Tags: privacy

Publications

2024

  1. A. Hamid, H. R. Samidi, T. Finin, P. Pappachan, and R. Yus, "GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants", Article, Proceedings on Privacy Enhancing Technologies, July 2024, 93 downloads.
  2. A. Kotal, B. Luton, and A. Joshi, "KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation", TechReport, UMBC, May 2024, 59 downloads.
  3. R. Walid, K. P. Joshi, and S. Choi, "Leveraging semantic context to establish access controls for secure cloud-based electronic health records", Article, International Journal of Information Management Data Insights, April 2024, 307 downloads.
  4. R. Walid, K. P. Joshi, and S. Choi, "Comparison of attribute‑based encryption schemes in securing healthcare systems", Article, Scientific Reports, Nature, March 2024, 270 downloads.
  5. R. Walid, K. P. Joshi, and L. Elluri, "Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations", 10th International Conference on Mathematics and Computing ICMC 2024, January 2024, 197 downloads.

2023

  1. A. Kotal, L. Elluri, D. Gupta, V. Mandalapu, and A. Joshi, "Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis", InProceedings, IEEE International Conference on Big Data (BigData), December 2023, 232 downloads.
  2. K. Echenim and K. P. Joshi, "IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance", InProceedings, IEEE Big Data 2023, 3rd Workshop on Knowledge Graphs and Big Data, December 2023, 188 downloads.
  3. K. Echenim, L. Elluri, and K. P. Joshi, "Ensuring Privacy Policy Compliance of Wearables with IoT Regulations", InProceedings, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS 2023), November 2023, 284 downloads.
  4. A. Piplai, A. Kotal, S. Mohseni, M. Gaur, S. Mittal, and A. Joshi, "Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy", Article, IEEE Internet Computing, September 2023, 145 downloads.
  5. A. Hamid, H. R. Samidi, T. Finin, P. Pappachan, and R. Yus, "PrivacyLens: A Framework to Collect and Analyze the Landscape of Past, Present, and Future Smart Device Privacy Policies", Article, CoRR abs/2308.05890, August 2023, 213 downloads.
  6. A. Kotal, N. Das, and A. Joshi, "Knowledge Infusion in Privacy Preserving Data Generation", InProceedings, KDD Workshop on Knowledge-infused Learning, 29TH ACM SIGKDD,, August 2023, 197 downloads.
  7. R. Walid, K. P. Joshi, and S. Choi, "Semantically Rich Differential Access to Secure Cloud EHR", InProceedings, 9th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2023), May 2023, 292 downloads.

2022

  1. F. Lu, J. Munoz, M. Fuchs, T. LeBlond, E. Zaresky-Williams, E. Raff, F. Ferraro, and B. Testa, "A General Framework for Auditing Differentially Private Machine Learning", InProceedings, Advances in Neural Information Processing Systems, November 2022, 182 downloads.
  2. S. Dixit, K. P. Joshi, S. Choi, and L. Elluri, "Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE", InProceedings, 8th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2022), May 2022, 381 downloads.
  3. A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 408 downloads.
  4. A. Chio, D. Jiang, P. Gupta, G. Bouloukakis, R. Yus, S. Dixit, and N. Venkatasubramanian, "SmartSPEC: Customizable Smart Space Datasets via Event-driven Simulations", InProceedings, IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2022, 176 downloads.

2021

  1. D. L. Kim, L. Elluri, and K. P. Joshi, "Trusted Compliance Enforcement Framework for Sharing Health Big Data", InProceedings, IEEE BigData 2021 4th Special Session on HealthCare Data, December 2021, 455 downloads.
  2. P. Schubel, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases", InProceedings, IEEE International Conference on Bioinformatics and Biomedicine (BIBM) 2021, December 2021, 257 downloads.
  3. L. Elluri, S. Chukkapalli, K. P. Joshi, T. Finin, and A. Joshi, "A BERT Based Approach to Measure Web Services Policies Compliance With GDPR", Article, IEEE Access, November 2021, 698 downloads.
  4. S. Chukkapalli, P. Ranade, S. Mittal, and A. Joshi, "A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem", InProceedings, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, November 2021, 406 downloads.
  5. A. Kotal, A. Joshi, and K. P. Joshi, "The Effect of Text Ambiguity on creating Policy Knowledge Graphs", InProceedings, IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021), September 2021, 514 downloads.
  6. R. Razavisousan and K. P. Joshi, "Analyzing GDPR compliance in Cloud Services' privacy policies using Textual Fuzzy Interpretive Structural Modeling (TFISM)", InProceedings, IEEE International Services Computing Conference (SCC) 2021 in IEEE World Congress on Services 2021, September 2021, 469 downloads.
  7. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 401 downloads.

