<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[Policy Management for the Web]]> http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web 2005-05-10 <![CDATA[W3C Workshop on Constraints and Capabilities for Web Services]]> http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services 2004-10-12 <![CDATA[First Workshop on Pervasive Security, Privacy and Trust (PSPT)]]> http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT- 2004-08-26 <![CDATA[International Symposium of Web Intelligence and Security]]> http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security 2004-07-21 <![CDATA[Modeling and Extracting information about Cybersecurity Events from Text]]> http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text 2017-05-16 <![CDATA[Semantic knowledge and privacy in the physical web]]> http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web 2016-09-27 <![CDATA[Semantics for Cybersecurity and Privacy]]> http://ebiquity.umbc.edu/event/html/id/475/Semantics-for-Cybersecurity-and-Privacy 2015-05-01 <![CDATA[Semantics for Privacy and Context]]> http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context 2014-10-20 <![CDATA[Semantics for Big Data (,) Security and Privacy]]> http://ebiquity.umbc.edu/event/html/id/468/Semantics-for-Big-Data-Security-and-Privacy 2014-09-16 <![CDATA[PhD defense: Lushan Han, Schema Free Querying of Semantic Data]]> http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data 2014-05-23 <![CDATA[Extracting cybersecurity related entities, terms and concepts from text]]> http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text 2013-05-28 <![CDATA[Phd proposal: A Semantic Resolution Framework for Manufacturing Capability Data Integration]]> http://ebiquity.umbc.edu/event/html/id/460/Phd-proposal-A-Semantic-Resolution-Framework-for-Manufacturing-Capability-Data-Integration 2013-05-14 <![CDATA[MS defense: Social Media Analytics: Digital Footprints]]> http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints 2013-05-13 <![CDATA[A Collaborative Approach to Situational Awareness for CyberSecurity]]> http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity 2013-04-29 <![CDATA[Ebiquity team wins the Best Paper Award at the IEEE BigDataSecurity 2022 Conference]]> http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference 2022-05-07 <![CDATA[Yun Peng receives award from NIST for supply chain research]]> http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research 2011-03-10 <![CDATA[From 'Need to Know’ to ‘Need to Share’:]]> http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share- 2008-04-30 <![CDATA[Welcome to the Splogosphere]]> http://ebiquity.umbc.edu/getnews/html/id/31/Welcome-to-the-Splogosphere 2005-12-16 <![CDATA[UMBC ebqiuity members help organize SWPW]]> http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW 2005-05-01 <![CDATA[SweetRules v2.1 released]]> http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released 2005-04-25 <![CDATA[UMBC and IBM collaborate on autonomic computing]]> http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing 2005-02-24 <![CDATA[ebiquity helps organize PSPT 2004]]> http://ebiquity.umbc.edu/getnews/html/id/15/ebiquity-helps-organize-PSPT-2004 2004-08-26 <![CDATA[ebiquity Student Team Wins $120M in Supply Chain Contest]]> http://ebiquity.umbc.edu/getnews/html/id/11/ebiquity-Student-Team-Wins-120M-in-Supply-Chain-Contest 2004-07-25 <![CDATA[SW-UBICOMP-INTEREST SIG formed]]> http://ebiquity.umbc.edu/getnews/html/id/6/SW-UBICOMP-INTEREST-SIG-formed 2003-12-27 <![CDATA[Accelerated Cybersecurity]]> http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity 2016-09-01 <![CDATA[AgentRX]]> http://ebiquity.umbc.edu/project/html/id/46/AgentRX 2003-12-01 <![CDATA[Cloud Security and Privacy]]> http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy 2011-08-01 <![CDATA[CoCoNet: Content and Context Aware Networking]]> http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking 2005-07-01 <![CDATA[Context-Aware Surgical Training]]> http://ebiquity.umbc.edu/project/html/id/79/Context-Aware-Surgical-Training 2006-01-01 <![CDATA[DAML / ITTalks]]> http://ebiquity.umbc.edu/project/html/id/8/DAML-ITTalks 2000-10-01 <![CDATA[Data Privacy management using Policy compliant Blockchain structures]]> http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures 2016-02-01 <![CDATA[Graph of