Tags: privacy

Publications

2024

  1. A. Hamid, H. R. Samidi, T. Finin, P. Pappachan, and R. Yus, "GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants", Article, Proceedings on Privacy Enhancing Technologies, July 2024, 11 downloads.
  2. R. Walid, K. P. Joshi, and S. Choi, "Leveraging semantic context to establish access controls for secure cloud-based electronic health records", Article, International Journal of Information Management Data Insights, April 2024, 91 downloads.
  3. R. Walid, K. P. Joshi, and L. Elluri, "Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations", 10th International Conference on Mathematics and Computing ICMC 2024, January 2024, 112 downloads.

2023

  1. A. Kotal, L. Elluri, D. Gupta, V. Mandalapu, and A. Joshi, "Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis", InProceedings, IEEE International Conference on Big Data (BigData), December 2023, 93 downloads.
  2. K. Echenim and K. P. Joshi, "IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance", InProceedings, IEEE Big Data 2023, 3rd Workshop on Knowledge Graphs and Big Data, December 2023, 104 downloads.
  3. K. Echenim, L. Elluri, and K. P. Joshi, "Ensuring Privacy Policy Compliance of Wearables with IoT Regulations", InProceedings, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS 2023), November 2023, 168 downloads.
  4. A. Piplai, A. Kotal, S. Mohseni, M. Gaur, S. Mittal, and A. Joshi, "Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy", Article, IEEE Internet Computing, September 2023, 65 downloads.
  5. A. Hamid, H. R. Samidi, T. Finin, P. Pappachan, and R. Yus, "PrivacyLens: A Framework to Collect and Analyze the Landscape of Past, Present, and Future Smart Device Privacy Policies", Article, CoRR abs/2308.05890, August 2023, 157 downloads.
  6. A. Kotal, N. Das, and A. Joshi, "Knowledge Infusion in Privacy Preserving Data Generation", InProceedings, KDD Workshop on Knowledge-infused Learning, 29TH ACM SIGKDD,, August 2023, 88 downloads.
  7. R. Walid, K. P. Joshi, and S. Choi, "Semantically Rich Differential Access to Secure Cloud EHR", InProceedings, 9th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2023), May 2023, 220 downloads.

2022

  1. F. Lu, J. Munoz, M. Fuchs, T. LeBlond, E. Zaresky-Williams, E. Raff, F. Ferraro, and B. Testa, "A General Framework for Auditing Differentially Private Machine Learning", InProceedings, Advances in Neural Information Processing Systems, November 2022, 119 downloads.
  2. S. Dixit, K. P. Joshi, S. Choi, and L. Elluri, "Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE", InProceedings, 8th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2022), May 2022, 326 downloads.
  3. A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 362 downloads.
  4. A. Chio, D. Jiang, P. Gupta, G. Bouloukakis, R. Yus, S. Dixit, and N. Venkatasubramanian, "SmartSPEC: Customizable Smart Space Datasets via Event-driven Simulations", InProceedings, IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2022, 121 downloads.

2021

  1. D. L. Kim, L. Elluri, and K. P. Joshi, "Trusted Compliance Enforcement Framework for Sharing Health Big Data", InProceedings, IEEE BigData 2021 4th Special Session on HealthCare Data, December 2021, 399 downloads.
  2. P. Schubel, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases", InProceedings, IEEE International Conference on Bioinformatics and Biomedicine (BIBM) 2021, December 2021, 215 downloads.
  3. L. Elluri, S. Chukkapalli, K. P. Joshi, T. Finin, and A. Joshi, "A BERT Based Approach to Measure Web Services Policies Compliance With GDPR", Article, IEEE Access, November 2021, 597 downloads.
  4. S. Chukkapalli, P. Ranade, S. Mittal, and A. Joshi, "A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem", InProceedings, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, November 2021, 336 downloads.
  5. A. Kotal, A. Joshi, and K. P. Joshi, "The Effect of Text Ambiguity on creating Policy Knowledge Graphs", InProceedings, IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021), September 2021, 472 downloads.
  6. R. Razavisousan and K. P. Joshi, "Analyzing GDPR compliance in Cloud Services' privacy policies using Textual Fuzzy Interpretive Structural Modeling (TFISM)", InProceedings, IEEE International Services Computing Conference (SCC) 2021 in IEEE World Congress on Services 2021, September 2021, 409 downloads.
  7. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 364 downloads.

