UMBC ebiquity

Results for tags: policy

Projects

Past Projects

 IDE for Rei Policy Language.
 Policy-based Automated WAN Configuration and Management.
 RAP: RDF Access-control Policiies.
 Rei : A Policy Specification Language.
 Securing the Semantic Web: A Trust Management Approach.


 
 
Publications

36 Refereed Publications

2016

1. "Preserving User Privacy and Security in Context-Aware Mobile Platforms", Mobile Application Development, Usability, and Security, October 2016, 82 downloads.

2013

2. "Energy efficient sensing for managing context and privacy on smartphones", First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 523 downloads.

2012

3. "A Collaborative Approach to Situational Awareness for CyberSecurity", 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 965 downloads.

4. "A Policy-based Approach to Smart Cloud Services", Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 968 downloads.

5. "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 752 downloads.

2011

6. "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1030 downloads.

7. "Privacy Preservation in Context Aware Systems", , May 2011, 868 downloads.

8. "Enforcing security in semantics driven policy based networks", Computer Standards and Interfaces, January 2011, 820 downloads, 1 citation.

2010

9. "Enforcing Secure and Robust Routing with Declarative Policies ", Proceedings of the 2010 Military Communications Conference, October 2010, 1079 downloads, 1 citation.

10. "A Declarative Approach for Secure and Robust Routing", Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 1172 downloads.

11. "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 2986 downloads, 6 citations.

12. "Policy Driven Negotiations for Managing Virtualized Services on the Cloud", Proceedings of 19th Annual Frontiers in Service Conference, Sweden, June 2010, June 2010, 645 downloads.

2009

13. "Towards a Declarative Framework For Managing Application and Network Adaptations", IEEE GlobeCom, December 2009, 1190 downloads.

14. "Policy-based Malicious Peer Detection in Ad Hoc Networks ", Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 1681 downloads, 4 citations.

2008

15. "Security Policies and Trust in Ubiquitous Computing", Philosophical Transactions of the Royal Society A, October 2008, 1943 downloads, 1 citation.

16. "ROWLBAC - Representing Role Based Access Control in OWL", Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 5962 downloads, 61 citations.

17. "Utilizing semantic policies for managing BGP route dissemination", Automated Network Management (INFOCOM workshops), April 2008, 926 downloads.

2007

18. "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", , November 2007, 1575 downloads.

19. "Modeling Conversation Policies using Permissions and Obligations", Journal of Autonomous Agents and Multi-Agent Systems, April 2007, 2031 downloads.

20. "Policy-Based Access Control for an RDF Store", Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 6051 downloads, 34 citations.

2006

21. " Proceedings of the Second Semantic Web Policy Workshop", CEUR, November 2006, 2518 downloads.

22. "Policy Management of Enterprise Systems: A Requirements Study", Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, June 2006, 4591 downloads, 4 citations.

23. "Security and Privacy Challenges in Open and Dynamic Environments ", Computer, June 2006, 2237 downloads.

2005

24. "Proceedings of the Semantic Web and Policy Workshop", , November 2005, 3768 downloads.

25. "Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments ", Proceedings of the Semantic Web and Policy Workshop, November 2005, 1994 downloads, 29 citations.

26. "Enhancing Web Privacy Protection through Declarative Policies", Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 6345 downloads, 27 citations.

27. "Policy-based Access Control for Task Computing Using Rei ", Proceedings of the Policy Management for the Web Workshop, May 2005, 2328 downloads, 15 citations.

28. "Modeling Communicative Behavior using Permissions and Obligations", Developments in Agent Communication, Eds. Frank Dignum, Rogier van Eijk, Marc-Philippe Huget, January 2005, 2529 downloads, 14 citations.

2004

29. " Authorization and Privacy for Semantic Web Services", IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 1981 downloads, 1 citation.

30. "Authorization and Privacy for Semantic Web Services", First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 7861 downloads, 1 citation.

2003

31. "Security for DAML Web Services: Annotation and Matchmaking", Second International Semantic Web Conference , September 2003, 3464 downloads, 125 citations.

32. "A Policy Based Approach to Security for the Semantic Web", 2nd International Semantic Web Conference (ISWC2003), September 2003, 9999 downloads, 218 citations.

33. "A Policy Language for A Pervasive Computing Environment", IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4160 downloads, 341 citations.

2001

34. "Trust-Based Security in Pervasive Computing Environments", IEEE Computer, December 2001, 7931 downloads, 214 citations.

35. "A Delegation Based Model for Distributed Trust", Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 329 downloads, 69 citations.

36. "A Framework for Distributed Trust Management", Second Workshop on Norms and Institutions in multi-agent systems, June 2001, 2957 downloads, 1 citation.

6 Non-Refereed Publications

2011

1. "Privacy Preservation in Context Aware Geosocial Networking Applications", University of Maryland, Baltimore County, May 2011, 1253 downloads.

2008

2. "Using OWL to Model Role Based Access Control", University of Maryland, Baltimore County, February 2008, 1956 downloads.

2004

3. "Enhancing P3P Framework through Policies and Trust", UMBC Technical Report, TR-CS-04-13, September 2004, 3160 downloads.

4. "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", University of Maryland, Baltimore County, July 2004, 3762 downloads.

2002

5. "Rei : A Policy Language for the Me-Centric Project", HP Labs, September 2002, 3230 downloads.

6. "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", University of Maryland, Baltimore County, August 2002, 4494 downloads, 11 citations.


 
 
Additional Resources

Ontology

1. BGP Network Ontology

Presentation

1. Computational Policies in a Need to Share Environment
2. Computational Policies in a Need to Share Environment
3. Constraining Information Flow in Social Networks with Privacy Policies
4. Context-Aware Privacy Policies in Mobile and Social Computing
5. Framework for Managing the Assured Information Sharing Lifecycle
6. Managing the Assured Information Sharing Lifecycle

Ontology

1. Oblivious Cloud Storage Ontology

Presentation

1. Privacy Preservation in Context Aware Systems
 
 
Events

1. Privacy Preservation in Context-Aware Systems
    on Wednesday, April 27, 2011 from 01:00PM to 02:00PM.

2. A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems
    on Tuesday, March 08, 2011 from 11:00AM to 12:15PM.

3. Reverse Engineering of RBAC Policy using Access Logs
    on Monday, June 15, 2009 from 02:00PM to 03:30PM.

4. Use of Context and Policies in Declarative Networked Systems
    on Tuesday, May 20, 2008 from 03:30PM to 05:30PM.

5. Integrated Development Environment for Policies
    on Monday, March 07, 2005 from 10:00AM to 11:05AM.


 
 

Subscribe to RSS feed

Bookmark this page