UMBC ebiquity

Results for tags: security

Projects

Active Project

 Cloud Security and Privacy.

Past Projects

 IDE for Rei Policy Language.
 MoGATU: Data Management in Pervasive Computing Environments.
 Policy Compliant Integration of Linked Data.
 Rei : A Policy Specification Language.
 Secure and Oblivious Cloud Storage and Deletion.
 Securing the Semantic Web: A Trust Management Approach.
 Security in Battlefield MANETs.


 
 
Publications

48 Refereed Publications

2016

1. "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", IEEE Conference on Information Reuse and Integration,, July 2016, 366 downloads.

2. "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", IEEE Symposium on Security and Privacy, May 2016, 294 downloads.

3. "Representing attribute based access control policies in OWL", Tenth International Conference on Semantic Computing (ICSC), February 2016, 449 downloads.

2013

4. "Detecting Data Exfiltration by Integrating Information Across Layers", 14th IEEE International Conference on Information Reuse and Integration, August 2013, 863 downloads.

5. "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Distributed and Parallel Databases, June 2013, 769 downloads.

2012

6. "A Collaborative Approach to Situational Awareness for CyberSecurity", 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1030 downloads.

7. "Security Through Collaboration and Trust in MANETs", Mobile Networks and Applications (MONET), June 2012.

8. "A Knowledge-Based Approach To Intrusion Detection Modeling", Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1456 downloads.

9. "A Policy Driven Semantic Approach to Data Usage Management", DUMW Workshop in conjunction with WWW 2012, April 2012, 790 downloads.

10. "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 832 downloads.

2011

11. "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", Proceedings of the 2011 Military Communications Conference, November 2011, 1120 downloads.

12. "Extracting Information about Security Vulnerabilities from Web Text", Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 2036 downloads.

13. "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1029 downloads.

14. "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1153 downloads.

2010

15. "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 1953 downloads, 7 citations.

2009

16. "Policy-based Malicious Peer Detection in Ad Hoc Networks ", Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 1756 downloads, 4 citations.

17. "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1284 downloads, 7 citations.

2008

18. "Security through Collaboration in MANETs", Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1575 downloads, 1 citation.

19. "Security Policies and Trust in Ubiquitous Computing", Philosophical Transactions of the Royal Society A, October 2008, 2003 downloads, 1 citation.

20. "ROWLBAC - Representing Role Based Access Control in OWL", Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 6109 downloads, 61 citations.

21. "Role Based Access Control and OWL", Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 2396 downloads.

2007

22. "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", , November 2007, 1613 downloads.

23. "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Ad Hoc Networks Journal (ADHOCNET), May 2007, 2464 downloads, 16 citations.

2006

24. "Security and Privacy Challenges in Open and Dynamic Environments ", Computer, June 2006, 2294 downloads.

25. "Trust in Pervasive Computing", The Handbook of Mobile Middleware , February 2006, 1159 downloads, 1 citation.

2005

26. "Proceedings of the Semantic Web and Policy Workshop", , November 2005, 3890 downloads.

27. "A Holistic Approach to Secure Sensor Networks", UMBC, August 2005, 2462 downloads.

28. "Policy-based Access Control for Task Computing Using Rei ", Proceedings of the Policy Management for the Web Workshop, May 2005, 2383 downloads, 15 citations.

2004

29. " Authorization and Privacy for Semantic Web Services", IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2033 downloads, 1 citation.

30. "Authorization and Privacy for Semantic Web Services", First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 7968 downloads, 1 citation.

31. "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", University of Maryland, Baltimore County, February 2004, 6476 downloads.

32. "Using DAML+ OIL to classify intrusive behaviours", Knowledge Engineering Review, January 2004, 252 downloads, 3 citations.

2003

33. "Secure Sensor Networks for Perimeter Protection", Computer Networks, November 2003, 2478 downloads, 30 citations.

34. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 3388 downloads, 44 citations.

35. "Security for DAML Web Services: Annotation and Matchmaking", Second International Semantic Web Conference , September 2003, 3531 downloads, 125 citations.

36. "A Policy Based Approach to Security for the Semantic Web", 2nd International Semantic Web Conference (ISWC2003), September 2003, 10121 downloads, 218 citations.

37. "Modeling Computer Attacks: An Ontology for Intrusion Detection", The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 3232 downloads, 19 citations.

38. "A Target-Centric Ontology for Intrusion Detection", Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 733 downloads, 50 citations.

39. "Picture Password: A Visual Login Technique for Mobile Devices", NISTIR 7030, July 2003.

40. "A Policy Language for A Pervasive Computing Environment", IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4232 downloads, 341 citations.

41. "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 2416 downloads, 4 citations.

42. "Fuzzy Clustering for Intrusion Detection", Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.

2002

43. "A Security Architecture Based on Trust Management for Pervasive Computing Systems", Grace Hopper Celebration of Women in Computing, October 2002, 4838 downloads, 30 citations.