2020

  1. L. Elluri, K. P. Joshi, and A. Kotal, "Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 565 downloads.
  2. K. P. Joshi, L. Elluri, and A. Nagar, "An Integrated Knowledge Graph to Automate Cloud Data Compliance", Article, IEEE Access, November 2020, 718 downloads.
  3. A. Kotal, K. P. Joshi, and A. Joshi, "ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services", InProceedings, IEEE International Conference on Cloud Computing (CLOUD), 2020, October 2020, 582 downloads.
  4. A. Mahindrakar and K. P. Joshi, "Automating GDPR Compliance using Policy Integrated Blockchain", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 1406 downloads.
  5. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 2747 downloads.

2019

  1. S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 760 downloads.
  2. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 687 downloads.
  3. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1357 downloads.
  4. K. P. Joshi and A. Banerjee, "Automating Privacy Compliance Using Policy Integrated Blockchain", Article, Cryptography, Special Issue Advances of Blockchain Technology and Its Applications, February 2019, 1023 downloads.

2018

  1. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1434 downloads.
  2. A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1660 downloads.
  3. L. Elluri and K. P. Joshi, "A Knowledge Representation of Cloud Data controls for EU GDPR Compliance", InProceedings, 11th IEEE International Conference on Cloud Computing (CLOUD), July 2018, 1129 downloads.
  4. M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 1887 downloads.

2017

  1. A. Banerjee and K. P. Joshi, "Link Before You Share: Managing Privacy Policies through Blockchain", InProceedings, 4th International Workshop on Privacy and Security of Big Data (PSBD 2017), in conjunction with 2017 IEEE International Conference on Big Data (IEEE BigData 2017), December 2017, 1380 downloads.
  2. P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 1731 downloads.
  3. P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 1083 downloads.
  4. S. Mittal, A. Gupta, K. P. Joshi, C. Pearce, and A. Joshi, "A Question and Answering System for Management of Cloud Service Level Agreements", InProceedings, IEEE International Conference on Cloud Computing, June 2017, 1134 downloads.
  5. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 1316 downloads.

2016

  1. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "Semantic Approach to Automating Management of Big Data Privacy Policies", InProceedings, IEEE BigData 2016, December 2016, 2055 downloads.
  2. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 1300 downloads.
  3. P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1369 downloads.
  4. P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 2158 downloads.
  5. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "ALDA : Cognitive Assistant for Legal Document Analytics", InProceedings, AAAI Fall Symposium 2016, September 2016, 1231 downloads.
  6. K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 2102 downloads.
  7. P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1806 downloads.
  8. D. S. Roche, A. Aviv, and S. Choi, "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", InProceedings, IEEE Symposium on Security and Privacy, May 2016, 1355 downloads.
  9. S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Automatic Extraction of Metrics from SLAs for Cloud Service Management", InProceedings, 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), April 2016, 1596 downloads.

2015

  1. M. Ahluwalia, Z. Chen, A. Gangopadhyay, and Y. Yesha, "Target-Based, Privacy Preserving, and Incremental Association Rule Mining", Article, IEEE Transactions on Services Computing, November 2015, 1073 downloads.
  2. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 1163 downloads.
  3. L. Zavala, P. K. Murukannaiah, N. Poosamani, T. Finin, A. Joshi, I. Rhee, and M. Singh, "Platys: From Position to Place- Oriented Mobile Computing", Article, AI Magazine, June 2015, 1252 downloads.

