-
Graph Theory for Consent Management: A New Approach for Complex Data Flows
Authors:
Dorota Filipczuk,
Enrico H. Gerding,
George Konstantinidis
Abstract:
Through legislation and technical advances users gain more control over how their data is processed, and they expect online services to respect their privacy choices and preferences. However, data may be processed for many different purposes by several layers of algorithms that create complex data workflows. To date, there is no existing approach to automatically satisfy fine-grained privacy const…
▽ More
Through legislation and technical advances users gain more control over how their data is processed, and they expect online services to respect their privacy choices and preferences. However, data may be processed for many different purposes by several layers of algorithms that create complex data workflows. To date, there is no existing approach to automatically satisfy fine-grained privacy constraints of a user in a way which optimises the service provider's gains from processing. In this article, we propose a solution to this problem by modelling a data flow as a graph. User constraints and processing purposes are pairs of vertices which need to be disconnected in this graph. In general, this problem is NP-hard, thus, we propose several heuristics and algorithms. We discuss the optimality versus efficiency of our algorithms and evaluate them using synthetically generated data. On the practical side, our algorithms can provide nearly optimal solutions for tens of constraints and graphs of thousands of nodes, in a few seconds.
△ Less
Submitted 17 March, 2024;
originally announced March 2024.
-
A Review of SHACL: From Data Validation to Schema Reasoning for RDF Graphs
Authors:
Paolo Pareti,
George Konstantinidis
Abstract:
We present an introduction and a review of the Shapes Constraint Language (SHACL), the W3C recommendation language for validating RDF data. A SHACL document describes a set of constraints on RDF nodes, and a graph is valid with respect to the document if its nodes satisfy these constraints. We revisit the basic concepts of the language, its constructs and components and their interaction. We revie…
▽ More
We present an introduction and a review of the Shapes Constraint Language (SHACL), the W3C recommendation language for validating RDF data. A SHACL document describes a set of constraints on RDF nodes, and a graph is valid with respect to the document if its nodes satisfy these constraints. We revisit the basic concepts of the language, its constructs and components and their interaction. We review the different formal frameworks used to study this language and the different semantics proposed. We examine a number of related problems, from containment and satisfiability to the interaction of SHACL with inference rules, and exhibit how different modellings of the language are useful for different problems. We also cover practical aspects of SHACL, discussing its implementations and state of adoption, to present a holistic review useful to practitioners and theoreticians alike.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
Satisfiability and Containment of Recursive SHACL
Authors:
Paolo Pareti,
George Konstantinidis,
Fabio Mogavero
Abstract:
The Shapes Constraint Language (SHACL) is the recent W3C recommendation language for validating RDF data, by verifying certain shapes on graphs. Previous work has largely focused on the validation problem and the standard decision problems of satisfiability and containment, crucial for design and optimisation purposes, have only been investigated for simplified versions of SHACL. Moreover, the SHA…
▽ More
The Shapes Constraint Language (SHACL) is the recent W3C recommendation language for validating RDF data, by verifying certain shapes on graphs. Previous work has largely focused on the validation problem and the standard decision problems of satisfiability and containment, crucial for design and optimisation purposes, have only been investigated for simplified versions of SHACL. Moreover, the SHACL specification does not define the semantics of recursively-defined constraints, which led to several alternative recursive semantics being proposed in the literature. The interaction between these different semantics and important decision problems has not been investigated yet. In this article we provide a comprehensive study of the different features of SHACL, by providing a translation to a new first-order language, called SCL, that precisely captures the semantics of SHACL. We also present MSCL, a second-order extension of SCL, which allows us to define, in a single formal logic framework, the main recursive semantics of SHACL. Within this language we also provide an effective treatment of filter constraints which are often neglected in the related literature. Using this logic we provide a detailed map of (un)decidability and complexity results for the satisfiability and containment decision problems for different SHACL fragments. Notably, we prove that both problems are undecidable for the full language, but we present decidable combinations of interesting features, even in the face of recursion.
△ Less
Submitted 14 June, 2022; v1 submitted 30 August, 2021;
originally announced August 2021.
