UMBC ebiquity

Results for tags: security


Active Projects

 Cloud Security and Privacy.
 Secure Cloud Storage and Deletion.

Past Projects

 IDE for Rei Policy Language.
 MoGATU: Data Management in Pervasive Computing Environments.
 Policy Compliant Integration of Linked Data.
 Rei : A Policy Specification Language.
 Securing the Semantic Web: A Trust Management Approach.
 Security in Battlefield MANETs.


48 Refereed Publications


1. "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", IEEE Conference on Information Reuse and Integration,, July 2016, 295 downloads.

2. "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", IEEE Symposium on Security and Privacy, May 2016, 206 downloads.

3. "Representing attribute based access control policies in OWL", Tenth International Conference on Semantic Computing (ICSC), February 2016, 330 downloads.


4. "Detecting Data Exfiltration by Integrating Information Across Layers", 14th IEEE International Conference on Information Reuse and Integration, August 2013, 831 downloads.

5. "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Distributed and Parallel Databases, June 2013, 740 downloads.


6. "A Collaborative Approach to Situational Awareness for CyberSecurity", 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1004 downloads.

7. "Security Through Collaboration and Trust in MANETs", Mobile Networks and Applications (MONET), June 2012.

8. "A Knowledge-Based Approach To Intrusion Detection Modeling", Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1423 downloads.

9. "A Policy Driven Semantic Approach to Data Usage Management", DUMW Workshop in conjunction with WWW 2012, April 2012, 765 downloads.

10. "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 792 downloads.


11. "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", Proceedings of the 2011 Military Communications Conference, November 2011, 1088 downloads.

12. "Extracting Information about Security Vulnerabilities from Web Text", Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 1980 downloads.

13. "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1009 downloads.

14. "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1077 downloads.


15. "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 1924 downloads, 7 citations.


16. "Policy-based Malicious Peer Detection in Ad Hoc Networks ", Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 1716 downloads, 4 citations.

17. "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1250 downloads, 7 citations.


18. "Security through Collaboration in MANETs", Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1548 downloads, 1 citation.

19. "Security Policies and Trust in Ubiquitous Computing", Philosophical Transactions of the Royal Society A, October 2008, 1983 downloads, 1 citation.

20. "ROWLBAC - Representing Role Based Access Control in OWL", Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 6045 downloads, 61 citations.

21. "Role Based Access Control and OWL", Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 2367 downloads.


22. "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", , November 2007, 1596 downloads.

23. "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Ad Hoc Networks Journal (ADHOCNET), May 2007, 2446 downloads, 16 citations.


24. "Security and Privacy Challenges in Open and Dynamic Environments ", Computer, June 2006, 2267 downloads.

25. "Trust in Pervasive Computing", The Handbook of Mobile Middleware , February 2006, 1130 downloads, 1 citation.


26. "Proceedings of the Semantic Web and Policy Workshop", , November 2005, 3820 downloads.

27. "A Holistic Approach to Secure Sensor Networks", UMBC, August 2005, 2427 downloads.

28. "Policy-based Access Control for Task Computing Using Rei ", Proceedings of the Policy Management for the Web Workshop, May 2005, 2362 downloads, 15 citations.


29. " Authorization and Privacy for Semantic Web Services", IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2018 downloads, 1 citation.

30. "Authorization and Privacy for Semantic Web Services", First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 7918 downloads, 1 citation.

31. "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", University of Maryland, Baltimore County, February 2004, 6456 downloads.

32. "Using DAML+ OIL to classify intrusive behaviours", Knowledge Engineering Review, January 2004, 193 downloads, 3 citations.


33. "Secure Sensor Networks for Perimeter Protection", Computer Networks, November 2003, 2441 downloads, 30 citations.

34. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 3344 downloads, 44 citations.

35. "Security for DAML Web Services: Annotation and Matchmaking", Second International Semantic Web Conference , September 2003, 3502 downloads, 125 citations.

36. "A Policy Based Approach to Security for the Semantic Web", 2nd International Semantic Web Conference (ISWC2003), September 2003, 10069 downloads, 218 citations.

37. "Modeling Computer Attacks: An Ontology for Intrusion Detection", The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 3193 downloads, 19 citations.

38. "A Target-Centric Ontology for Intrusion Detection", Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 700 downloads, 50 citations.

39. "Picture Password: A Visual Login Technique for Mobile Devices", NISTIR 7030, July 2003.

40. "A Policy Language for A Pervasive Computing Environment", IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4205 downloads, 341 citations.

41. "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 2377 downloads, 4 citations.

42. "Fuzzy Clustering for Intrusion Detection", Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.


43. "A Security Architecture Based on Trust Management for Pervasive Computing Systems", Grace Hopper Celebration of Women in Computing, October 2002, 4805 downloads, 30 citations.

