Policy-compliant data
processing: RDF-based
restrictions for data-protection
Sven Lieber, supervised by Anastasia Dimou and Ruben Verborgh
ISWC 2019, Doctoral Consortium in Auckland
2
Policy (App specific)
Religion
Email
Person
Sensitive
1
hasEmail maxCount
Birthday
Personal
Violation if personal data used
without informed consent
Closed world constraints on data
“Simple” modeling example: Person
Consent
1
hasEmail maxCount 3
3
Ontologies are carefully designed and a lot of design
decisions need to be made
Ontologies are the result of a carefully executed process
4
Ontology or
any knowledge
representation in RDF
Ontology Engineering process
Existing
ontologies
Needs and
Requirement
s
Concepts,
Relationships,
Restrictions
Currently unclear how needs and requirements are
addressed by expressed restrictions
5
Ontology
Ontology Engineering processNeeds and
Requirement
s
Constraints
Unknown how restrictions are used in existing ontologies
6
OntologyOntology Engineering process
Existing
ontologies
Needs and
Requirement
s
Concepts,
Relationships,
Restrictions
Relevancy
7
Different use cases and level of formality
Ontology with less and with more restrictions
Annotation
e.g. schema.org
Reasoning
e.g. pizza ontology
My research is relevant regarding the modeling of
constraints when developing ontologies
8
Ontology with axioms
RDFS, OWL
Constraints on ontology concepts’
Instance data
SHACL, ShEx
Restriction modeling in RDF as axioms, constraints or as
part of policies is relevant to compliance checking
9
Privacy-aware data processing
Compliance assessments to address this recognized need
Approach overview
10
Ontology
Ontology Engineering process
Existing
ontologies
Needs and
Requirement
s
Constraints
Concepts,
Relationships,
Restrictions
1) Inform
2) Compare existing activities
and propose new activities
3) Apply on privacy use case
Related work: Restrictions can be modeled in a lot of
different ways, but currently no guidelines when to use what
11
Existing
ontologies
Concepts,
Relationships,
Restrictions
Closed world constraints (SHACL, ShEx)
Open world axioms (OWL, RDFS)
Restriction types in data quality
12
Existing
ontologies
Concepts,
Relationships,
Restrictions
How can we measure ontologies’ restriction use in
a complete way?
We can measure restriction use by obtaining
statistics regarding restriction types and
their different expressions.
Research to understand the use of restrictions in RDF-
based vocabularies
13
Existing
ontologies
Concepts,
Relationships,
Restrictions
Create statistics about the use of restriction types
and expressions of ontologies from common
ontology repositories
Verify completeness of restriction type statistics
by comparison with ground truth
We want to create a statistical dataset about
restriction use and evaluate its completeness
Preliminary Results indicate different use of
Restrictions and implicit modeling patterns
14
Existing
ontologies
Concepts,
Relationships,
Restrictions
Restriction use analysis of LOV and BioPortal
MontoloStats -
Ontology Modeling Statistics
https://w3id.org/montolo
Different restriction types
Second part of PhD covers the engineering process
15
OntologyOntology Engineering process
Existing
ontologies
Needs and
Requirement
s
Concepts,
Relationships,
Restrictions
✓
16
Ontology Engineering processNeeds and
Requirement
s
Related work: Ontology Engineering methodologies and
Ontology Design patterns, but unclear how restriction
modeling is supported
Ontology
Constraints
17
How can we support users in restriction modeling
involving axioms and constraints?
We can define a restriction modeling activity which provides
more support to model restrictions compared to existing activities.
Extend existing ontology engineering
activities to support restriction modeling
Ontology Constraints
18
How applicable is our restriction modeling
activity in a privacy use case?
Automatic privacy compliance checks by supporting the
knowledge engineer in the creation of concepts, axioms,
constraints and policies.
Apply restriction modeling activity in privacy use case to
support users in compliance assessments
Our approach to addressing the research
19
Define an Ontology Engineering activity to model
restrictions based on existing best practices
Apply activity in a different use cases
Ontology
Ontology Engineering processNeeds and
Requirement
s
Constraints
User evaluations and case studies to evaluate our approach
20
Constraints
User evaluations comparing restriction modeling
activity with state-of-the-art activities
Perform a case study
in the privacy domain
Ontology
Ontology Engineering processNeeds and
Requirement
s
Preliminary Results cover proof-of-concepts
regarding privacy-related annotations and
a review of ontology engineering literature
21
Ontology Engineering processNeeds and
Requirement
s
Ontology
Complement open world axioms with closed world
constraints when systematically building knowledge
Compliance assessments of privacy-aware data
processing currently either axioms or constraints
Sven Lieber
PhD researcher semantic intelligence
E Sven.Lieber@ugent.be
T +32 9 331 49 59
https://sven-lieber.org
@SvenLieber
Interested in
- Ontology Engineering?
- Shapes?
- Privacy?
Come and talk to me!

