{"title":"Possibilities to Encrypt an RDF-Graph","authors":"Sabrina Gerbracht","doi":"10.1109/ICTTA.2008.4530288","DOIUrl":null,"url":null,"abstract":"In this paper different approaches on achieving privacy protection in RDF graphs are discussed. Mainly this means encryption of elements and subgraphs of an RDF graph. Existing solutions have the disadvantage, that along 'with the encryption many new statements have to be generated, 'what results in a rapidly growing graph. By combining different approaches, these disadvantages can be eliminated. The result 'will be an elegant possibility to encrypt parts of an RDF graph, 'without increasing the 'whole RDF graph unnecessarily.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTTA.2008.4530288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
In this paper different approaches on achieving privacy protection in RDF graphs are discussed. Mainly this means encryption of elements and subgraphs of an RDF graph. Existing solutions have the disadvantage, that along 'with the encryption many new statements have to be generated, 'what results in a rapidly growing graph. By combining different approaches, these disadvantages can be eliminated. The result 'will be an elegant possibility to encrypt parts of an RDF graph, 'without increasing the 'whole RDF graph unnecessarily.