Tags: trust

Publications

2024

  1. O. Clark, T. Reynolds, E. Ugwuabonyi, and K. P. Joshi, "Exploring the Impact of Increased Health Information Accessibility in Cyberspace on Trust and Self-care Practices", InProceedings, The 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS '24), June 2024, 162 downloads.

2023

  1. K. Echenim and K. P. Joshi, "IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance", InProceedings, IEEE Big Data 2023, 3rd Workshop on Knowledge Graphs and Big Data, December 2023, 212 downloads.
  2. J. Clavin and K. P. Joshi, "Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance", InProceedings, IEEE International Conference on Digital Health (ICDH) 2023 in IEEE World Congress on Services 2023, July 2023, 240 downloads.
  3. N. M. Gowrishetty, S. Chukkapalli, and A. Joshi, "Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones", InProceedings, INFOCOM Workshop on Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2023, 137 downloads.

2022

  1. A. Sheth, M. Gaur, K. Roy, R. Venkataraman, and V. Khandelwal, "Process Knowledge-Infused AI: Toward User-Level Explainability, Interpretability, and Safety", Article, IEEE Internet Computing, September 2022, 257 downloads.
  2. D. L. Kim, N. Alodadi, Z. Chen, K. P. Joshi, A. Crainiceanu, and D. Needham, "MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems", InProceedings, IEEE International Services Computing Conference (SCC) 2022 in IEEE World Congress on Services 2022, July 2022, 418 downloads.
  3. S. Dixit, K. P. Joshi, S. Choi, and L. Elluri, "Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE", InProceedings, 8th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2022), May 2022, 408 downloads.

2021

  1. D. L. Kim, L. Elluri, and K. P. Joshi, "Trusted Compliance Enforcement Framework for Sharing Health Big Data", InProceedings, IEEE BigData 2021 4th Special Session on HealthCare Data, December 2021, 474 downloads.

2020

  1. J. Clavin, V. P. Janeja, K. P. Joshi, Y. Yesha, S. Duan, H. Zhang, L. Erickson, and J. D. Li, "Blockchains for Government: Use Cases and Challenges", Article, Digital Government: Research and Practice, November 2020, 812 downloads.
  2. Z. Boukouvalas, C. Mallinson, E. Crothers, N. Japkowicz, A. Piplai, S. Mittal, A. Joshi, and T. Adali, "Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19", Article, arXiv:2006.01284 [cs.LG], June 2020, 447 downloads.

2019

  1. S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 772 downloads.
  2. S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-physical Systems", PhdThesis, University of Maryland, Baltimore County, May 2019, 358 downloads.
  3. S. N. Narayanan, "A Framework for Detecting Anomalous Behaviors in Smart Cyber-Physical Systems", PhdThesis, May 2019, 170 downloads.

2018

  1. A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1681 downloads.
  2. A. Padia, F. Ferraro, and T. Finin, "SURFACE: Semantically Rich Fact Validation with Explanations", InCollection, arXiv, November 2018, 582 downloads.
  3. A. Padia, F. Ferraro, and T. Finin, "SURFACE: Semantically Rich Fact Validation with Explanations", Article, arXiv preprint arXiv:1810.13223, October 2018, 468 downloads.

2017

  1. M. P. Joshi, S. Mittal, K. P. Joshi, and T. Finin, "Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage", InProceedings, Proceedings of the First IEEE International Conference on Edge Computing, June 2017, 1650 downloads.

2016

  1. B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 1476 downloads.
  2. V. Narkhede, K. P. Joshi, T. Finin, S. Choi, A. Aviv, and D. S. Roche, "Managing Cloud Storage Obliviously", InProceedings, International Conference on Cloud Computing, June 2016, 1706 downloads.

2013

  1. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1820 downloads.

2012

  1. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012, 82 downloads.
  2. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1623 downloads.

2011

  1. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1873 downloads.
  2. M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1681 downloads.
  3. W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 2183 downloads.
  4. W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1756 downloads.
  5. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1498 downloads.

2010

  1. W. Li, A. Joshi, and T. Finin, "SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks", TechReport, October 2010, 156 downloads.
  2. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 3128 downloads, 7 citations.

