<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/887/Context-Sensitive-Access-Control-in-Smart-Home-Environments">
		<rdfs:label><![CDATA[Context Sensitive Access Control in Smart Home Environments]]></rdfs:label>
		<pub:title><![CDATA[Context Sensitive Access Control in Smart Home Environments]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-05-25T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[The rise in popularity of Internet of Things (IoT) devices has opened doors for privacy and security breaches in Cyber-Physical systems like smart homes, smart vehicles, and smart grids that affect our daily existence. IoT systems are also a source of big data that gets shared via cloud. IoT systems in a smart home environment have sensitive access control issues since they are deployed in a personal space. The collected data can also be of highly personal nature. Therefore, it is critical to build access control models that govern who, under what circumstances, can access which sensed data or actuate a physical system. Traditional access control mechanisms are not expressive enough to handle such complex access control needs, warranting the incorporation of new methodologies for privacy and security. In this paper, we propose the creation of the PALS system, that builds upon existing work in attribute-based access control model, captures physical context collected from sensed data (attributes), and performs dynamic reasoning over these attributes and context-driven policies using Semantic Web technologies to execute access control decisions. Reasoning over user context, details of information collected by cloud service provider and device type our mechanism generates as a consequent access control decisions. Our system's access control decisions are supplemented by another sub-system that detects intrusions into smart home systems based on both network and behavioral data. The combined approach serves to determine indicators that a smart home system is under attack, as well as limit what data breach such attacks can achieve.]]></pub:abstract>
		<pub:note><![CDATA[<hr>
<figure class="wp-block-video">
<video controls poster="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/05/Screen-Shot-2020-05-30-at-4.43.35-PM.png" src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/05/887.m4v"></video>
<figcaption>Click to watch narrated presentation</figcaption>
</figure>]]></pub:note>
		<pub:counter>4175</pub:counter>
		<pub:booktitle><![CDATA[6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020)]]></pub:booktitle>
		<pub:publisher><![CDATA[IEEE]]></pub:publisher>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Prajit/Das"><person:name><![CDATA[Prajit Kumar Das]]></person:name><rdfs:label><![CDATA[Prajit Kumar Das]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest>							<rdf:List>
								<rdf:first>
									<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sofia/Dutta"><person:name><![CDATA[Sofia Dutta]]></person:name><rdfs:label><![CDATA[Sofia Dutta]]></rdfs:label></person:Person>
								</rdf:first>
								<rdf:rest>									<rdf:List>
										<rdf:first>
											<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sai Sree Laya/Chukkapalli"><person:name><![CDATA[Sai Sree Laya Chukkapalli]]></person:name><rdfs:label><![CDATA[Sai Sree Laya Chukkapalli]]></rdfs:label></person:Person>
										</rdf:first>
										<rdf:rest>											<rdf:List>
												<rdf:first>
													<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Madhura/Sulgekar"><person:name><![CDATA[Madhura Sulgekar]]></person:name><rdfs:label><![CDATA[Madhura Sulgekar]]></rdfs:label></person:Person>
												</rdf:first>
												<rdf:rest>													<rdf:List>
														<rdf:first>
															<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Swathi/Krithivasan"><person:name><![CDATA[Swathi Krithivasan]]></person:name><rdfs:label><![CDATA[Swathi Krithivasan]]></rdfs:label></person:Person>
														</rdf:first>
														<rdf:rest rdf:resource="&rdf;nil" />
													</rdf:List>
												</rdf:rest>
											</rdf:List>
										</rdf:rest>
									</rdf:List>
								</rdf:rest>
							</rdf:List>
						</rdf:rest>
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/957.pdf]]></pub:softCopyURI>
			<pub:softCopySize>629734</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[RDF / DAML+OIL / OWL]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/974.owl]]></pub:softCopyURI>
			<pub:softCopySize>28327</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[RDF / DAML+OIL / OWL]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/975.owl]]></pub:softCopyURI>
			<pub:softCopySize>3051</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:InProceedings>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