More Related Content

PPTX
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
PPTX
Software Engineering Ontology and Software Testing
PDF
Coreon - Making Sure IoT Devices Understand Each Other!
PDF
AS_industrialNew
PPTX
Software engineering ontology and software testing
PPT
Intrallect March09
PDF
Data and Knowledge as Commodities
PPT
Semi-automated metadata extraction in the long-term
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Software Engineering Ontology and Software Testing
Coreon - Making Sure IoT Devices Understand Each Other!
AS_industrialNew
Software engineering ontology and software testing
Intrallect March09
Data and Knowledge as Commodities
Semi-automated metadata extraction in the long-term

Similar to Policy-compliant data processing: RDF-based restrictions for data-protection (20)

PPTX
MontoloStats - Ontology Modeling Statistics
PDF
Elder Abuse Research
PDF
Extreme-scale Identity Management for Scientific Collaborations
PDF
The Revolution Of Cloud Computing
PDF
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
PPT
Mind the Gap: Reflections on Data Policies and Practice
PDF
2015-11-11 research seminar
PPTX
Privacy-driven design of Learning Analytics applications – exploring the desi...
PPTX
Scaling up learning analytics solutions: Is privacy a show-stopper?
PDF
Linking Heterogeneous Scholarly Data Sources in an Interoperable Setting: the...
PDF
IRJET - Deep Collaborrative Filtering with Aspect Information
PDF
Griffiths lace workshop-eden-2016
PDF
Efficient Way to Identify User Aware Rare Sequential Patterns in Document Str...
PPTX
A Reuse-based Lightweight Method for Developing Linked Data Ontologies and Vo...
PDF
A Grounded Theory of the Requirements Engineering Process
PDF
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
PDF
A Grounded Theory of the Requirements Engineering Process
PDF
Paper Title : A Grounded Theory of the Requirements Engineering Process
PPTX
Ontology Engineering for Big Data
MontoloStats - Ontology Modeling Statistics
Elder Abuse Research
Extreme-scale Identity Management for Scientific Collaborations
The Revolution Of Cloud Computing
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
Mind the Gap: Reflections on Data Policies and Practice
2015-11-11 research seminar
Privacy-driven design of Learning Analytics applications – exploring the desi...
Scaling up learning analytics solutions: Is privacy a show-stopper?
Linking Heterogeneous Scholarly Data Sources in an Interoperable Setting: the...
IRJET - Deep Collaborrative Filtering with Aspect Information
Griffiths lace workshop-eden-2016
Efficient Way to Identify User Aware Rare Sequential Patterns in Document Str...
A Reuse-based Lightweight Method for Developing Linked Data Ontologies and Vo...
A Grounded Theory of the Requirements Engineering Process
A GROUNDED THEORY OF THE REQUIREMENTS ENGINEERING PROCESS
A Grounded Theory of the Requirements Engineering Process
Paper Title : A Grounded Theory of the Requirements Engineering Process
Ontology Engineering for Big Data
Ad

More from Sven Lieber (6)

