2024
- R. Walid, K. P. Joshi, and S. Choi, "Leveraging semantic context to establish access controls for secure cloud-based electronic health records", Article, International Journal of Information Management Data Insights, April 2024, 1228 downloads.
- R. Walid, K. P. Joshi, and S. Choi, "Comparison of attribute‑based encryption schemes in securing healthcare systems", Article, Scientific Reports, Nature, March 2024, 1152 downloads.
- R. Walid, K. P. Joshi, and L. Elluri, "Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations", 10th International Conference on Mathematics and Computing ICMC 2024, January 2024, 718 downloads.
2022
- D. L. Kim, N. Alodadi, Z. Chen, K. P. Joshi, A. Crainiceanu, and D. Needham, "MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems", InProceedings, IEEE International Services Computing Conference (SCC) 2022 in IEEE World Congress on Services 2022, July 2022, 665 downloads.
- S. Dixit, K. P. Joshi, S. Choi, and L. Elluri, "Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE", InProceedings, 8th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2022), May 2022, 821 downloads.
- S. Chukkapalli, A. Joshi, T. Finin, and R. F. Erbacher, "CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations", InProceedings, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications IV, SPIE Defense + Commercial Sensing, April 2022, 580 downloads.
2021
- D. L. Kim, L. Elluri, and K. P. Joshi, "Trusted Compliance Enforcement Framework for Sharing Health Big Data", InProceedings, IEEE BigData 2021 4th Special Session on HealthCare Data, December 2021, 989 downloads.
- P. Schubel, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases", InProceedings, IEEE International Conference on Bioinformatics and Biomedicine (BIBM) 2021, December 2021, 571 downloads.
- R. Walid, K. P. Joshi, and S. Choi, "Secure Cloud EHR with Semantic Access Control, Searchable Encryption and Attribute Revocation", InProceedings, IEEE International Conference on Digital Health (ICDH) 2021 in IEEE World Congress on Services 2021, September 2021, 1029 downloads.
- L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 603 downloads.
- S. Chukkapalli, S. Aziz, N. Alotaibi, S. Mittal, M. Gupta, and M. Abdelsalam, "Ontology driven AI and Access Control Systems for Smart Fisheries", TechReport, January 2021, 1060 downloads.
2020
- R. Walid, K. P. Joshi, S. Choi, and D. L. Kim, "Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 1076 downloads.
- S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2020, October 2020, 679 downloads.
- S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 3983 downloads.
- S. Chukkapalli, A. Piplai, S. Mittal, M. Gupta, and A. Joshi, "A Smart-Farming Ontology for Attribute Based Access Control", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), March 2020, 1160 downloads.
2019
- S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search And Rescue", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2019, July 2019, 906 downloads.
- S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 1024 downloads.
- A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 949 downloads.
2017
- P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 2158 downloads.
- P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 1315 downloads.
- M. P. Joshi, S. Mittal, K. P. Joshi, and T. Finin, "Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage", InProceedings, Proceedings of the First IEEE International Conference on Edge Computing, June 2017, 1977 downloads.
2016
- P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), November 2016, 1515 downloads.
- V. Narkhede, K. P. Joshi, T. Finin, S. Choi, A. Aviv, and D. S. Roche, "Managing Cloud Storage Obliviously", InProceedings, International Conference on Cloud Computing, June 2016, 1933 downloads.
- P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 2036 downloads.
- N. K. Sharma and A. Joshi, "Representing attribute based access control policies in OWL", InProceedings, Tenth International Conference on Semantic Computing (ICSC), February 2016, 2131 downloads.
2015
- A. Padia, T. Finin, and A. Joshi, "Attribute-based Fine Grained Access Control for Triple Stores", InProceedings, 3rd Society, Privacy and the Semantic Web - Policy and Technology workshop, 14th International Semantic Web Conference, October 2015, 1894 downloads, 20 citations.
2010
- P. A. Kodeswaran and E. Viegas, "Towards a privacy preserving policy based infrastructure for social data access to enable scientific research", InProceedings, Eighth Annual Conference on Privacy, Security and Trust, August 2010, 272 downloads.
- P. A. Kodeswaran and E. Viegas, "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 5623 downloads, 6 citations.
2008
- C. Tilmes, "Standardizing Interfaces for External Access to Data and Processing for the NASA Ozone Product Evaluation And Test Element", InProceedings, Proceedings of the 2008 Geoinformatics Conference , July 2008.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 8019 downloads, 350 citations.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the 4th OWLED Workshop on OWL: Experiences and Direction, April 2008, 3426 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 3344 downloads.
2007
- S. B. Kodeswaran, O. V. Ratsimor, F. Perich, and A. Joshi, "Utilizing Semantic Tags for Policy Based Networking", InProceedings, IEEE Globecom 2007 Internet Protocol Symposium, November 2007, 3056 downloads, 6 citations.
- P. Reddivari, T. Finin, and A. Joshi, "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 8415 downloads, 34 citations.
2005
- P. Reddivari, T. Finin, and A. Joshi, "Policy based Access Control for a RDF Store", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3628 downloads, 34 citations.
- R. Masuoka, M. Chopra, Z. Song, Y. K. Labrou, L. Kagal, and T. Finin, "Policy-based Access Control for Task Computing Using Rei", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3335 downloads, 15 citations.
- M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 3037 downloads.
2004
- L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 9030 downloads, 23 citations.
- A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 274 downloads.
2003
- J. Undercoffer, F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4777 downloads, 44 citations.
- L. Kagal, T. Finin, and A. Joshi, "A Policy Based Approach to Security for the Semantic Web", InProceedings, 2nd International Semantic Web Conference (ISWC2003), September 2003, 12136 downloads, 218 citations.
2002
- L. Kagal, F. Perich, A. Joshi, T. Finin, and J. Undercoffer, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5941 downloads, 30 citations.
- F. Perich and C. Nicholas, "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 6012 downloads.
2001
- L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 9612 downloads, 214 citations.
- A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4705 downloads.
- L. Kagal, T. Finin, and Y. Peng, "A Delegation Based Model for Distributed Trust", InProceedings, Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 1511 downloads, 69 citations.
- L. Kagal, T. Finin, R. S. Cost, and Y. Peng, "A Framework for Distributed Trust Management", InProceedings, Second Workshop on Norms and Institutions in multi-agent systems, May 2001, 4328 downloads, 1 citation.
Old Events
- Is your personal data at risk? App analytics to the rescue
September 28, 2015 - Attribute-based Fine Grained Access Control for Triple Stores
September 14, 2015 - Cloud based Active Archiving Solution for Databases
November 30, 2012 - Group Centric Information Sharing Model for Social Networks
September 28, 2010 - Constraining Information Flow in Social Networks with Privacy Policies
August 10, 2009 - Reverse Engineering of RBAC Policy using Access Logs
June 15, 2009 - Tutorial on XACML
February 18, 2009 - Reverse engineering RBAC policies using ILP
December 2, 2008 - A policy-based system to determine access control in RDF stores
April 28, 2006 - RDF Access Policy (RAP) Implementation Presentation
May 11, 2005