<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/642/Security-Policy-Management-for-Handheld-Devices">
		<rdfs:label><![CDATA[Security Policy Management for Handheld Devices]]></rdfs:label>
		<pub:title><![CDATA[Security Policy Management for Handheld Devices]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-06-30T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless technologies into existing computing environments. In this paper, we describe a framework for managing user privileges on handheld devices. Our framework aims at assisting enterprise security officers in creating, distributing, and enforcing group and individual security policies for Personal Digital Assistants, and helping users to automatically comply with their organization’s security policy. Details of a proof-of-concept implementation of the framework are also provided]]></pub:abstract>
		<pub:counter>1580</pub:counter>
		<pub:booktitle><![CDATA[Security and Management (SAM'03),]]></pub:booktitle>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Vladimir/Korolev"><person:name><![CDATA[Vladimir Korolev]]></person:name><rdfs:label><![CDATA[Vladimir Korolev]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Michaela/Iorga"><person:name><![CDATA[Michaela Iorga]]></person:name><rdfs:label><![CDATA[Michaela Iorga]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest>							<rdf:List>
								<rdf:first>
									<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tom/Karygiannis"><person:name><![CDATA[Tom Karygiannis]]></person:name><rdfs:label><![CDATA[Tom Karygiannis]]></rdfs:label></person:Person>
								</rdf:first>
								<rdf:rest>									<rdf:List>
										<rdf:first>
											<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wayne/Jensen"><person:name><![CDATA[Wayne Jensen]]></person:name><rdfs:label><![CDATA[Wayne Jensen]]></rdfs:label></person:Person>
										</rdf:first>
										<rdf:rest>											<rdf:List>
												<rdf:first>
													<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Serban/Gavrila"><person:name><![CDATA[Serban Gavrila]]></person:name><rdfs:label><![CDATA[Serban Gavrila]]></rdfs:label></person:Person>
												</rdf:first>
												<rdf:rest rdf:resource="&rdf;nil" />
											</rdf:List>
										</rdf:rest>
									</rdf:List>
								</rdf:rest>
							</rdf:List>
						</rdf:rest>
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Vladimir/Korolev"><person:name><![CDATA[Vladimir Korolev]]></person:name><rdfs:label><![CDATA[Vladimir Korolev]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/707.pdf]]></pub:softCopyURI>
			<pub:softCopySize>454497</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:InProceedings>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