2014

  1. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 1287 downloads.
  2. P. Pappachan, R. Yus, P. K. Das, T. Finin, E. Mena, and A. Joshi, "A Semantic Context-Aware Privacy Model for FaceBlock", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, 2854 downloads.
  3. T. Finin, A. Joshi, P. Pappachan, R. Yus, P. K. Das, and E. Mena, "Privacy in a World of Mobile Devices", InProceedings, NSF Workshop on Big Data Security and Privacy, September 2014, 1380 downloads.
  4. R. Yus, P. Pappachan, P. K. Das, E. Mena, A. Joshi, and T. Finin, "FaceBlock: Privacy-Aware Pictures for Google Glass", InProceedings, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, June 2014, 3270 downloads.
  5. K. P. Joshi, "Cloud Data Management Policies: Security and Privacy Checklist", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1213 downloads.
  6. K. P. Joshi, M. Halem, Y. Yesha, J. E. Dorband, and e., "USM Community Cloud: VCL-based Academic Cloud", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 2173 downloads.

2013

  1. P. K. Das, A. Joshi, and T. Finin, "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 1387 downloads.
  2. P. K. Das, D. Ghosh, A. Joshi, and T. Finin, "ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones", Article, SIGMOBILE Mob. Comput. Commun. Rev., July 2013, 5529 downloads.

2012

  1. D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1509 downloads.
  2. A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, Data Usage Management on the Web Workshop in conjunction with WWW 2012, April 2012, 1541 downloads.
  3. V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 133 downloads.

2011

  1. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1849 downloads.
  2. M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1674 downloads.
  3. L. Zavala, R. Dharurkar, P. Jagtap, T. Finin, and A. Joshi, "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 2941 downloads.
  4. N. Chinnam, "Group recognition in social networks", MastersThesis, University of Maryland, Baltimore County, June 2011, 2735 downloads.
  5. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1487 downloads.
  6. A. Mahale, "Group Centric Information Sharing using Hierarchical Models", MastersThesis, UMBC, May 2011, 1575 downloads.
  7. P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1562 downloads.
  8. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 2035 downloads.

2010

  1. P. A. Kodeswaran and E. Viegas, "Towards a privacy preserving policy based infrastructure for social data access to enable scientific research", InProceedings, Eighth Annual Conference on Privacy, Security and Trust, August 2010, 74 downloads.
  2. P. A. Kodeswaran and E. Viegas, "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 4961 downloads, 6 citations.

2009

  1. P. A. Kodeswaran and E. Viegas, "Applying Differential Privacy to Search Queries in a Policy Based Interactive Framework", InProceedings, ACM International Workshop on Privacy and Annonymity for Very Large Datasets, November 2009, 2602 downloads, 2 citations.

2008

  1. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2730 downloads, 1 citation.
  2. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 3060 downloads.

2007

  1. , "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", Proceedings, November 2007, 2643 downloads.
  2. P. Reddivari, T. Finin, and A. Joshi, "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 7897 downloads, 34 citations.

2006

  1. T. Finin, L. Kagal, and D. Olmedilla, "Report on the Models of Trust for the Web Workshop", Article, SIGMOD Record, December 2006, 923 downloads.
  2. N. Vartak, A. Patwardhan, A. Joshi, T. Finin, and P. Nagy, "Protecting the privacy of passive RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 3255 downloads.
  3. S. Dornbush, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's", MastersThesis, UMBC, August 2006, 3158 downloads.
  4. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4171 downloads, 5 citations.
  5. L. Kagal, T. Finin, A. Joshi, and S. Greenspan, "Security and Privacy Challenges in Open and Dynamic Environments", Article, Computer, June 2006, 3089 downloads.
  6. N. Vartak, "Protecting the privacy of RFID tags", MastersThesis, University of Maryland, Baltimore County, May 2006, 3267 downloads.
  7. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1982 downloads, 1 citation.