PPTX
Assessing, Creating and Using Knowledge Graph Restrictions
PPTX
Harvesting Social Media (in BESOCIAL)
PPTX
BESOCIAL A Knowledge Graph for Social Media Archiving
PDF
Statistics about Data Shape Use in RDF Data
PDF
Poster Doctoral Consortium Model RDF-based restrictions
PPTX
Linked Data Generation for Adaptive Learning Analytics Systems
Assessing, Creating and Using Knowledge Graph Restrictions
Harvesting Social Media (in BESOCIAL)
BESOCIAL A Knowledge Graph for Social Media Archiving
Statistics about Data Shape Use in RDF Data
Poster Doctoral Consortium Model RDF-based restrictions
Linked Data Generation for Adaptive Learning Analytics Systems
Ad

Recently uploaded (20)

PPTX
ai agent creaction with langgraph_presentation_
PDF
CS3352FOUNDATION OF DATA SCIENCE _1_MAterial.pdf
PPTX
MBA JAPAN: 2025 the University of Waseda
PPTX
chrmotography.pptx food anaylysis techni
PPT
statistics analysis - topic 3 - describing data visually
PPT
statistic analysis for study - data collection
PDF
A biomechanical Functional analysis of the masitary muscles in man
PDF
Global Data and Analytics Market Outlook Report
PPTX
eGramSWARAJ-PPT Training Module for beginners
PPTX
CYBER SECURITY the Next Warefare Tactics
PPTX
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
PPTX
CHAPTER-2-THE-ACCOUNTING-PROCESS-2-4.pptx
PDF
Best Data Science Professional Certificates in the USA | IABAC
PDF
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
PDF
Session 11 - Data Visualization Storytelling (2).pdf
PPTX
Lesson-01intheselfoflifeofthekennyrogersoftheunderstandoftheunderstanded
PPTX
1 hour to get there before the game is done so you don’t need a car seat for ...
PDF
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
PPTX
New ISO 27001_2022 standard and the changes
PPTX
Crypto_Trading_Beginners.pptxxxxxxxxxxxxxx
ai agent creaction with langgraph_presentation_
CS3352FOUNDATION OF DATA SCIENCE _1_MAterial.pdf
MBA JAPAN: 2025 the University of Waseda
chrmotography.pptx food anaylysis techni
statistics analysis - topic 3 - describing data visually
statistic analysis for study - data collection
A biomechanical Functional analysis of the masitary muscles in man
Global Data and Analytics Market Outlook Report
eGramSWARAJ-PPT Training Module for beginners
CYBER SECURITY the Next Warefare Tactics
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
CHAPTER-2-THE-ACCOUNTING-PROCESS-2-4.pptx
Best Data Science Professional Certificates in the USA | IABAC
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
Session 11 - Data Visualization Storytelling (2).pdf
Lesson-01intheselfoflifeofthekennyrogersoftheunderstandoftheunderstanded
1 hour to get there before the game is done so you don’t need a car seat for ...
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
New ISO 27001_2022 standard and the changes
Crypto_Trading_Beginners.pptxxxxxxxxxxxxxx