2020

  1. L. Elluri, K. P. Joshi, and A. Kotal, "Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 497 downloads.
  2. K. P. Joshi, L. Elluri, and A. Nagar, "An Integrated Knowledge Graph to Automate Cloud Data Compliance", Article, IEEE Access, November 2020, 675 downloads.
  3. A. Kotal, K. P. Joshi, and A. Joshi, "ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services", InProceedings, IEEE International Conference on Cloud Computing (CLOUD), 2020, October 2020, 528 downloads.
  4. A. Mahindrakar and K. P. Joshi, "Automating GDPR Compliance using Policy Integrated Blockchain", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 1341 downloads.
  5. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 2533 downloads.

2019

  1. S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 708 downloads.
  2. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 594 downloads.
  3. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1287 downloads.
  4. K. P. Joshi and A. Banerjee, "Automating Privacy Compliance Using Policy Integrated Blockchain", Article, Cryptography, Special Issue Advances of Blockchain Technology and Its Applications, February 2019, 968 downloads.

2018

  1. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1370 downloads.
  2. A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1605 downloads.
  3. L. Elluri and K. P. Joshi, "A Knowledge Representation of Cloud Data controls for EU GDPR Compliance", InProceedings, 11th IEEE International Conference on Cloud Computing (CLOUD), July 2018, 1081 downloads.
  4. M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 1822 downloads.

2017

  1. A. Banerjee and K. P. Joshi, "Link Before You Share: Managing Privacy Policies through Blockchain", InProceedings, 4th International Workshop on Privacy and Security of Big Data (PSBD 2017), in conjunction with 2017 IEEE International Conference on Big Data (IEEE BigData 2017), December 2017, 1325 downloads.
  2. P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 1680 downloads.
  3. P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 1045 downloads.
  4. S. Mittal, A. Gupta, K. P. Joshi, C. Pearce, and A. Joshi, "A Question and Answering System for Management of Cloud Service Level Agreements", InProceedings, IEEE International Conference on Cloud Computing, June 2017, 1091 downloads.
  5. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 1276 downloads.

2016

  1. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "Semantic Approach to Automating Management of Big Data Privacy Policies", InProceedings, IEEE BigData 2016, December 2016, 2007 downloads.
  2. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 1263 downloads.
  3. P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1325 downloads.
  4. P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 2097 downloads.
  5. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "ALDA : Cognitive Assistant for Legal Document Analytics", InProceedings, AAAI Fall Symposium 2016, September 2016, 1186 downloads.
  6. K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 2053 downloads.
  7. P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1759 downloads.
  8. D. S. Roche, A. Aviv, and S. Choi, "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", InProceedings, IEEE Symposium on Security and Privacy, May 2016, 1307 downloads.
  9. S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Automatic Extraction of Metrics from SLAs for Cloud Service Management", InProceedings, 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), April 2016, 1548 downloads.

2015

  1. M. Ahluwalia, Z. Chen, A. Gangopadhyay, and Y. Yesha, "Target-Based, Privacy Preserving, and Incremental Association Rule Mining", Article, IEEE Transactions on Services Computing, November 2015, 1035 downloads.
  2. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 1098 downloads.
  3. L. Zavala, P. K. Murukannaiah, N. Poosamani, T. Finin, A. Joshi, I. Rhee, and M. Singh, "Platys: From Position to Place- Oriented Mobile Computing", Article, AI Magazine, June 2015, 1218 downloads.

