UMBC ebiquity

Results for tags: policy

Projects

Past Projects

 IDE for Rei Policy Language.
 Policy-based Automated WAN Configuration and Management.
 RAP: RDF Access-control Policiies.
 Rei : A Policy Specification Language.
 Securing the Semantic Web: A Trust Management Approach.


 
 
Publications

36 Refereed Publications

2016

1. "Preserving User Privacy and Security in Context-Aware Mobile Platforms", Mobile Application Development, Usability, and Security, October 2016, 157 downloads.

2013

2. "Energy efficient sensing for managing context and privacy on smartphones", First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 581 downloads.

2012

3. "A Collaborative Approach to Situational Awareness for CyberSecurity", 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1013 downloads.

4. "A Policy-based Approach to Smart Cloud Services", Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 1011 downloads.

5. "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 798 downloads.

2011

6. "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1102 downloads.

7. "Privacy Preservation in Context Aware Systems", , May 2011, 904 downloads.

8. "Enforcing security in semantics driven policy based networks", Computer Standards and Interfaces, January 2011, 868 downloads, 1 citation.

2010

9. "Enforcing Secure and Robust Routing with Declarative Policies ", Proceedings of the 2010 Military Communications Conference, October 2010, 1122 downloads, 1 citation.

10. "A Declarative Approach for Secure and Robust Routing", Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 1210 downloads.

11. "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 3107 downloads, 6 citations.

12. "Policy Driven Negotiations for Managing Virtualized Services on the Cloud", Proceedings of 19th Annual Frontiers in Service Conference, Sweden, June 2010, June 2010, 683 downloads.

2009

13. "Towards a Declarative Framework For Managing Application and Network Adaptations", IEEE GlobeCom, December 2009, 1219 downloads.

14. "Policy-based Malicious Peer Detection in Ad Hoc Networks ", Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 1723 downloads, 4 citations.

2008

15. "Security Policies and Trust in Ubiquitous Computing", Philosophical Transactions of the Royal Society A, October 2008, 1992 downloads, 1 citation.

16. "ROWLBAC - Representing Role Based Access Control in OWL", Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 6069 downloads, 61 citations.

17. "Utilizing semantic policies for managing BGP route dissemination", Automated Network Management (INFOCOM workshops), April 2008, 969 downloads.

2007

18. "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", , November 2007, 1601 downloads.

19. "Modeling Conversation Policies using Permissions and Obligations", Journal of Autonomous Agents and Multi-Agent Systems, April 2007, 2065 downloads.

20. "Policy-Based Access Control for an RDF Store", Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 6149 downloads, 34 citations.

2006

21. " Proceedings of the Second Semantic Web Policy Workshop", CEUR, November 2006, 2574 downloads.

22. "Policy Management of Enterprise Systems: A Requirements Study", Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, June 2006, 4654 downloads, 4 citations.

23. "Security and Privacy Challenges in Open and Dynamic Environments ", Computer, June 2006, 2274 downloads.

2005

24. "Proceedings of the Semantic Web and Policy Workshop", , November 2005, 3843 downloads.

25. "Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments ", Proceedings of the Semantic Web and Policy Workshop, November 2005, 2027 downloads, 29 citations.

26. "Enhancing Web Privacy Protection through Declarative Policies", Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 6418 downloads, 27 citations.

27. "Policy-based Access Control for Task Computing Using Rei ", Proceedings of the Policy Management for the Web Workshop, May 2005, 2368 downloads, 15 citations.

28. "Modeling Communicative Behavior using Permissions and Obligations", Developments in Agent Communication, Eds. Frank Dignum, Rogier van Eijk, Marc-Philippe Huget, January 2005, 2581 downloads, 14 citations.

2004

29. " Authorization and Privacy for Semantic Web Services", IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2024 downloads, 1 citation.

30. "Authorization and Privacy for Semantic Web Services", First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 7934 downloads, 1 citation.

2003

31. "Security for DAML Web Services: Annotation and Matchmaking", Second International Semantic Web Conference , September 2003, 3514 downloads, 125 citations.

32. "A Policy Based Approach to Security for the Semantic Web", 2nd International Semantic Web Conference (ISWC2003), September 2003, 10088 downloads, 218 citations.

33. "A Policy Language for A Pervasive Computing Environment", IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4212 downloads, 341 citations.

2001

34. "Trust-Based Security in Pervasive Computing Environments", IEEE Computer, December 2001, 7996 downloads, 214 citations.

35. "A Delegation Based Model for Distributed Trust", Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 366 downloads, 69 citations.

36. "A Framework for Distributed Trust Management", Second Workshop on Norms and Institutions in multi-agent systems, June 2001, 2998 downloads, 1 citation.

6 Non-Refereed Publications

2011

1. "Privacy Preservation in Context Aware Geosocial Networking Applications", University of Maryland, Baltimore County, May 2011, 1290 downloads.

2008

2. "Using OWL to Model Role Based Access Control", University of Maryland, Baltimore County, February 2008, 2003 downloads.

2004

3. "Enhancing P3P Framework through Policies and Trust", UMBC Technical Report, TR-CS-04-13, September 2004, 3196 downloads.

4. "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", University of Maryland, Baltimore County, July 2004, 3814 downloads.

2002

5. "Rei : A Policy Language for the Me-Centric Project", HP Labs, September 2002, 3292 downloads.

6. "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", University of Maryland, Baltimore County, August 2002, 4558 downloads, 11 citations.


 
 
Additional Resources

Ontology

1. BGP Network Ontology

Presentation

1. Computational Policies in a Need to Share Environment
2. Computational Policies in a Need to Share Environment
3. Constraining Information Flow in Social Networks with Privacy Policies
4. Context-Aware Privacy Policies in Mobile and Social Computing
5. Framework for Managing the Assured Information Sharing Lifecycle
6. Managing the Assured Information Sharing Lifecycle

Ontology

1. Oblivious Cloud Storage Ontology

Presentation

1. Privacy Preservation in Context Aware Systems
 
 
Events

1. Privacy Preservation in Context-Aware Systems
    on Wednesday, April 27, 2011 from 01:00PM to 02:00PM.

2. A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems
    on Tuesday, March 08, 2011 from 11:00AM to 12:15PM.

3. Reverse Engineering of RBAC Policy using Access Logs
    on Monday, June 15, 2009 from 02:00PM to 03:30PM.

4. Use of Context and Policies in Declarative Networked Systems
    on Tuesday, May 20, 2008 from 03:30PM to 05:30PM.

5. Integrated Development Environment for Policies
    on Monday, March 07, 2005 from 10:00AM to 11:05AM.


 
 

Subscribe to RSS feed

Bookmark this page