Tags: access control

Refereed Publications

2020

  1. S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2020, October 2020, 38 downloads.
  2. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 444 downloads.
  3. S. Chukkapalli, A. Piplai, S. Mittal, M. Gupta, and A. Joshi, "A Smart-Farming Ontology for Attribute Based Access Control", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), March 2020, 230 downloads.

2019

  1. S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search And Rescue", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2019, July 2019, 275 downloads.
  2. S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 263 downloads.
  3. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 230 downloads.

2018

  1. V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 401 downloads.

2017

  1. P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 991 downloads.
  2. P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 718 downloads.
  3. M. P. Joshi, S. Mittal, K. P. Joshi, and T. Finin, "Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage", InProceedings, Proceedings of the First IEEE International Conference on Edge Computing, June 2017, 1065 downloads.

2016

  1. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 943 downloads.
  2. V. Narkhede, K. P. Joshi, T. Finin, S. Choi, A. Aviv, and D. S. Roche, "Managing Cloud Storage Obliviously", InProceedings, International Conference on Cloud Computing, June 2016, 1320 downloads.
  3. P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1448 downloads.
  4. N. K. Sharma and A. Joshi, "Representing attribute based access control policies in OWL", InProceedings, Tenth International Conference on Semantic Computing (ICSC), February 2016, 1406 downloads.

2015

  1. A. Padia, T. Finin, and A. Joshi, "Attribute-based Fine Grained Access Control for Triple Stores", InProceedings, 3rd Society, Privacy and the Semantic Web - Policy and Technology workshop, 14th International Semantic Web Conference, October 2015, 1165 downloads.

2010

  1. P. A. Kodeswaran and E. Viegas, "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 4117 downloads, 6 citations.

2008

  1. C. Tilmes, "Standardizing Interfaces for External Access to Data and Processing for the NASA Ozone Product Evaluation And Test Element", InProceedings, Proceedings of the 2008 Geoinformatics Conference , July 2008.
  2. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 6846 downloads, 61 citations.
  3. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 2833 downloads.

2007

  1. S. B. Kodeswaran, O. V. Ratsimor, F. Perich, and A. Joshi, "Utilizing Semantic Tags for Policy Based Networking", InProceedings, IEEE Globecom 2007 Internet Protocol Symposium, November 2007, 2468 downloads, 6 citations.
  2. P. Reddivari, T. Finin, and A. Joshi, "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 7283 downloads, 34 citations.

2005

  1. P. Reddivari, T. Finin, and A. Joshi, "Policy based Access Control for a RDF Store", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 2899 downloads, 34 citations.
  2. R. Masuoka, M. Chopra, Z. Song, Y. K. Labrou, L. Kagal, and T. Finin, "Policy-based Access Control for Task Computing Using Rei", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 2776 downloads, 15 citations.
  3. M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2688 downloads.

2004

  1. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 7902 downloads, 23 citations.

2003

  1. F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4101 downloads, 44 citations.
  2. L. Kagal, T. Finin, and A. Joshi, "A Policy Based Approach to Security for the Semantic Web", InProceedings, 2nd International Semantic Web Conference (ISWC2003), September 2003, 10855 downloads, 218 citations.

2002

  1. L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5299 downloads, 30 citations.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 8747 downloads, 214 citations.
  2. L. Kagal, T. Finin, and Y. Peng, "A Delegation Based Model for Distributed Trust", InProceedings, Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 873 downloads, 69 citations.
  3. L. Kagal, T. Finin, R. S. Cost, and Y. Peng, "A Framework for Distributed Trust Management", InProceedings, Second Workshop on Norms and Institutions in multi-agent systems, June 2001, 3495 downloads, 1 citation.

Non-Refereed Publications

2008

  1. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 2419 downloads.

2002

  1. J. Undercofer, F. Perich, and C. Nicholas, "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 5410 downloads.

2001

  1. A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4148 downloads.

Old Conferences

  1. Policy 2004
    June 7, 2004