:
          <article-title>Forgetting Concept and Role Symbols in ALCH-Ontologies</article-title>
          . In
          <string-name>
            <surname>McMillan</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Middeldorp</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voronkov</surname>
          </string-name>
          , A., eds.: Logic for Programming,
          <source>Artificial Intelligence, and Reasoning</source>
          . Volume
          <volume>8312</volume>
          of Lecture Notes in Computer Science. Springer Berlin Heidelberg (
          <year>2013</year>
          )
          <fpage>552</fpage>
          -
          <lpage>567</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Topor</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antoniou</surname>
          </string-name>
          , G.:
          <article-title>Concept and Role Forgetting in ALC Ontologies</article-title>
          . In
          <string-name>
            <surname>Bernstein</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karger</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heath</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feigenbaum</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maynard</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motta</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thirunarayan</surname>
          </string-name>
          , K., eds.:
          <source>The Semantic Web - ISWC 2009. Volume 5823 of Lecture Notes in Computer Science</source>
          . Springer Berlin Heidelberg (
          <year>2009</year>
          )
          <fpage>666</fpage>
          -
          <lpage>681</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Heuer</surname>
          </string-name>
          , R.:
          <article-title>Psychology of intelligence analysis</article-title>
          .
          <source>US Government Printing Office</source>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>