<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/42/A-Security-Architecture-Based-on-Trust-Management-for-Pervasive-Computing-Systems">
		<rdfs:label><![CDATA[A Security Architecture Based on Trust Management for Pervasive Computing Systems]]></rdfs:label>
		<pub:title><![CDATA[A Security Architecture Based on Trust Management for Pervasive Computing Systems]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-10-09T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[Traditionally, stand-alone computers and small networks rely on
user authentication and access control to provide security. These
physical methods use system-based controls to verify the identity
of a person or process, explicitly enabling or restricting the ability
to use, change, or view a computer resource. However, these
strategies are inadequate for the increased flexibility that distributed
networks such as the Internet and ubiquitous/pervasive computing
environments require as these systems lack central control and, in
addition, their users are not all predetermined. Users in pervasive
environments expect to access locally hosted resources and services
anytime and anywhere, leading to serious security risks and access
control problems. We propose a solution based on distributed trust
management, which involves developing a security policy, assigning
credentials to entities, verifying that the credentials conform
to the policy, delegating trust to third parties, revoking rights, and
reasoning about users' access rights. This paper presents an infrastructure
that complements existing security features like Public
Key Infrastructure (PKI) and Role Based Access Control with
distributed trust management to provide a highly flexible mode of
enforcing security in a pervasive computing environment.]]></pub:abstract>
		<pub:counter>5997</pub:counter>
		<pub:googleKey>R0AmPe9j30EJ:sc</pub:googleKey>
		<pub:googleCitations>30</pub:googleCitations>
		<pub:tag><![CDATA[pervasive computing]]></pub:tag>
		<pub:tag><![CDATA[pki]]></pub:tag>
		<pub:tag><![CDATA[privaxy]]></pub:tag>
		<pub:tag><![CDATA[rbac]]></pub:tag>
		<pub:tag><![CDATA[security]]></pub:tag>
		<pub:tag><![CDATA[trust]]></pub:tag>
		<pub:booktitle><![CDATA[Grace Hopper Celebration of Women in Computing]]></pub:booktitle>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest>							<rdf:List>
								<rdf:first>
									<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
								</rdf:first>
								<rdf:rest>									<rdf:List>
										<rdf:first>
											<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
										</rdf:first>
										<rdf:rest>											<rdf:List>
												<rdf:first>
													<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jeffrey/Undercoffer"><person:name><![CDATA[Jeffrey Undercoffer]]></person:name><rdfs:label><![CDATA[Jeffrey Undercoffer]]></rdfs:label></person:Person>
												</rdf:first>
												<rdf:rest rdf:resource="&rdf;nil" />
											</rdf:List>
										</rdf:rest>
									</rdf:List>
								</rdf:rest>
							</rdf:List>
						</rdf:rest>
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:relatedProject><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/33/Intrusion-Detection"><project:title><![CDATA[Intrusion Detection]]></project:title><rdfs:label><![CDATA[Intrusion Detection]]></rdfs:label></project:PastProject></pub:relatedProject>
		<pub:relatedProject><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/34/Rei-A-Policy-Specification-Language"><project:title><![CDATA[Rei : A Policy Specification Language]]></project:title><rdfs:label><![CDATA[Rei : A Policy Specification Language]]></rdfs:label></project:PastProject></pub:relatedProject>
		<pub:relatedProject><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/10/Securing-the-Semantic-Web-A-Trust-Management-Approach"><project:title><![CDATA[Securing the Semantic Web: A Trust Management Approach]]></project:title><rdfs:label><![CDATA[Securing the Semantic Web: A Trust Management Approach]]></rdfs:label></project:PastProject></pub:relatedProject>
		<pub:relatedProject><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus"><project:title><![CDATA[Vigil / Secure Centaurus]]></project:title><rdfs:label><![CDATA[Vigil / Secure Centaurus]]></rdfs:label></project:PastProject></pub:relatedProject>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/15.pdf]]></pub:softCopyURI>
			<pub:softCopySize>115318</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:InProceedings>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