44. "Developing Secure Agent Systems Using Delegation Based Trust Management", Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 4624 downloads, 38 citations.

2001

45. "Trust-Based Security in Pervasive Computing Environments", IEEE Computer, December 2001, 8054 downloads, 214 citations.

46. "A Framework for Distributed Trust Management", Second Workshop on Norms and Institutions in multi-agent systems, June 2001, 3017 downloads, 1 citation.

1998

47. "Security in Mobile Systems", Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998, 6 citations.

48. "Personal Security Agent: KQML-based PKI", Proceedings of the 2nd International Conference on Autonomous Agents, May 1998, 1533 downloads, 49 citations.

6 Non-Refereed Publications

2008

1. "SecurePass: Guarding sensitive information from untrusted machines", , September 2008, 1177 downloads.

2. "Using OWL to Model Role Based Access Control", University of Maryland, Baltimore County, February 2008, 2019 downloads.

2006

3. "Protecting the privacy of RFID tags", University of Maryland, Baltimore County, September 2006, 2505 downloads.

2002

4. "Rei : A Policy Language for the Me-Centric Project", HP Labs, September 2002, 3317 downloads.

5. "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", University of Maryland, Baltimore County, September 2002, 4765 downloads.

6. "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", University of Maryland, Baltimore County, August 2002, 4583 downloads, 11 citations.


 
 
Additional Resources

Presentation

1. A Holistic Approach to Secure Sensor Networks
2. Cross-layer Analysis for Detecting Wireless Misbehavior
3. Cross-layer Analysis for Detecting Wireless Misbehavior

Poster

1. Detecting Misbehavior in MANETs Through Cross-Layer Analysis (May 2006)

Presentation

1. Framework for Managing the Assured Information Sharing Lifecycle
2. Managing the Assured Information Sharing Lifecycle
3. Managing the Assured Information Sharing Lifecycle
4. Semantic Information Systems
5. Semantics for Cybersecurity and Privacy
6. situational awareness for cybersecurity
 
 
Events

1. Are you in control or being controlled in your vehicle?
    on Monday, October 26, 2015 from 10:30AM to 11:30AM.

2. Attribute-based Fine Grained Access Control for Triple Stores
    on Monday, September 14, 2015 from 10:30AM to 11:30AM.

3. A multilayer framework to catch data exfiltration
    on Monday, April 08, 2013 from 10:30AM to 11:30AM.

4. Information Extraction of Security related entities and concepts from unstructured text
    on Monday, April 01, 2013 from 10:30AM to 11:30AM.

5. Privacy and Security in Online Social Media
    on Monday, March 11, 2013 from 10:30AM to 12:00PM.

6. talk: Self-sustainable Cyber-physical System Design
    on Tuesday, March 13, 2012 from 01:00PM to 01:00PM.

7. Group Centric Information Sharing using Hierarchical Models
    on Tuesday, May 10, 2011 from 10:00AM to 11:30AM.

8. Extracting Information about Security Vulnerabilities from Web Text
    on Tuesday, April 19, 2011 from 11:00AM to 12:15PM.

9. A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems
    on Tuesday, March 08, 2011 from 11:00AM to 12:15PM.

10. Security of Industrial Control Systems. How Is It Different from IT Cyber Security?
    on Friday, December 10, 2010 from 12:15PM to 01:30PM.

11. Group Centric Information Sharing Model for Social Networks
    on Tuesday, September 28, 2010 from 11:00AM to 12:00PM.

12. A smart grid perspective: finding value in the collision of energy and information
    on Wednesday, September 08, 2010 from 04:00PM to 06:00PM.

13. SMART: A SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks
    on Tuesday, May 18, 2010 from 10:15AM to Tuesday, 11/30/1999, 12:00AM.

14. Effective Network Security in a Dynamic World
    on Wednesday, September 30, 2009 from 07:30AM to 09:00AM.

15. Constraining Information Flow in Social Networks with Privacy Policies
    on Monday, August 10, 2009 from 09:00AM to 11:00AM.

16. Reverse Engineering of RBAC Policy using Access Logs
    on Monday, June 15, 2009 from 02:00PM to 03:30PM.

17. Emergency Management: Some Related Research Challenges
    on Tuesday, November 11, 2008 from 10:00AM to Tuesday, 11/30/1999, 12:00AM.

18. Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks
    on Thursday, October 23, 2008 from 09:00AM to 11:00AM.

19. Research Topics in MANETs
    on Tuesday, October 17, 2006 from 11:15AM to 12:30PM.

20. Protecting the privacy of RFID tags
    on Wednesday, April 26, 2006 from 10:30AM to 12:00PM.

21. A cost-effective approach to protecting RFID tag identity
    on Wednesday, February 22, 2006 from 10:30AM to 12:00PM.

22. A Holistic Approach to Secure Sensor Networks
    on Wednesday, November 24, 2004 from 11:00AM.


 
 

Subscribe to RSS feed

Bookmark this page