2005

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3563 downloads, 11 citations.
  2. L. Kagal, T. Finin, and J. A. Hendler, "Proceedings of the Semantic Web and Policy Workshop", Proceedings, November 2005, 4995 downloads.
  3. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for Agents: Theory and Experiences, July 2005, 6282 downloads, 70 citations.
  4. P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin, "Enhancing Web Privacy Protection through Declarative Policies", InProceedings, Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 8109 downloads, 27 citations.
  5. M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2858 downloads.
  6. G. Denker, L. Kagal, and T. Finin, "Security in the Semantic Web using OWL", Article, Information Security Technical Report, January 2005, 453 downloads.
  7. L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 55 downloads.

2004

  1. H. Chen, "An Intelligent Broker Architecture for Pervasive Context-Aware Systems", PhdThesis, University of Maryland, Baltimore County, December 2004, 7662 downloads, 17 citations.
  2. L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
  3. H. Chen, T. Finin, A. Joshi, F. Perich, D. Chakraborty, and L. Kagal, "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 5443 downloads, 156 citations.
  4. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 8623 downloads, 23 citations.
  5. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
  6. P. Kolari, L. Ding, L. Kagal, S. Ganjugunte, A. Joshi, and T. Finin, "Enhancing P3P Framework through Policies and Trust", TechReport, UMBC Technical Report, TR-CS-04-13, September 2004, 4262 downloads.
  7. H. Chen, F. Perich, T. Finin, and A. Joshi, "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 11890 downloads, 342 citations.
  8. H. Chen, F. Perich, D. Chakraborty, T. Finin, and A. Joshi, "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 5937 downloads, 81 citations.
  9. H. Chen, T. Finin, and A. Joshi, "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", TechReport, University of Maryland, Baltimore County, July 2004, 4922 downloads.
  10. A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 66 downloads.
  11. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", Article, IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2846 downloads, 1 citation.
  12. P. Kolari, "Enhancing Web Privacy with Policy Language and Trust", MastersThesis, UMBC Master's thesis, May 2004, 4692 downloads.
  13. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 1864 downloads, 70 citations.
  14. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", InProceedings, First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 9531 downloads, 1 citation.
  15. H. Chen, T. Finin, and A. Joshi, "A Context Broker for Building Smart Meeting Rooms", Proceedings, Proceedings of the AAAI Symposium on Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium, March 2004, 9463 downloads, 65 citations.
  16. H. Chen, T. Finin, and A. Joshi, "Semantic Web in in the Context Broker Architecture", InProceedings, Proceedings of the Second Annual IEEE International Conference on Pervasive Computer and Communications, March 2004, 11344 downloads, 183 citations.
  17. A. Kunjithapatham, "Personal Agents on Semantic Web", MastersThesis, UMBC, January 2004.

2003

  1. H. Chen, T. Finin, and A. Joshi, "Semantic Web in a Pervasive Context-Aware Architecture", InProceedings, Workshop on Artificial Intelligence in Mobile System, 5th Annual Conf. on Ubiquitous Computing, October 2003, 8465 downloads, 65 citations.
  2. H. Chen, T. Finin, and A. Joshi, "An Intelligent Broker for Context-Aware Systems", Article, Adjunct Proceedings of Ubicomp 2003, October 2003, 4232 downloads, 3 citations.
  3. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1585 downloads, 21 citations.

2002

  1. H. Chen, "An Intelligent Broker Architecture for Context-Aware Systems", TechReport, PhD Dissertation Proposal, December 2002, 10228 downloads.
  2. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1465 downloads.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 9298 downloads, 214 citations.

1998

  1. M. A. Rabi, T. Finin, A. Sherman, and Y. K. Labrou, "Secure Knowledge Query Manipulation Language: a security infrastructure for agent communication languages", TechReport, UMBC, November 1998, 55 downloads.
  2. M. A. Rabi, "Relationships among security and algebraic properties of cryptographic objects, and a security infrastructure for agent communication languages", PhdThesis, University of Maryland, Baltimore County, July 1998, 326 downloads.

1997

  1. J. Mayfield and T. Finin, "A Security Architecture for Agent Communication Languages", TechReport, UMBC, January 1997, 83 downloads.