Tags: privacy

Refereed Publications

2020

  1. A. Mahindrakar and K. P. Joshi, "Automating GDPR Compliance using Policy Integrated Blockchain", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 230 downloads.
  2. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 364 downloads.

2019

  1. S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 249 downloads.
  2. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 219 downloads.
  3. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 690 downloads.
  4. K. P. Joshi and A. Banerjee, "Automating Privacy Compliance Using Policy Integrated Blockchain", Article, Cryptography, Special Issue Advances of Blockchain Technology and Its Applications, February 2019, 467 downloads.

2018

  1. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 635 downloads.
  2. A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 747 downloads.
  3. L. Elluri and K. P. Joshi, "A Knowledge Representation of Cloud Data controls for EU GDPR Compliance", InProceedings, 11th IEEE International Conference on Cloud Computing (CLOUD), July 2018, 734 downloads.
  4. M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 1032 downloads.

2017

  1. A. Banerjee and K. P. Joshi, "Link Before You Share: Managing Privacy Policies through Blockchain", InProceedings, 4th International Workshop on Privacy and Security of Big Data (PSBD 2017), in conjunction with 2017 IEEE International Conference on Big Data (IEEE BigData 2017), December 2017, 958 downloads.
  2. P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 979 downloads.
  3. P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 709 downloads.
  4. S. Mittal, A. Gupta, K. P. Joshi, C. Pearce, and A. Joshi, "A Question and Answering System for Management of Cloud Service Level Agreements", InProceedings, IEEE International Conference on Cloud Computing, June 2017, 722 downloads.
  5. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 933 downloads.

2016

  1. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "Semantic Approach to Automating Management of Big Data Privacy Policies", InProceedings, IEEE BigData 2016, December 2016, 1577 downloads.
  2. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 933 downloads.
  3. P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1002 downloads.
  4. P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 1657 downloads.
  5. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "ALDA : Cognitive Assistant for Legal Document Analytics", InProceedings, AAAI Fall Symposium 2016, September 2016, 891 downloads.
  6. K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 1571 downloads.
  7. P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1435 downloads.
  8. D. S. Roche, A. Aviv, and S. Choi, "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", InProceedings, IEEE Symposium on Security and Privacy, May 2016, 1020 downloads.
  9. S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Automatic Extraction of Metrics from SLAs for Cloud Service Management", InProceedings, 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), April 2016, 1189 downloads.

2015

  1. M. Ahluwalia, Z. Chen, A. Gangopadhyay, and Y. Yesha, "Target-Based, Privacy Preserving, and Incremental Association Rule Mining", Article, IEEE Transactions on Services Computing, November 2015, 756 downloads.
  2. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 797 downloads.
  3. L. Zavala, P. K. Murukannaiah, N. Poosamani, T. Finin, A. Joshi, I. Rhee, and M. Singh, "Platys: From Position to Place- Oriented Mobile Computing", Article, AI Magazine, June 2015, 940 downloads.

2014

  1. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 928 downloads.
  2. P. Pappachan, R. Yus, P. K. Das, T. Finin, E. Mena, and A. Joshi, "A Semantic Context-Aware Privacy Model for FaceBlock", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, 2000 downloads.
  3. T. Finin, A. Joshi, P. Pappachan, R. Yus, P. K. Das, and E. Mena, "Privacy in a World of Mobile Devices", InProceedings, NSF Workshop on Big Data Security and Privacy, September 2014, 1015 downloads.
  4. R. Yus, P. Pappachan, P. K. Das, E. Mena, A. Joshi, and T. Finin, "FaceBlock: Privacy-Aware Pictures for Google Glass", InProceedings, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, June 2014, 2543 downloads.
  5. K. P. Joshi, "Cloud Data Management Policies: Security and Privacy Checklist", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 915 downloads.
  6. K. P. Joshi, M. Halem, Y. Yesha, J. E. Dorband, and e., "USM Community Cloud: VCL-based Academic Cloud", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1628 downloads.

2013

  1. P. K. Das, A. Joshi, and T. Finin, "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 1038 downloads.
  2. P. K. Das, D. Ghosh, A. Joshi, and T. Finin, "ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones", Article, SIGMOBILE Mob. Comput. Commun. Rev., July 2013, 4246 downloads.

2012

  1. D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1189 downloads.
  2. A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, DUMW Workshop in conjunction with WWW 2012, April 2012, 1221 downloads.

2011

  1. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1503 downloads.
  2. M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1361 downloads.
  3. L. Zavala, R. Dharurkar, P. Jagtap, T. Finin, and A. Joshi, "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 2502 downloads.
  4. N. Chinnam, "Group recognition in social networks", MastersThesis, University of Maryland, Baltimore County, June 2011, 2410 downloads.
  5. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1186 downloads.
  6. A. Mahale, "Group Centric Information Sharing using Hierarchical Models", MastersThesis, UMBC, May 2011, 1228 downloads.
  7. P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1261 downloads.

2010

  1. P. A. Kodeswaran and E. Viegas, "Towards a privacy preserving policy based infrastructure for social data access to enable scientific research", InProceedings, Eighth Annual Conference on Privacy, Security and Trust, August 2010.
  2. P. A. Kodeswaran and E. Viegas, "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 4091 downloads, 6 citations.

