<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/703/A-Semantic-Approach-to-Cloud-Security-and-Compliance">
		<rdfs:label><![CDATA[A Semantic Approach to Cloud Security and Compliance]]></rdfs:label>
		<pub:title><![CDATA[A Semantic Approach to Cloud Security and Compliance]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-06-27T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether these measures would comply with their security and compliance requirements. We have conducted a comprehensive study to review the potential threats faced by cloud consumers and have determined the compliance models and security controls that should be in place to manage the risk. Based on this study, we have developed an ontology describing the cloud security controls, threats and compliances. We have also developed an application that classifies the security threats faced by cloud users and automatically determines the high level security and compliance policy controls that have to be activated for each threat. The application also displays existing cloud providers that support these security policies. Cloud consumers can use our system to formulate their security policies and find compliant providers even if they are not familiar with the underlying technology. ]]></pub:abstract>
		<pub:organization><![CDATA[IEEE CLOUD]]></pub:organization>
		<pub:counter>1621</pub:counter>
		<pub:tag><![CDATA[cloud computing]]></pub:tag>
		<pub:tag><![CDATA[cloud security]]></pub:tag>
		<pub:tag><![CDATA[cloud security models]]></pub:tag>
		<pub:tag><![CDATA[security compliance models]]></pub:tag>
		<pub:booktitle><![CDATA[8th International Conference on Cloud Computing (CLOUD)]]></pub:booktitle>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Amit/Hendre"><person:name><![CDATA[Amit Hendre]]></person:name><rdfs:label><![CDATA[Amit Hendre]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest rdf:resource="&rdf;nil" />
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:relatedProject><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy"><project:title><![CDATA[Cloud Security and Privacy]]></project:title><rdfs:label><![CDATA[Cloud Security and Privacy]]></rdfs:label></project:PastProject></pub:relatedProject>
		<pub:relatedProject><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/93/Semantic-Cloud-Services-Framework"><project:title><![CDATA[Semantic Cloud Services Framework]]></project:title><rdfs:label><![CDATA[Semantic Cloud Services Framework]]></rdfs:label></project:PastProject></pub:relatedProject>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/759.pdf]]></pub:softCopyURI>
			<pub:softCopySize>572114</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:InProceedings>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
