UMBC ebiquity

Results for tags: policy

Projects

Past Projects

 IDE for Rei Policy Language.
 Policy-based Automated WAN Configuration and Management.
 RAP: RDF Access-control Policiies.
 Rei : A Policy Specification Language.
 Securing the Semantic Web: A Trust Management Approach.


 
 
Publications

36 Refereed Publications

2016

1. "Preserving User Privacy and Security in Context-Aware Mobile Platforms", Mobile Application Development, Usability, and Security, October 2016, 137 downloads.

2013

2. "Energy efficient sensing for managing context and privacy on smartphones", First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 557 downloads.

2012

3. "A Collaborative Approach to Situational Awareness for CyberSecurity", 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 994 downloads.

4. "A Policy-based Approach to Smart Cloud Services", Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 997 downloads.

5. "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 784 downloads.

2011

6. "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1065 downloads.

7. "Privacy Preservation in Context Aware Systems", , May 2011, 892 downloads.

8. "Enforcing security in semantics driven policy based networks", Computer Standards and Interfaces, January 2011, 851 downloads, 1 citation.

2010

9. "Enforcing Secure and Robust Routing with Declarative Policies ", Proceedings of the 2010 Military Communications Conference, October 2010, 1106 downloads, 1 citation.

10. "A Declarative Approach for Secure and Robust Routing", Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 1198 downloads.

11. "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 3064 downloads, 6 citations.

12. "Policy Driven Negotiations for Managing Virtualized Services on the Cloud", Proceedings of 19th Annual Frontiers in Service Conference, Sweden, June 2010, June 2010, 670 downloads.

2009

13. "Towards a Declarative Framework For Managing Application and Network Adaptations", IEEE GlobeCom, December 2009, 1210 downloads.

14. "Policy-based Malicious Peer Detection in Ad Hoc Networks ", Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 1710 downloads, 4 citations.

2008

15. "Security Policies and Trust in Ubiquitous Computing", Philosophical Transactions of the Royal Society A, October 2008, 1977 downloads, 1 citation.

16. "ROWLBAC - Representing Role Based Access Control in OWL", Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 6017 downloads, 61 citations.

17. "Utilizing semantic policies for managing BGP route dissemination", Automated Network Management (INFOCOM workshops), April 2008, 955 downloads.

2007

18. "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", , November 2007, 1593 downloads.

19. "Modeling Conversation Policies using Permissions and Obligations", Journal of Autonomous Agents and Multi-Agent Systems, April 2007, 2056 downloads.

20. "Policy-Based Access Control for an RDF Store", Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 6106 downloads, 34 citations.

2006

21. " Proceedings of the Second Semantic Web Policy Workshop", CEUR, November 2006, 2550 downloads.

22. "Policy Management of Enterprise Systems: A Requirements Study", Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, June 2006, 4631 downloads, 4 citations.

23. "Security and Privacy Challenges in Open and Dynamic Environments ", Computer, June 2006, 2263 downloads.

2005

24. "Proceedings of the Semantic Web and Policy Workshop", , November 2005, 3808 downloads.

25. "Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments ", Proceedings of the Semantic Web and Policy Workshop, November 2005, 2019 downloads, 29 citations.

26. "Enhancing Web Privacy Protection through Declarative Policies", Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 6393 downloads, 27 citations.

27. "Policy-based Access Control for Task Computing Using Rei ", Proceedings of the Policy Management for the Web Workshop, May 2005, 2356 downloads, 15 citations.

28. "Modeling Communicative Behavior using Permissions and Obligations", Developments in Agent Communication, Eds. Frank Dignum, Rogier van Eijk, Marc-Philippe Huget, January 2005, 2567 downloads, 14 citations.

2004

29. " Authorization and Privacy for Semantic Web Services", IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2014 downloads, 1 citation.

30. "Authorization and Privacy for Semantic Web Services", First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 7911 downloads, 1 citation.

2003

31. "Security for DAML Web Services: Annotation and Matchmaking", Second International Semantic Web Conference , September 2003, 3495 downloads, 125 citations.

32. "A Policy Based Approach to Security for the Semantic Web", 2nd International Semantic Web Conference (ISWC2003), September 2003, 10055 downloads, 218 citations.

33. "A Policy Language for A Pervasive Computing Environment", IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4198 downloads, 341 citations.

2001

34. "Trust-Based Security in Pervasive Computing Environments", IEEE Computer, December 2001, 7961 downloads, 214 citations.

35. "A Delegation Based Model for Distributed Trust", Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 356 downloads, 69 citations.

36. "A Framework for Distributed Trust Management", Second Workshop on Norms and Institutions in multi-agent systems, June 2001, 2983 downloads, 1 citation.

6 Non-Refereed Publications

2011

1. "Privacy Preservation in Context Aware Geosocial Networking Applications", University of Maryland, Baltimore County, May 2011, 1280 downloads.

2008

2. "Using OWL to Model Role Based Access Control", University of Maryland, Baltimore County, February 2008, 1991 downloads.

2004

3. "Enhancing P3P Framework through Policies and Trust", UMBC Technical Report, TR-CS-04-13, September 2004, 3182 downloads.

4. "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", University of Maryland, Baltimore County, July 2004, 3791 downloads.

2002

5. "Rei : A Policy Language for the Me-Centric Project", HP Labs, September 2002, 3270 downloads.

6. "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", University of Maryland, Baltimore County, August 2002, 4535 downloads, 11 citations.


 
 
Additional Resources

Ontology

1. BGP Network Ontology

Presentation

1. Computational Policies in a Need to Share Environment
2. Computational Policies in a Need to Share Environment
3. Constraining Information Flow in Social Networks with Privacy Policies
4. Context-Aware Privacy Policies in Mobile and Social Computing
5. Framework for Managing the Assured Information Sharing Lifecycle
6. Managing the Assured Information Sharing Lifecycle

Ontology

1. Oblivious Cloud Storage Ontology

Presentation

1. Privacy Preservation in Context Aware Systems
 
 
Events

1. Privacy Preservation in Context-Aware Systems
    on Wednesday, April 27, 2011 from 01:00PM to 02:00PM.

2. A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems
    on Tuesday, March 08, 2011 from 11:00AM to 12:15PM.

3. Reverse Engineering of RBAC Policy using Access Logs
    on Monday, June 15, 2009 from 02:00PM to 03:30PM.

4. Use of Context and Policies in Declarative Networked Systems
    on Tuesday, May 20, 2008 from 03:30PM to 05:30PM.

5. Integrated Development Environment for Policies
    on Monday, March 07, 2005 from 10:00AM to 11:05AM.


 
 

Subscribe to RSS feed

Bookmark this page