2009

  1. A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 278 downloads.
  2. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2057 downloads, 7 citations.
  3. W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.

2008

  1. S. Gupta, A. Joshi, and T. Finin, "A Framework for Secure Knowledge Management in Pervasive Computing", InProceedings, Proceedings of the Workshop on Secure Knowledge Management, November 2008, 2294 downloads.
  2. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2738 downloads, 1 citation.
  3. J. Martineau and P. A. Kodeswaran, "SecurePass: Guarding sensitive information from untrusted machines", TechReport, September 2008, 1822 downloads.
  4. T. Finin, A. Joshi, P. Kolari, A. Java, A. Kale, and A. Karandikar, "The Information ecology of social media and online communities", Article, AI Magazine, September 2008, 6658 downloads, 11 citations.
  5. S. Gupta, "Trust-based Data Management in Mobile Ad Hoc Networks", MastersThesis, University of Maryland at Baltimore County, July 2008, 1856 downloads.
  6. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7534 downloads, 61 citations.
  7. B. Aleman-Meza, M. Nagarajan, L. Ding, A. Sheth, B. Arpinar, A. Joshi, and T. Finin, "Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection", Article, ACM Transactions on the Web, February 2008, 3107 downloads, 14 citations.

2007

  1. A. Joshi, T. Finin, A. Java, A. Kale, and P. Kolari, "Web 2.0 Mining: Analyzing Social Media", InProceedings, Proceedings of the NSF Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation, October 2007, 5820 downloads, 5 citations.
  2. A. Kale, P. Kolari, A. Java, T. Finin, and A. Joshi, "On Modeling Trust in Social Media using Link Polarity", TechReport, University of Maryland, Baltimore County, May 2007, 3788 downloads.
  3. A. Kale, "Modeling Trust and Influence in Blogosphere using Link Polarity", MastersThesis, University of Maryland Baltimore County, April 2007, 11210 downloads, 36 citations.
  4. A. Kale, A. Karandikar, P. Kolari, A. Java, T. Finin, and A. Joshi, "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4876 downloads, 36 citations.
  5. T. Finin, J. Sachs, and C. Parr, "Finding Data, Knowledge, and Answers on the Semantic Web", InProceedings, Proceedings of the 20th International FLAIRS Conference, February 2007, 2799 downloads, 1 citation.

2006

  1. T. Finin, L. Kagal, and D. Olmedilla, "Report on the Models of Trust for the Web Workshop", Article, SIGMOD Record, December 2006, 935 downloads.
  2. P. Kolari, A. Java, T. Finin, J. Mayfield, A. Joshi, and J. Martineau, "Blog Track Open Task: Spam Blog Classification", InCollection, TREC 2006 Blog Track Notebook, November 2006, 8473 downloads, 11 citations.
  3. P. A. Bonatti, L. Ding, T. Finin, and D. Olmedilla, "Proceedings of the Second Semantic Web Policy Workshop", Proceedings, CEUR, November 2006, 3931 downloads.
  4. H. Zeng, M. Alhossaini, L. Ding, R. Fikes, and D. L. McGuinness, "Computing Trust from Revision History", InProceedings, Proceedings of the 2006 International Conference on Privacy, Security and Trust, October 2006, 3304 downloads, 55 citations.
  5. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 4158 downloads, 10 citations.
  6. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4185 downloads, 5 citations.
  7. L. Kagal, T. Finin, A. Joshi, and S. Greenspan, "Security and Privacy Challenges in Open and Dynamic Environments", Article, Computer, June 2006, 3103 downloads.
  8. B. Aleman-Meza, M. Nagarajan, C. Ramakrishnan, A. Sheth, B. Arpinar, L. Ding, P. Kolari, A. Joshi, and T. Finin, "Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection", InProceedings, Proceedings of the 15th International World Wide Web Conference,, May 2006, 4091 downloads, 106 citations.
  9. D. L. McGuinness, H. Zeng, P. Pinheiro da Silva, L. Ding, D. Narayanan, and M. Bhaowal, "Investigations into Trust for Collaborative Information Repositories: A Wikipedia Case Study", InProceedings, Proceedings of the Workshop on Models of Trust for the Web, May 2006, 3992 downloads, 45 citations.
  10. T. Finin and L. Ding, "Search Engines for Semantic Web Knowledge", InProceedings, Proceedings of XTech 2006: Building Web 2.0, May 2006, 28398 downloads, 14 citations.
  11. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1994 downloads, 1 citation.

