Reasoning about Disclosure in Data Integration in the Presence of Source Constraints

Authors: Michael Benedikt, Pierre Bourhis, Louis Jachiet, Michaƫl Thomazo

IJCAI 2019 | Conference PDF | Archive PDF | Plain Text | LLM Run Details

Reproducibility Variable Result LLM Response
Research Type Theoretical We study the problem of determining whether a given data integration system discloses a source query to an attacker in the presence of constraints, providing both lower and upper bounds on source-aware disclosure analysis. ... We will look at a variety of well-studied rule-based formalisms, with the simplest being referential constraints, and the most complex being the frontier-guarded rules [Baget et al., 2011]. While decidability of our disclosure problems will follow from prior work [Benedikt et al., 2016], we will need new tools to analyze the complexity of the problem. ... Both the upper and lower bounds revolve around a complexity analysis for reasoning with guarded existential rules and a restricted class of equality rules, where the rule head compares a variable and a distinguished constant. We believe this exploration of limited equality rules can be productive for other reasoning problems.
Researcher Affiliation Academia 1University of Oxford 2CNRS CRISt AL, Universit e Lille, Inria Lille 3Inria, DI ENS, ENS, CNRS, PSL University
Pseudocode No The paper does not contain any pseudocode or algorithm blocks that are clearly labeled or formatted as such.
Open Source Code No The paper does not provide any explicit statements about releasing source code for the methodology described, nor does it provide a link to a code repository.
Open Datasets No This paper is theoretical and does not conduct empirical studies using datasets, therefore no dataset access information for training is provided.
Dataset Splits No This paper is theoretical and does not involve empirical experiments requiring dataset splits for training, validation, or testing.
Hardware Specification No This paper is theoretical and does not involve empirical experiments, therefore no hardware specifications are mentioned.
Software Dependencies No This paper is theoretical and does not involve empirical experiments, therefore no specific software dependencies with version numbers are mentioned for replication.
Experiment Setup No This paper is theoretical and does not involve empirical experiments, therefore no experimental setup details such as hyperparameters or training configurations are provided.