-
SHACL Satisfiability and Containment (Extended Paper)
Authors:
Paolo Pareti,
George Konstantinidis,
Fabio Mogavero,
Timothy J. Norman
Abstract:
The Shapes Constraint Language (SHACL) is a recent W3C recommendation language for validating RDF data. Specifically, SHACL documents are collections of constraints that enforce particular shapes on an RDF graph. Previous work on the topic has provided theoretical and practical results for the validation problem, but did not consider the standard decision problems of satisfiability and containment…
▽ More
The Shapes Constraint Language (SHACL) is a recent W3C recommendation language for validating RDF data. Specifically, SHACL documents are collections of constraints that enforce particular shapes on an RDF graph. Previous work on the topic has provided theoretical and practical results for the validation problem, but did not consider the standard decision problems of satisfiability and containment, which are crucial for verifying the feasibility of the constraints and important for design and optimization purposes. In this paper, we undertake a thorough study of different features of non-recursive SHACL by providing a translation to a new first-order language, called SCL, that precisely captures the semantics of SHACL w.r.t. satisfiability and containment. We study the interaction of SHACL features in this logic and provide the detailed map of decidability and complexity results of the aforementioned decision problems for different SHACL sublanguages. Notably, we prove that both problems are undecidable for the full language, but we present decidable combinations of interesting features.
△ Less
Submitted 5 November, 2020; v1 submitted 31 August, 2020;
originally announced September 2020.
-
Some Game Theoretic Remarks on Two-Player Generalized Cops and Robbers Games
Authors:
Athanasios Kehagias,
Georgios Konstantinidis
Abstract:
In this paper we study the two-player generalized Cops and Robber (GCR) games introduced by Bonato and MacGillivray. Our main goal is to present a full, self-contained game theoretic analysis of such games.
In this paper we study the two-player generalized Cops and Robber (GCR) games introduced by Bonato and MacGillivray. Our main goal is to present a full, self-contained game theoretic analysis of such games.
△ Less
Submitted 19 November, 2020; v1 submitted 29 July, 2020;
originally announced July 2020.
-
A Policy Editor for Semantic Sensor Networks
Authors:
Paolo Pareti,
George Konstantinidis,
Timothy J. Norman
Abstract:
An important use of sensors and actuator networks is to comply with health and safety policies in hazardous environments. In order to deal with increasingly large and dynamic environments, and to quickly react to emergencies, tools are needed to simplify the process of translating high-level policies into executable queries and rules. We present a framework to produce such tools, which uses rules…
▽ More
An important use of sensors and actuator networks is to comply with health and safety policies in hazardous environments. In order to deal with increasingly large and dynamic environments, and to quickly react to emergencies, tools are needed to simplify the process of translating high-level policies into executable queries and rules. We present a framework to produce such tools, which uses rules to aggregate low-level sensor data, described using the Semantic Sensor Network Ontology, into more useful and actionable abstractions. Using the schema of the underlying data sources as an input, we automatically generate abstractions which are relevant to the use case at hand. In this demonstration we present a policy editor tool and a simulation on which policies can be tested.
△ Less
Submitted 15 November, 2019;
originally announced November 2019.
-
SHACL Constraints with Inference Rules
Authors:
Paolo Pareti,
George Konstantinidis,
Timothy J. Norman,
Murat Şensoy
Abstract:
The Shapes Constraint Language (SHACL) has been recently introduced as a W3C recommendation to define constraints that can be validated against RDF graphs. Interactions of SHACL with other Semantic Web technologies, such as ontologies or reasoners, is a matter of ongoing research. In this paper we study the interaction of a subset of SHACL with inference rules expressed in datalog. On the one hand…
▽ More
The Shapes Constraint Language (SHACL) has been recently introduced as a W3C recommendation to define constraints that can be validated against RDF graphs. Interactions of SHACL with other Semantic Web technologies, such as ontologies or reasoners, is a matter of ongoing research. In this paper we study the interaction of a subset of SHACL with inference rules expressed in datalog. On the one hand, SHACL constraints can be used to define a "schema" for graph datasets. On the other hand, inference rules can lead to the discovery of new facts that do not match the original schema. Given a set of SHACL constraints and a set of datalog rules, we present a method to detect which constraints could be violated by the application of the inference rules on some graph instance of the schema, and update the original schema, i.e, the set of SHACL constraints, in order to capture the new facts that can be inferred. We provide theoretical and experimental results of the various components of our approach.
△ Less
Submitted 1 November, 2019;
originally announced November 2019.
-
On positionality of trigger strategies Nash Equilibria in SCAR
Authors:
George Konstantinidis,
Athanasios Kehagias
Abstract:
We study the positionality of \emph{trigger strategies} Nash equilibria $\overlineσ$ for the $N$-player SCAR games $Γ_{N}(G|s_{0},γ,\varepsilon)$ (with $N\geq3$). Our study is exhaustive with respect to types of graphs $G$, initial states $s_{0}$ and values of $N,γ,\varepsilon$. We conclude that in the majority of cases, profiles $\overlineσ$ are nonpositional. Whenever $\overlineσ$ are positional…
▽ More
We study the positionality of \emph{trigger strategies} Nash equilibria $\overlineσ$ for the $N$-player SCAR games $Γ_{N}(G|s_{0},γ,\varepsilon)$ (with $N\geq3$). Our study is exhaustive with respect to types of graphs $G$, initial states $s_{0}$ and values of $N,γ,\varepsilon$. We conclude that in the majority of cases, profiles $\overlineσ$ are nonpositional. Whenever $\overlineσ$ are positional a key role is played by paths and the $\varepsilon$, $γ$ values (especially whether $\varepsilon>0$ or not). A crucial concept in our analysis is the \emph{state cop number}, which is first introduced in the current paper.