44. "Developing Secure Agent Systems Using Delegation Based Trust Management", Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 4591 downloads, 38 citations.


45. "Trust-Based Security in Pervasive Computing Environments", IEEE Computer, December 2001, 7972 downloads, 214 citations.

46. "A Framework for Distributed Trust Management", Second Workshop on Norms and Institutions in multi-agent systems, June 2001, 2990 downloads, 1 citation.


47. "Security in Mobile Systems", Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998, 6 citations.

48. "Personal Security Agent: KQML-based PKI", Proceedings of the 2nd International Conference on Autonomous Agents, May 1998, 1504 downloads, 49 citations.

6 Non-Refereed Publications


1. "SecurePass: Guarding sensitive information from untrusted machines", , September 2008, 1158 downloads.

2. "Using OWL to Model Role Based Access Control", University of Maryland, Baltimore County, February 2008, 1997 downloads.


3. "Protecting the privacy of RFID tags", University of Maryland, Baltimore County, September 2006, 2484 downloads.


4. "Rei : A Policy Language for the Me-Centric Project", HP Labs, September 2002, 3280 downloads.

5. "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", University of Maryland, Baltimore County, September 2002, 4735 downloads.

6. "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", University of Maryland, Baltimore County, August 2002, 4547 downloads, 11 citations.

Additional Resources


1. A Holistic Approach to Secure Sensor Networks
2. Cross-layer Analysis for Detecting Wireless Misbehavior
3. Cross-layer Analysis for Detecting Wireless Misbehavior


1. Detecting Misbehavior in MANETs Through Cross-Layer Analysis (May 2006)


1. Framework for Managing the Assured Information Sharing Lifecycle
2. Managing the Assured Information Sharing Lifecycle
3. Managing the Assured Information Sharing Lifecycle
4. Semantic Information Systems
5. Semantics for Cybersecurity and Privacy
6. situational awareness for cybersecurity

1. Are you in control or being controlled in your vehicle?
    on Monday, October 26, 2015 from 10:30AM to 11:30AM.

2. Attribute-based Fine Grained Access Control for Triple Stores
    on Monday, September 14, 2015 from 10:30AM to 11:30AM.

3. A multilayer framework to catch data exfiltration
    on Monday, April 08, 2013 from 10:30AM to 11:30AM.

4. Information Extraction of Security related entities and concepts from unstructured text
    on Monday, April 01, 2013 from 10:30AM to 11:30AM.

5. Privacy and Security in Online Social Media
    on Monday, March 11, 2013 from 10:30AM to 12:00PM.

6. talk: Self-sustainable Cyber-physical System Design
    on Tuesday, March 13, 2012 from 01:00PM to 01:00PM.

7. Group Centric Information Sharing using Hierarchical Models
    on Tuesday, May 10, 2011 from 10:00AM to 11:30AM.

8. Extracting Information about Security Vulnerabilities from Web Text
    on Tuesday, April 19, 2011 from 11:00AM to 12:15PM.

9. A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems
    on Tuesday, March 08, 2011 from 11:00AM to 12:15PM.

10. Security of Industrial Control Systems. How Is It Different from IT Cyber Security?
    on Friday, December 10, 2010 from 12:15PM to 01:30PM.

11. Group Centric Information Sharing Model for Social Networks
    on Tuesday, September 28, 2010 from 11:00AM to 12:00PM.

12. A smart grid perspective: finding value in the collision of energy and information
    on Wednesday, September 08, 2010 from 04:00PM to 06:00PM.

13. SMART: A SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks
    on Tuesday, May 18, 2010 from 10:15AM to Tuesday, 11/30/1999, 12:00AM.

14. Effective Network Security in a Dynamic World
    on Wednesday, September 30, 2009 from 07:30AM to 09:00AM.

15. Constraining Information Flow in Social Networks with Privacy Policies
    on Monday, August 10, 2009 from 09:00AM to 11:00AM.

16. Reverse Engineering of RBAC Policy using Access Logs
    on Monday, June 15, 2009 from 02:00PM to 03:30PM.

17. Emergency Management: Some Related Research Challenges
    on Tuesday, November 11, 2008 from 10:00AM to Tuesday, 11/30/1999, 12:00AM.

18. Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks
    on Thursday, October 23, 2008 from 09:00AM to 11:00AM.

19. Research Topics in MANETs
    on Tuesday, October 17, 2006 from 11:15AM to 12:30PM.

20. Protecting the privacy of RFID tags
    on Wednesday, April 26, 2006 from 10:30AM to 12:00PM.

21. A cost-effective approach to protecting RFID tag identity
    on Wednesday, February 22, 2006 from 10:30AM to 12:00PM.

22. A Holistic Approach to Secure Sensor Networks
    on Wednesday, November 24, 2004 from 11:00AM.


Subscribe to RSS feed

Bookmark this page