Relations]]> http://ebiquity.umbc.edu/project/html/id/95/Graph-of-Relations 2010-01-01 <![CDATA[IDE for Rei Policy Language]]> http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language 2003-05-01 <![CDATA[IT Services Metrics]]> http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics 2009-01-01 <![CDATA[GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants]]> http://ebiquity.umbc.edu/paper/html/id/1173/GenAIPABench-A-Benchmark-for-Generative-AI-based-Privacy-Assistants 2024-07-01 <![CDATA[Leveraging semantic context to establish access controls for secure cloud-based electronic health records]]> http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records 2024-04-01 <![CDATA[Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations]]> http://ebiquity.umbc.edu/paper/html/id/1128/Secure-and-Privacy-Compliant-Data-Sharing-An-Essential-Framework-for-Healthcare-Organizations 2024-01-04 <![CDATA[Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis]]> http://ebiquity.umbc.edu/paper/html/id/1156/Privacy-Preserving-Data-Sharing-in-Agriculture-Enforcing-Policy-Rules-for-Secure-and-Confidential-Data-Synthesis 2023-12-18 <![CDATA[IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance]]> http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance 2023-12-15 <![CDATA[Ensuring Privacy Policy Compliance of Wearables with IoT Regulations]]> http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations 2023-11-01 <![CDATA[An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains]]> http://ebiquity.umbc.edu/paper/html/id/1073/An-Overview-of-Cybersecurity-Knowledge-Graphs-Mapped-to-the-MITRE-ATT-CK-Framework-Domains 2023-10-03 <![CDATA[Change Management using Generative Modeling on Digital Twins]]> http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins 2023-10-02 <![CDATA[Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy]]> http://ebiquity.umbc.edu/paper/html/id/1104/Knowledge-Enhanced-Neurosymbolic-Artificial-Intelligence-for-Cybersecurity-and-Privacy 2023-09-01 <![CDATA[PrivacyLens: A Framework to Collect and Analyze the Landscape of Past, Present, and Future Smart Device Privacy Policies]]> http://ebiquity.umbc.edu/paper/html/id/1079/PrivacyLens-A-Framework-to-Collect-and-Analyze-the-Landscape-of-Past-Present-and-Future-Smart-Device-Privacy-Policies 2023-08-11 <![CDATA[Blockchain]]> http://ebiquity.umbc.edu/research/area/id/38/Blockchain 2024-03-28 <![CDATA[Question and Answering (QnA) System]]> http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System 2024-03-28 <![CDATA[Security, Trust and Privacy]]> http://ebiquity.umbc.edu/research/area/id/13/Security-Trust-and-Privacy 2024-03-28 <![CDATA[2010 Techno Bioblitz Occurences]]> http://ebiquity.umbc.edu/resource/html/id/320/2010-Techno-Bioblitz-Occurences 2011-02-09 <![CDATA[A Dynamic Pipeline for Cybersecurity Information Extraction and Understanding]]> http://ebiquity.umbc.edu/resource/html/id/382/A-Dynamic-Pipeline-for-Cybersecurity-Information-Extraction-and-Understanding 2021-10-14 <![CDATA[A Schema-Based Approach Combined with Inter-Ontology Reasoning to Construct Consensus Ontologies]]> http://ebiquity.umbc.edu/resource/html/id/283/A-Schema-Based-Approach-Combined-with-Inter-Ontology-Reasoning-to-Construct-Consensus-Ontologies 2009-11-09 <![CDATA[AAAI word search puzzle]]> http://ebiquity.umbc.edu/resource/html/id/128/AAAI-word-search-puzzle 2005-07-07 <![CDATA[Agent approaches to Security, Trust and Privacy in Pervasive Computing]]> http://ebiquity.umbc.edu/resource/html/id/41/Agent-approaches-to-Security-Trust-and-Privacy-in-Pervasive-Computing 2004-07-20 <![CDATA[Annotations of Cybersecurity blogs and articles]]> http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles 2013-05-30 <![CDATA[Authorization and Privacy for Semantic Web Services]]> http://ebiquity.umbc.edu/resource/html/id/67/Authorization-and-Privacy-for-Semantic-Web-Services 2004-08-01 <![CDATA[Blackbook3: A Graph Analytic Processing Platform For The Semantic Web]]> http://ebiquity.umbc.edu/resource/html/id/281/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web 2009-10-06 <![CDATA[Cloud Security and Compliance Ontology]]> http://ebiquity.umbc.edu/resource/html/id/361/Cloud-Security-and-Compliance-Ontology 2014-07-27 <![CDATA[Computational Policies in a Need to Share Environment]]> http://ebiquity.umbc.edu/resource/html/id/232/Computational-Policies-in-a-Need-to-Share-Environment 2007-06-21