△ Less
Submitted 25 October, 2019;
originally announced October 2019.
-
Rule Applicability on RDF Triplestore Schemas
Authors:
Paolo Pareti,
George Konstantinidis,
Timothy J. Norman,
Murat Şensoy
Abstract:
Rule-based systems play a critical role in health and safety, where policies created by experts are usually formalised as rules. When dealing with increasingly large and dynamic sources of data, as in the case of Internet of Things (IoT) applications, it becomes important not only to efficiently apply rules, but also to reason about their applicability on datasets confined by a certain schema. In…
▽ More
Rule-based systems play a critical role in health and safety, where policies created by experts are usually formalised as rules. When dealing with increasingly large and dynamic sources of data, as in the case of Internet of Things (IoT) applications, it becomes important not only to efficiently apply rules, but also to reason about their applicability on datasets confined by a certain schema. In this paper we define the notion of a triplestore schema which models a set of RDF graphs. Given a set of rules and such a schema as input we propose a method to determine rule applicability and produce output schemas. Output schemas model the graphs that would be obtained by running the rules on the graph models of the input schema. We present two approaches: one based on computing a canonical (critical) instance of the schema, and a novel approach based on query rewriting. We provide theoretical, complexity and evaluation results that show the superior efficiency of our rewriting approach.
△ Less
Submitted 2 July, 2019;
originally announced July 2019.
-
Dataset search: a survey
Authors:
Adriane Chapman,
Elena Simperl,
Laura Koesten,
George Konstantinidis,
Luis-Daniel Ibáñez-Gonzalez,
Emilia Kacprzak,
Paul Groth
Abstract:
Generating value from data requires the ability to find, access and make sense of datasets. There are many efforts underway to encourage data sharing and reuse, from scientific publishers asking authors to submit data alongside manuscripts to data marketplaces, open data portals and data communities. Google recently beta released a search service for datasets, which allows users to discover data s…
▽ More
Generating value from data requires the ability to find, access and make sense of datasets. There are many efforts underway to encourage data sharing and reuse, from scientific publishers asking authors to submit data alongside manuscripts to data marketplaces, open data portals and data communities. Google recently beta released a search service for datasets, which allows users to discover data stored in various online repositories via keyword queries. These developments foreshadow an emerging research field around dataset search or retrieval that broadly encompasses frameworks, methods and tools that help match a user data need against a collection of datasets. Here, we survey the state of the art of research and commercial systems in dataset retrieval. We identify what makes dataset search a research field in its own right, with unique challenges and methods and highlight open problems. We look at approaches and implementations from related areas dataset search is drawing upon, including information retrieval, databases, entity-centric and tabular search in order to identify possible paths to resolve these open problems as well as immediate next steps that will take the field forward.
△ Less
Submitted 3 January, 2019;
originally announced January 2019.
-
The Bag Semantics of Ontology-Based Data Access
Authors:
Charalampos Nikolaou,
Egor V. Kostylev,
George Konstantinidis,
Mark Kaminski,
Bernardo Cuenca Grau,
Ian Horrocks
Abstract:
Ontology-based data access (OBDA) is a popular approach for integrating and querying multiple data sources by means of a shared ontology. The ontology is linked to the sources using mappings, which assign views over the data to ontology predicates. Motivated by the need for OBDA systems supporting database-style aggregate queries, we propose a bag semantics for OBDA, where duplicate tuples in the…
▽ More
Ontology-based data access (OBDA) is a popular approach for integrating and querying multiple data sources by means of a shared ontology. The ontology is linked to the sources using mappings, which assign views over the data to ontology predicates. Motivated by the need for OBDA systems supporting database-style aggregate queries, we propose a bag semantics for OBDA, where duplicate tuples in the views defined by the mappings are retained, as is the case in standard databases. We show that bag semantics makes conjunctive query answering in OBDA coNP-hard in data complexity. To regain tractability, we consider a rather general class of queries and show its rewritability to a generalisation of the relational calculus to bags.
△ Less
Submitted 19 May, 2017;
originally announced May 2017.
