<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/63/A-Target-Centric-Ontology-for-Intrusion-Detection">
		<rdfs:label><![CDATA[A Target-Centric Ontology for Intrusion Detection]]></rdfs:label>
		<pub:title><![CDATA[A Target-Centric Ontology for Intrusion Detection]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-07-31T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[We present an approach to some security problems in multi-agent systems based on distributed trust and the delegation of permissions, and credibility. We assume an open environment in which agents must interact with other agents with which they are not familiar. In particular, an agent will receive requests and assertions from other agents and must decide how to act on the requests and assess the credibility of the assertions. In a closed environment, agents have well known and familiar transaction partners whose rights and credibility are known. The problem thus reduces to authentication – the reliable identiﬁcation of agents’ true identity.  In an open environment, however, agents must transact business even when knowing the true identities is un-informative. Decisions about who to believe and who to serve must be based on an agent’s properties. These properties are established by proving them from an agent’s credentials, delegation assertions, and the appropriate security policy. We begin by describing our approach and the concepts on which it is built. Then we present a design that provides security functions (authorization and credibility assessment) in a typical agent framework (FIPA) and describe initial work in its realization using the semantic web language DAML+OIL.]]></pub:abstract>
		<pub:note><![CDATA[Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence]]></pub:note>
		<pub:volume><![CDATA[71]]></pub:volume>
		<pub:counter>2015</pub:counter>
		<pub:googleKey>srCKvfc18UkJ</pub:googleKey>
		<pub:googleCitations>150</pub:googleCitations>
		<pub:tag><![CDATA[agent]]></pub:tag>
		<pub:tag><![CDATA[cybersecurity]]></pub:tag>
		<pub:tag><![CDATA[intrusion detection]]></pub:tag>
		<pub:tag><![CDATA[ontology]]></pub:tag>
		<pub:tag><![CDATA[owl]]></pub:tag>
		<pub:tag><![CDATA[rdf]]></pub:tag>
		<pub:tag><![CDATA[security]]></pub:tag>
		<pub:tag><![CDATA[semantic web]]></pub:tag>
		<pub:booktitle><![CDATA[Proceedings of the IJCAI-03 Workshop on Ontologies and Distributed Systems]]></pub:booktitle>
		<pub:publisher><![CDATA[CEUR]]></pub:publisher>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/John/Pinkston"><person:name><![CDATA[John Pinkston]]></person:name><rdfs:label><![CDATA[John Pinkston]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest>							<rdf:List>
								<rdf:first>
									<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
								</rdf:first>
								<rdf:rest>									<rdf:List>
										<rdf:first>
											<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jeffrey/Undercoffer"><person:name><![CDATA[Jeffrey Undercoffer]]></person:name><rdfs:label><![CDATA[Jeffrey Undercoffer]]></rdfs:label></person:Person>
										</rdf:first>
										<rdf:rest rdf:resource="&rdf;nil" />
									</rdf:List>
								</rdf:rest>
							</rdf:List>
						</rdf:rest>
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:relatedProject><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/33/Intrusion-Detection"><project:title><![CDATA[Intrusion Detection]]></project:title><rdfs:label><![CDATA[Intrusion Detection]]></rdfs:label></project:PastProject></pub:relatedProject>
		<pub:relatedProject><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/98/Semantic-Situational-Awareness-for-Intrusion-Detection"><project:title><![CDATA[Semantic Situational Awareness for Intrusion Detection]]></project:title><rdfs:label><![CDATA[Semantic Situational Awareness for Intrusion Detection]]></rdfs:label></project:PastProject></pub:relatedProject>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/626.pdf]]></pub:softCopyURI>
			<pub:softCopySize>98945</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:InProceedings>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