2014

  1. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 1249 downloads.
  2. P. Pappachan, R. Yus, P. K. Das, T. Finin, E. Mena, and A. Joshi, "A Semantic Context-Aware Privacy Model for FaceBlock", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, 2755 downloads.
  3. T. Finin, A. Joshi, P. Pappachan, R. Yus, P. K. Das, and E. Mena, "Privacy in a World of Mobile Devices", InProceedings, NSF Workshop on Big Data Security and Privacy, September 2014, 1340 downloads.
  4. R. Yus, P. Pappachan, P. K. Das, E. Mena, A. Joshi, and T. Finin, "FaceBlock: Privacy-Aware Pictures for Google Glass", InProceedings, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, June 2014, 3178 downloads.
  5. K. P. Joshi, "Cloud Data Management Policies: Security and Privacy Checklist", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1178 downloads.
  6. K. P. Joshi, M. Halem, Y. Yesha, J. E. Dorband, and e., "USM Community Cloud: VCL-based Academic Cloud", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 2097 downloads.

2013

  1. P. K. Das, A. Joshi, and T. Finin, "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 1347 downloads.
  2. P. K. Das, D. Ghosh, A. Joshi, and T. Finin, "ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones", Article, SIGMOBILE Mob. Comput. Commun. Rev., July 2013, 5366 downloads.

2012

  1. D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1468 downloads.
  2. A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, Data Usage Management on the Web Workshop in conjunction with WWW 2012, April 2012, 1507 downloads.
  3. V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 88 downloads.

2011

  1. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1811 downloads.
  2. M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1634 downloads.
  3. L. Zavala, R. Dharurkar, P. Jagtap, T. Finin, and A. Joshi, "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 2879 downloads.
  4. N. Chinnam, "Group recognition in social networks", MastersThesis, University of Maryland, Baltimore County, June 2011, 2696 downloads.
  5. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1441 downloads.
  6. A. Mahale, "Group Centric Information Sharing using Hierarchical Models", MastersThesis, UMBC, May 2011, 1540 downloads.
  7. P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1523 downloads.
  8. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 1999 downloads.

2010

  1. P. A. Kodeswaran and E. Viegas, "Towards a privacy preserving policy based infrastructure for social data access to enable scientific research", InProceedings, Eighth Annual Conference on Privacy, Security and Trust, August 2010, 25 downloads.
  2. P. A. Kodeswaran and E. Viegas, "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 4865 downloads, 6 citations.

2009

  1. P. A. Kodeswaran and E. Viegas, "Applying Differential Privacy to Search Queries in a Policy Based Interactive Framework", InProceedings, ACM International Workshop on Privacy and Annonymity for Very Large Datasets, November 2009, 2568 downloads, 2 citations.

2008

  1. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2695 downloads, 1 citation.
  2. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 2996 downloads.

2007

  1. , "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability", Proceedings, November 2007, 2605 downloads.
  2. P. Reddivari, T. Finin, and A. Joshi, "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 7831 downloads, 34 citations.

2006

  1. T. Finin, L. Kagal, and D. Olmedilla, "Report on the Models of Trust for the Web Workshop", Article, SIGMOD Record, December 2006, 883 downloads.
  2. N. Vartak, A. Patwardhan, A. Joshi, T. Finin, and P. Nagy, "Protecting the privacy of passive RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 3210 downloads.
  3. S. Dornbush, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's", MastersThesis, UMBC, August 2006, 3106 downloads.
  4. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4105 downloads, 5 citations.
  5. L. Kagal, T. Finin, A. Joshi, and S. Greenspan, "Security and Privacy Challenges in Open and Dynamic Environments", Article, Computer, June 2006, 3040 downloads.
  6. N. Vartak, "Protecting the privacy of RFID tags", MastersThesis, University of Maryland, Baltimore County, May 2006, 3232 downloads.
  7. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1925 downloads, 1 citation.

