UMBC ebiquity

Results for tags: privacy

Projects

Active Project

 Secure Cloud Storage and Deletion.

Past Projects

 iConnect.
 IDE for Rei Policy Language.
 Platys: From Position to Place in Next Generation Networks.
 Policy Compliant Integration of Linked Data.
 Rei : A Policy Specification Language.

Suggestion for a Future Project

Sorry, you must be on the local subnet of UMBC eBiquity or log in to see this list!


 
 
Publications

21 Refereed Publications

2016

1. "Capturing policies for fine-grained access control on mobile devices", 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 166 downloads.

2. "Semantic knowledge and privacy in the physical web", Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 267 downloads.

3. "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", IEEE Symposium on Security and Privacy, May 2016, 204 downloads.

2014

4. "Semantics for Privacy and Shared Context", Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 372 downloads.

2013

5. "Energy efficient sensing for managing context and privacy on smartphones", First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 567 downloads.

2011

6. "Preserving Privacy in Context-Aware Systems", Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1057 downloads.

7. "Mobile, Collaborative, Context-Aware Systems", Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 1867 downloads.

8. "Group Centric Information Sharing using Hierarchical Models", UMBC, May 2011, 616 downloads.

9. "Privacy Preservation in Context Aware Systems", , May 2011, 897 downloads.

2010

10. "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 3080 downloads, 6 citations.

2008

11. "Security Policies and Trust in Ubiquitous Computing", Philosophical Transactions of the Royal Society A, October 2008, 1983 downloads, 1 citation.

2007

12. "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", , November 2007, 1596 downloads.

13. "Policy-Based Access Control for an RDF Store", Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 6124 downloads, 34 citations.

2006

14. "Security and Privacy Challenges in Open and Dynamic Environments ", Computer, June 2006, 2267 downloads.

2005

15. "Proceedings of the Semantic Web and Policy Workshop", , November 2005, 3817 downloads.

16. "The SOUPA Ontology for Pervasive Computing", Ontologies for Agents: Theory and Experiences, July 2005, 4790 downloads, 70 citations.

17. "Enhancing Web Privacy Protection through Declarative Policies", Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 6403 downloads, 27 citations.

2004

18. " Authorization and Privacy for Semantic Web Services", IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2018 downloads, 1 citation.

19. "Authorization and Privacy for Semantic Web Services", First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 7918 downloads, 1 citation.

2003

20. "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 636 downloads, 21 citations.

2001

21. "Trust-Based Security in Pervasive Computing Environments", IEEE Computer, December 2001, 7970 downloads, 214 citations.

6 Non-Refereed Publications

2011

1. "Privacy Preservation in Context Aware Geosocial Networking Applications", University of Maryland, Baltimore County, May 2011, 1284 downloads.

2008

2. "Using OWL to Model Role Based Access Control", University of Maryland, Baltimore County, February 2008, 1996 downloads.

2006

3. "Protecting the privacy of RFID tags", University of Maryland, Baltimore County, September 2006, 2484 downloads.

2004

4. "Enhancing P3P Framework through Policies and Trust", UMBC Technical Report, TR-CS-04-13, September 2004, 3188 downloads.

5. "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", University of Maryland, Baltimore County, July 2004, 3800 downloads.

2002

6. "An Intelligent Broker Architecture for Context-Aware Systems", PhD Dissertation Proposal, December 2002, 8449 downloads.


 
 
Additional Resources

Presentation

1. Constraining Information Flow in Social Networks with Privacy Policies
2. Context-Aware Privacy Policies in Mobile and Social Computing
3. Framework for Managing the Assured Information Sharing Lifecycle

Poster

1. iConnect poster

Presentation

1. Managing the Assured Information Sharing Lifecycle
2. Managing the Assured Information Sharing Lifecycle
3. Negotiating Privacy, Boundaries and Visibility in a Networked World: Why We Need to Move Beyond Opt-in vs. Opt-Out

Ontology

1. Ontology for Data Privacy Policy

Presentation

1. Privacy Preservation in Context Aware Systems
2. Protecting the privacy of RFID tags
3. Semantics for Cybersecurity and Privacy

Source Code

1. UMBC IOT Android client
 
 
Events

1. Semantic knowledge and privacy in the physical web
    on Tuesday, September 27, 2016 from 11:30AM to 12:30PM.

2. Is your personal data at risk? App analytics to the rescue
    on Monday, September 28, 2015 from 10:30AM to 11:30AM.

3. Semantics for Privacy and Context
    on Monday, October 20, 2014 from 02:10PM to 02:40PM.

4. Energy efficient semantic context model for managing privacy on smartphones
    on Monday, April 22, 2013 from 10:30AM to Tuesday, 11/30/1999, 12:00AM.

5. Energy efficient semantic context model for managing privacy on smartphones
    on Monday, April 22, 2013 from 10:30AM to Tuesday, 11/30/1999, 12:00AM.

6. An energy efficient semantic context model for managing privacy on smartphones
    on Monday, March 25, 2013 from 10:30AM to Tuesday, 11/30/1999, 12:00AM.

7. Privacy and Security in Online Social Media
    on Monday, March 11, 2013 from 10:30AM to 12:00PM.

8. Privacy Preservation in Context-Aware Systems
    on Wednesday, April 27, 2011 from 01:00PM to 02:00PM.

9. Negotiating Privacy, Boundaries and Visibility in a Networked World: Why We Need to Move Beyond Opt-in vs. Opt-Out
    on Friday, December 03, 2010 from 11:00AM to 12:00PM.

10. Privacy Preserving Distributed Data Mining: A Multi-objective Optimization and Algorithmic Game-theoretic Approach
    on Wednesday, September 16, 2009 from 09:30AM to 11:30AM.

11. Constraining Information Flow in Social Networks with Privacy Policies
    on Monday, August 10, 2009 from 09:00AM to 11:00AM.

12. Tutorial on XACML
    on Wednesday, February 18, 2009 from 10:00AM to 11:00AM.

13. Probabilistic Approximate Algorithms for Distributed Data Mining in Peer-to-Peer Networks
    on Monday, April 28, 2008 from 11:15AM.

14. Protecting the privacy of RFID tags
    on Wednesday, April 26, 2006 from 10:30AM to 12:00PM.

15. A cost-effective approach to protecting RFID tag identity
    on Wednesday, February 22, 2006 from 10:30AM to 12:00PM.


 
 

Subscribe to RSS feed

Bookmark this page