-
Selfish Cops and Active Robber: Multi-Player Pursuit Evasion on Graphs
Authors:
G. Konstantinidis,
Ath. Kehagias
Abstract:
We introduce and study the game of "Selfish Cops and Active Robber" (SCAR) which can be seen as an multiplayer variant of the "classic" two-player Cops and Robbers (CR) game. In classic CR all cops are controlled by a single player, who has no preference over which cop captures the robber. In SCAR, on the other hand, each of N-1 cops is controlled by a separate player, and a single robber is contr…
▽ More
We introduce and study the game of "Selfish Cops and Active Robber" (SCAR) which can be seen as an multiplayer variant of the "classic" two-player Cops and Robbers (CR) game. In classic CR all cops are controlled by a single player, who has no preference over which cop captures the robber. In SCAR, on the other hand, each of N-1 cops is controlled by a separate player, and a single robber is controlled by the N-th player; and the capturing cop player receives a higher reward than the non-capturing ones. Consequently, SCAR is an N-player pursuit game on graphs, in which each cop player has an increased motive to be the one who captures the robber. The focus of our study is the existence and properties of SCAR Nash Equilibria (NE). In particular, we prove that SCAR always has one NE in deterministic positional strategies and (for N greater than two) another in deterministic nonpositional strategies. Furthermore, we study conditions which, at equilibrium, guarantee either capture or escape of the robber and show that (because of the antagonism between the "selfish" cop players) the robber may, in certain SCAR configurations, be captured later than he would be in classic CR, or even not captured at all. Finally we define the selfish cop number of a graph and study its connection to the classic cop number.
△ Less
Submitted 12 September, 2018; v1 submitted 22 March, 2017;
originally announced March 2017.
-
Selfish Cops and Passive Robber: Qualitative Games
Authors:
Athanasios Kehagias,
Georgios Konstantinidis
Abstract:
Several variants of the cops and robbers (CR) game have been studied in the past. In this paper we examine a novel variant, which is played between two cops, each one independently trying to catch a "passive robber". We will call this the Selfish Cops and Passive Robber {SCPR} game. In short, SCPR is a stochastic two-player, zero-sum game where the opponents are the two cop players. We study seque…
▽ More
Several variants of the cops and robbers (CR) game have been studied in the past. In this paper we examine a novel variant, which is played between two cops, each one independently trying to catch a "passive robber". We will call this the Selfish Cops and Passive Robber {SCPR} game. In short, SCPR is a stochastic two-player, zero-sum game where the opponents are the two cop players. We study sequential and concurrent versions of the SCPR game. For both cases we prove the existence of value and optimal strategies and present algorithms for the computation of these.
△ Less
Submitted 19 November, 2016; v1 submitted 19 July, 2016;
originally announced July 2016.
-
Simultaneously Moving Cops and Robbers
Authors:
Georgios Konstantinidis,
Athanasios Kehagias
Abstract:
In this paper we study the concurrent cops and robber (CCCR) game. CCCR follows the same rules as the classical, turn-based game, except for the fact that the players move simultaneously. The cops' goal is to capture the robber and the concurrent cop number of a graph is defined the minimum number of cops which guarantees capture. For the variant in which it it required to capture the robber in th…
▽ More
In this paper we study the concurrent cops and robber (CCCR) game. CCCR follows the same rules as the classical, turn-based game, except for the fact that the players move simultaneously. The cops' goal is to capture the robber and the concurrent cop number of a graph is defined the minimum number of cops which guarantees capture. For the variant in which it it required to capture the robber in the shortest possible time, we let time to capture be the payoff function of CCCR; the (game theoretic) value of CCCR is the optimal capture time and (cop and robber) time optimal strategies are the ones which achieve the value. In this paper we prove the following.
(1) For every graph G, the concurrent cop number is equal to the "classical" cop number.
(2) For every graph G, CCCR has a value, the cops have an optimal strategy and, for every epsilon>0, the robber has an epsilon-optimal strategy.
△ Less
Submitted 11 June, 2015;
originally announced June 2015.
-
Cops and Robbers, Game Theory and Zermelo's Early Results
Authors:
Athanasios Kehagias,
Georgios Konstantinidis
Abstract:
We provide a game theoretic framework for the game of cops and robbers (CR). Within this framework we study certain assumptions which underlie the concepts of optimal strategies and capture time. We also point out a connection of these concepts to early work by Zermelo and D. Konig. Finally, we discuss the relationship between CR and related pursuit games to reachability games.
We provide a game theoretic framework for the game of cops and robbers (CR). Within this framework we study certain assumptions which underlie the concepts of optimal strategies and capture time. We also point out a connection of these concepts to early work by Zermelo and D. Konig. Finally, we discuss the relationship between CR and related pursuit games to reachability games.
△ Less
Submitted 7 July, 2014;
originally announced July 2014.