Policy-compliant data processing: RDF-based restrictions for data-protection

  • 1. Policy-compliant data processing: RDF-based restrictions for data-protection Sven Lieber, supervised by Anastasia Dimou and Ruben Verborgh ISWC 2019, Doctoral Consortium in Auckland
  • 2. 2 Policy (App specific) Religion Email Person Sensitive 1 hasEmail maxCount Birthday Personal Violation if personal data used without informed consent Closed world constraints on data “Simple” modeling example: Person Consent 1 hasEmail maxCount 3
  • 3. 3 Ontologies are carefully designed and a lot of design decisions need to be made
  • 4. Ontologies are the result of a carefully executed process 4 Ontology or any knowledge representation in RDF Ontology Engineering process Existing ontologies Needs and Requirement s Concepts, Relationships, Restrictions
  • 5. Currently unclear how needs and requirements are addressed by expressed restrictions 5 Ontology Ontology Engineering processNeeds and Requirement s Constraints
  • 6. Unknown how restrictions are used in existing ontologies 6 OntologyOntology Engineering process Existing ontologies Needs and Requirement s Concepts, Relationships, Restrictions
  • 7. Relevancy 7 Different use cases and level of formality Ontology with less and with more restrictions Annotation e.g. schema.org Reasoning e.g. pizza ontology
  • 8. My research is relevant regarding the modeling of constraints when developing ontologies 8 Ontology with axioms RDFS, OWL Constraints on ontology concepts’ Instance data SHACL, ShEx
  • 9. Restriction modeling in RDF as axioms, constraints or as part of policies is relevant to compliance checking 9 Privacy-aware data processing Compliance assessments to address this recognized need
  • 10. Approach overview 10 Ontology Ontology Engineering process Existing ontologies Needs and Requirement s Constraints Concepts, Relationships, Restrictions 1) Inform 2) Compare existing activities and propose new activities 3) Apply on privacy use case
  • 11. Related work: Restrictions can be modeled in a lot of different ways, but currently no guidelines when to use what 11 Existing ontologies Concepts, Relationships, Restrictions Closed world constraints (SHACL, ShEx) Open world axioms (OWL, RDFS) Restriction types in data quality
  • 12. 12 Existing ontologies Concepts, Relationships, Restrictions How can we measure ontologies’ restriction use in a complete way? We can measure restriction use by obtaining statistics regarding restriction types and their different expressions. Research to understand the use of restrictions in RDF- based vocabularies
  • 13. 13 Existing ontologies Concepts, Relationships, Restrictions Create statistics about the use of restriction types and expressions of ontologies from common ontology repositories Verify completeness of restriction type statistics by comparison with ground truth We want to create a statistical dataset about restriction use and evaluate its completeness
  • 14. Preliminary Results indicate different use of Restrictions and implicit modeling patterns 14 Existing ontologies Concepts, Relationships, Restrictions Restriction use analysis of LOV and BioPortal MontoloStats - Ontology Modeling Statistics https://w3id.org/montolo Different restriction types
  • 15. Second part of PhD covers the engineering process 15 OntologyOntology Engineering process Existing ontologies Needs and Requirement s Concepts, Relationships, Restrictions ✓
  • 16. 16 Ontology Engineering processNeeds and Requirement s Related work: Ontology Engineering methodologies and Ontology Design patterns, but unclear how restriction modeling is supported Ontology Constraints
  • 17. 17 How can we support users in restriction modeling involving axioms and constraints? We can define a restriction modeling activity which provides more support to model restrictions compared to existing activities. Extend existing ontology engineering activities to support restriction modeling Ontology Constraints
  • 18. 18 How applicable is our restriction modeling activity in a privacy use case? Automatic privacy compliance checks by supporting the knowledge engineer in the creation of concepts, axioms, constraints and policies. Apply restriction modeling activity in privacy use case to support users in compliance assessments
  • 19. Our approach to addressing the research 19 Define an Ontology Engineering activity to model restrictions based on existing best practices Apply activity in a different use cases Ontology Ontology Engineering processNeeds and Requirement s Constraints
  • 20. User evaluations and case studies to evaluate our approach 20 Constraints User evaluations comparing restriction modeling activity with state-of-the-art activities Perform a case study in the privacy domain Ontology Ontology Engineering processNeeds and Requirement s
  • 21. Preliminary Results cover proof-of-concepts regarding privacy-related annotations and a review of ontology engineering literature 21 Ontology Engineering processNeeds and Requirement s Ontology
  • 22. Complement open world axioms with closed world constraints when systematically building knowledge Compliance assessments of privacy-aware data processing currently either axioms or constraints
  • 23. Sven Lieber PhD researcher semantic intelligence E Sven.Lieber@ugent.be T +32 9 331 49 59 https://sven-lieber.org @SvenLieber Interested in - Ontology Engineering? - Shapes? - Privacy? Come and talk to me!