2005

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3507 downloads, 11 citations.
  2. L. Kagal, T. Finin, and J. A. Hendler, "Proceedings of the Semantic Web and Policy Workshop", Proceedings, November 2005, 4959 downloads.
  3. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for Agents: Theory and Experiences, July 2005, 6243 downloads, 70 citations.
  4. P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin, "Enhancing Web Privacy Protection through Declarative Policies", InProceedings, Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 8022 downloads, 27 citations.
  5. M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2827 downloads.
  6. G. Denker, L. Kagal, and T. Finin, "Security in the Semantic Web using OWL", Article, Information Security Technical Report, January 2005, 393 downloads.
  7. L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 17 downloads.

2004

  1. H. Chen, "An Intelligent Broker Architecture for Pervasive Context-Aware Systems", PhdThesis, University of Maryland, Baltimore County, December 2004, 7594 downloads, 17 citations.
  2. L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
  3. H. Chen, T. Finin, A. Joshi, F. Perich, D. Chakraborty, and L. Kagal, "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 5380 downloads, 156 citations.
  4. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 8569 downloads, 23 citations.
  5. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
  6. P. Kolari, L. Ding, L. Kagal, S. Ganjugunte, A. Joshi, and T. Finin, "Enhancing P3P Framework through Policies and Trust", TechReport, UMBC Technical Report, TR-CS-04-13, September 2004, 4222 downloads.
  7. H. Chen, F. Perich, T. Finin, and A. Joshi, "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 11828 downloads, 342 citations.
  8. H. Chen, F. Perich, D. Chakraborty, T. Finin, and A. Joshi, "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 5888 downloads, 81 citations.
  9. H. Chen, T. Finin, and A. Joshi, "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", TechReport, University of Maryland, Baltimore County, July 2004, 4870 downloads.
  10. A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 25 downloads.
  11. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", Article, IEEE Intelligent Systems (Special Issue on Semantic Web Services), July 2004, 2802 downloads, 1 citation.
  12. P. Kolari, "Enhancing Web Privacy with Policy Language and Trust", MastersThesis, UMBC Master's thesis, May 2004, 4663 downloads.
  13. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 1804 downloads, 70 citations.
  14. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", InProceedings, First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 9478 downloads, 1 citation.
  15. H. Chen, T. Finin, and A. Joshi, "A Context Broker for Building Smart Meeting Rooms", Proceedings, Proceedings of the AAAI Symposium on Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium, March 2004, 9382 downloads, 65 citations.
  16. H. Chen, T. Finin, and A. Joshi, "Semantic Web in in the Context Broker Architecture", InProceedings, Proceedings of the Second Annual IEEE International Conference on Pervasive Computer and Communications, March 2004, 11280 downloads, 183 citations.
  17. A. Kunjithapatham, "Personal Agents on Semantic Web", MastersThesis, UMBC, January 2004.

2003

  1. H. Chen, T. Finin, and A. Joshi, "Semantic Web in a Pervasive Context-Aware Architecture", InProceedings, Workshop on Artificial Intelligence in Mobile System, 5th Annual Conf. on Ubiquitous Computing, October 2003, 8378 downloads, 65 citations.
  2. H. Chen, T. Finin, and A. Joshi, "An Intelligent Broker for Context-Aware Systems", Article, Adjunct Proceedings of Ubicomp 2003, October 2003, 4191 downloads, 3 citations.
  3. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1538 downloads, 21 citations.

2002

  1. H. Chen, "An Intelligent Broker Architecture for Context-Aware Systems", TechReport, PhD Dissertation Proposal, December 2002, 10173 downloads.
  2. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1424 downloads.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 9249 downloads, 214 citations.

1998

  1. M. A. Rabi, T. Finin, A. Sherman, and Y. K. Labrou, "Secure Knowledge Query Manipulation Language: a security infrastructure for agent communication languages", TechReport, UMBC, November 1998, 20 downloads.
  2. M. A. Rabi, "Relationships among security and algebraic properties of cryptographic objects, and a security infrastructure for agent communication languages", PhdThesis, University of Maryland, Baltimore County, July 1998, 283 downloads.

1997

  1. J. Mayfield and T. Finin, "A Security Architecture for Agent Communication Languages", TechReport, UMBC, January 1997, 40 downloads.