2009

  1. P. A. Kodeswaran and E. Viegas, "Applying Differential Privacy to Search Queries in a Policy Based Interactive Framework", InProceedings, ACM International Workshop on Privacy and Annonymity for Very Large Datasets, November 2009, 2303 downloads, 2 citations.

2008

  1. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2407 downloads, 1 citation.

2007

  1. , "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", Proceedings, November 2007, 2287 downloads.
  2. P. Reddivari, T. Finin, and A. Joshi, "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 7265 downloads, 34 citations.

2006

  1. T. Finin, L. Kagal, and D. Olmedilla, "Report on the Models of Trust for the Web Workshop", Article, SIGMOD Record, December 2006, 568 downloads.
  2. S. Dornbush, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's", MastersThesis, UMBC, August 2006, 2752 downloads.
  3. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 3612 downloads, 5 citations.
  4. L. Kagal, T. Finin, A. Joshi, and S. Greenspan, "Security and Privacy Challenges in Open and Dynamic Environments", Article, Computer, June 2006, 2734 downloads.
  5. N. Vartak, "Protecting the privacy of RFID tags", MastersThesis, University of Maryland, Baltimore County, May 2006, 2997 downloads.
  6. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1599 downloads, 1 citation.

2005

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3160 downloads, 11 citations.
  2. L. Kagal and J. A. Hendler, "Proceedings of the Semantic Web and Policy Workshop", Proceedings, November 2005, 4612 downloads.
  3. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for Agents: Theory and Experiences, July 2005, 5697 downloads, 70 citations.
  4. P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin, "Enhancing Web Privacy Protection through Declarative Policies", InProceedings, Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 7335 downloads, 27 citations.
  5. M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2684 downloads.
  6. G. Denker, L. Kagal, and T. Finin, "Security in the Semantic Web using OWL", Article, Information Security Technical Report, January 2005, 36 downloads.

2004

  1. H. Chen, "An Intelligent Broker Architecture for Pervasive Context-Aware Systems", PhdThesis, University of Maryland, Baltimore County, December 2004, 6987 downloads, 17 citations.
  2. L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
  3. H. Chen, T. Finin, A. Joshi, F. Perich, D. Chakraborty, and L. Kagal, "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 5060 downloads, 156 citations.
  4. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 7862 downloads, 23 citations.
  5. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
  6. H. Chen, F. Perich, T. Finin, and A. Joshi, "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 11321 downloads, 342 citations.
  7. H. Chen, F. Perich, D. Chakraborty, T. Finin, and A. Joshi, "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 5462 downloads, 81 citations.
  8. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", Article, IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2431 downloads, 1 citation.
  9. P. Kolari, "Enhancing Web Privacy with Policy Language and Trust", MastersThesis, UMBC Master's thesis, May 2004, 4373 downloads.
  10. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 1448 downloads, 70 citations.
  11. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", InProceedings, First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 8955 downloads, 1 citation.
  12. H. Chen, T. Finin, and A. Joshi, "A Context Broker for Building Smart Meeting Rooms", Proceedings, Proceedings of the AAAI Symposium on Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium, March 2004, 8614 downloads, 65 citations.
  13. H. Chen, T. Finin, and A. Joshi, "Semantic Web in in the Context Broker Architecture", InProceedings, Proceedings of the Second Annual IEEE International Conference on Pervasive Computer and Communications, March 2004, 10641 downloads, 183 citations.
  14. A. Kunjithapatham, "Personal Agents on Semantic Web", MastersThesis, UMBC, January 2004.

2003

  1. H. Chen, T. Finin, and A. Joshi, "Semantic Web in a Pervasive Context-Aware Architecture", InProceedings, Workshop on Artificial Intelligence in Mobile System, 5th Annual Conf. on Ubiquitous Computing, October 2003, 7957 downloads, 65 citations.
  2. H. Chen, T. Finin, and A. Joshi, "An Intelligent Broker for Context-Aware Systems", Article, Adjunct Proceedings of Ubicomp 2003, October 2003, 3816 downloads, 3 citations.
  3. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1224 downloads, 21 citations.

2002

  1. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1144 downloads.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 8734 downloads, 214 citations.

Non-Refereed Publications

2018

  1. S. Saha and K. P. Joshi, "Cognitively Rich Framework to Automate Extraction and Representation of Legal Knowledge", TechReport, March 2018, 329 downloads.

2011

  1. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 1747 downloads.

2008

  1. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 2414 downloads.

2006

  1. N. Vartak, A. Patwardhan, A. Joshi, and P. Nagy, "Protecting the privacy of RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 2894 downloads.

2004

  1. P. Kolari, L. Ding, L. Kagal, S. Ganjugunte, and A. Joshi, "Enhancing P3P Framework through Policies and Trust", TechReport, UMBC Technical Report, TR-CS-04-13, September 2004, 3893 downloads.
  2. H. Chen and A. Joshi, "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", TechReport, University of Maryland, Baltimore County, July 2004, 4493 downloads.

2002

  1. H. Chen, "An Intelligent Broker Architecture for Context-Aware Systems", TechReport, PhD Dissertation Proposal, December 2002, 9589 downloads.