UMBC ebiquity

Results for tags: policy

Research Areas


Past Projects

 IDE for Rei Policy Language.
 Policy-based Automated WAN Configuration and Management.
 RAP: RDF Access-control Policiies.
 Rei : A Policy Specification Language.
 Securing the Semantic Web: A Trust Management Approach.


36 Refereed Publications


1. "Preserving User Privacy and Security in Context-Aware Mobile Platforms", Mobile Application Development, Usability, and Security, October 2016, 407 downloads.


2. "Energy efficient sensing for managing context and privacy on smartphones", First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 681 downloads.


3. "A Collaborative Approach to Situational Awareness for CyberSecurity", 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1116 downloads.

4. "A Policy-based Approach to Smart Cloud Services", Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 1137 downloads.

5. "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 951 downloads.


6. "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1355 downloads.

7. "Privacy Preservation in Context Aware Systems", , May 2011, 1016 downloads.

8. "Enforcing security in semantics driven policy based networks", Computer Standards and Interfaces, January 2011, 1066 downloads, 1 citation.


9. "Enforcing Secure and Robust Routing with Declarative Policies", Proceedings of the 2010 Military Communications Conference, October 2010, 1249 downloads, 1 citation.

10. "A Declarative Approach for Secure and Robust Routing", Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 1426 downloads.

11. "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 3327 downloads, 6 citations.

12. "Policy Driven Negotiations for Managing Virtualized Services on the Cloud", Proceedings of 19th Annual Frontiers in Service Conference, Sweden, June 2010, June 2010, 796 downloads.


13. "Towards a Declarative Framework For Managing Application and Network Adaptations", IEEE GlobeCom, December 2009, 1306 downloads.

14. "Policy-based Malicious Peer Detection in Ad Hoc Networks", Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 1924 downloads, 4 citations.


15. "Security Policies and Trust in Ubiquitous Computing", Philosophical Transactions of the Royal Society A, October 2008, 2092 downloads, 1 citation.

16. "ROWLBAC - Representing Role Based Access Control in OWL", Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 6311 downloads, 61 citations.

17. "Utilizing semantic policies for managing BGP route dissemination", Automated Network Management (INFOCOM workshops), April 2008, 1092 downloads.


18. "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", , November 2007, 1735 downloads.

19. "Modeling Conversation Policies using Permissions and Obligations", Journal of Autonomous Agents and Multi-Agent Systems, April 2007, 2162 downloads.

20. "Policy-Based Access Control for an RDF Store", Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 6462 downloads, 34 citations.


21. "Proceedings of the Second Semantic Web Policy Workshop", CEUR, November 2006, 2771 downloads.

22. "Policy Management of Enterprise Systems: A Requirements Study", Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, June 2006, 4788 downloads, 4 citations.

23. "Security and Privacy Challenges in Open and Dynamic Environments", Computer, June 2006, 2377 downloads.


24. "Proceedings of the Semantic Web and Policy Workshop", , November 2005, 4094 downloads.

25. "Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments", Proceedings of the Semantic Web and Policy Workshop, November 2005, 2181 downloads, 29 citations.

26. "Enhancing Web Privacy Protection through Declarative Policies", Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 6565 downloads, 27 citations.

27. "Policy-based Access Control for Task Computing Using Rei", Proceedings of the Policy Management for the Web Workshop, May 2005, 2466 downloads, 15 citations.

28. "Modeling Communicative Behavior using Permissions and Obligations", Developments in Agent Communication, Eds. Frank Dignum, Rogier van Eijk, Marc-Philippe Huget, January 2005, 2687 downloads, 14 citations.


29. "Authorization and Privacy for Semantic Web Services", IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2120 downloads, 1 citation.

30. "Authorization and Privacy for Semantic Web Services", First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 8202 downloads, 1 citation.


31. "Security for DAML Web Services: Annotation and Matchmaking", Second International Semantic Web Conference , September 2003, 3615 downloads, 125 citations.

32. "A Policy Based Approach to Security for the Semantic Web", 2nd International Semantic Web Conference (ISWC2003), September 2003, 10284 downloads, 218 citations.

33. "A Policy Language for A Pervasive Computing Environment", IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4330 downloads, 341 citations.


34. "Trust-Based Security in Pervasive Computing Environments", IEEE Computer, December 2001, 8192 downloads, 214 citations.

35. "A Delegation Based Model for Distributed Trust", Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 505 downloads, 69 citations.

36. "A Framework for Distributed Trust Management", Second Workshop on Norms and Institutions in multi-agent systems, June 2001, 3139 downloads, 1 citation.

6 Non-Refereed Publications


1. "Privacy Preservation in Context Aware Geosocial Networking Applications", University of Maryland, Baltimore County, May 2011, 1390 downloads.


2. "Using OWL to Model Role Based Access Control", University of Maryland, Baltimore County, February 2008, 2116 downloads.


3. "Enhancing P3P Framework through Policies and Trust", UMBC Technical Report, TR-CS-04-13, September 2004, 3387 downloads.

4. "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", University of Maryland, Baltimore County, July 2004, 3977 downloads.


5. "Rei : A Policy Language for the Me-Centric Project", HP Labs, September 2002, 3432 downloads.

6. "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", University of Maryland, Baltimore County, August 2002, 4706 downloads, 11 citations.

Additional Resources


1. BGP Network Ontology


1. Computational Policies in a Need to Share Environment
2. Computational Policies in a Need to Share Environment
3. Constraining Information Flow in Social Networks with Privacy Policies
4. Context-Aware Privacy Policies in Mobile and Social Computing
5. Framework for Managing the Assured Information Sharing Lifecycle
6. Managing the Assured Information Sharing Lifecycle


1. Oblivious Cloud Storage Ontology


1. Privacy Preservation in Context Aware Systems

1. Privacy Preservation in Context-Aware Systems
    on Wednesday, April 27, 2011 from 01:00PM to 02:00PM.

2. A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems
    on Tuesday, March 08, 2011 from 11:00AM to 12:15PM.

3. Reverse Engineering of RBAC Policy using Access Logs
    on Monday, June 15, 2009 from 02:00PM to 03:30PM.

4. Use of Context and Policies in Declarative Networked Systems
    on Tuesday, May 20, 2008 from 03:30PM to 05:30PM.

5. Integrated Development Environment for Policies
    on Monday, March 07, 2005 from 10:00AM to 11:05AM.


Subscribe to RSS feed

Bookmark this page