2005

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3580 downloads, 11 citations.
  2. L. Ding, T. Finin, A. Joshi, Y. Peng, P. Pinheiro da Silva, and D. L. McGuinness, "Tracking RDF Graph Provenance using RDF Molecules", InProceedings, Proceedings of the 4th International Semantic Web Conference, November 2005, 6762 downloads, 47 citations.
  3. L. Kagal, T. Finin, and J. A. Hendler, "Proceedings of the Semantic Web and Policy Workshop", Proceedings, November 2005, 5009 downloads.
  4. P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin, "Enhancing Web Privacy Protection through Declarative Policies", InProceedings, Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 8136 downloads, 27 citations.
  5. L. Ding, P. Kolari, T. Finin, A. Joshi, Y. Peng, and Y. Yesha, "On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework", InProceedings, Proceedings of the AAAI SPring Symposium on AI Technologies for Homeland Security, March 2005, 4422 downloads, 32 citations.
  6. G. Denker, L. Kagal, and T. Finin, "Security in the Semantic Web using OWL", Article, Elsevier Information Security Technical Report, January 2005, 507 downloads.
  7. L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 71 downloads.

2004

  1. L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
  2. P. Kolari, L. Ding, L. Kagal, S. Ganjugunte, A. Joshi, and T. Finin, "Enhancing P3P Framework through Policies and Trust", TechReport, UMBC Technical Report, TR-CS-04-13, September 2004, 4272 downloads.
  3. F. Perich, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 4600 downloads, 32 citations.
  4. L. Ding, P. Kolari, S. Ganjugunte, T. Finin, and A. Joshi, "Modeling and Evaluating Trust Network Inference", InProceedings, Seventh International Workshop on Trust in Agent Societies at AAMAS 2004, July 2004, 4947 downloads, 31 citations.
  5. L. Ding and T. Finin, "Weaving the Web of Belief into the Semantic Web", TechReport, UMBC, May 2004, 7264 downloads.
  6. P. Kolari, "Enhancing Web Privacy with Policy Language and Trust", MastersThesis, UMBC Master's thesis, May 2004, 4700 downloads.
  7. A. Kunjithapatham, "Personal Agents on Semantic Web", MastersThesis, UMBC, January 2004.

2003

  1. F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4518 downloads, 44 citations.
  2. L. Ding, L. Zhou, and T. Finin, "Trust Based Knowledge Outsourcing for Semantic Web Agents", InProceedings, Proceedings of the 2003 IEEE/WIC International Conference on Web Intelligence, October 2003, 3552 downloads, 47 citations.
  3. J. Pinkston, A. Joshi, and T. Finin, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 1695 downloads, 50 citations.
  4. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1606 downloads, 21 citations.

2002

  1. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1475 downloads.
  2. S. Kumar, A. Kunjithapatham, M. Sheshagiri, T. Finin, A. Joshi, and Y. Peng, "Sidekick: A Personal agent for the semantic web", TechReport, Technical Report, December 2002, 117 downloads.
  3. S. Kumar, A. Kunjithapatham, M. Sheshagiri, T. Finin, A. Joshi, Y. Peng, and R. S. Cost, "A Personal Agent Application for the Semantic Web", InProceedings, AAAI 2002 Fall Symposium Series, November 2002, 3598 downloads, 14 citations.
  4. L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5673 downloads, 30 citations.
  5. L. Kagal, F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 5438 downloads, 11 citations.
  6. L. Kagal, T. Finin, and A. Joshi, "Developing Secure Agent Systems Using Delegation Based Trust Management", InProceedings, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 5434 downloads, 38 citations.
  7. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 845 downloads.
  8. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure and Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, Proceedings of the Web Services, E-Business, and the Semantic Web Workshop, May 2002, 104 downloads.
  9. L. Kagal, T. Finin, and A. Joshi, "On Security in Open Multi-Agent Systems", TechReport, UMBC, March 2002, 243 downloads.
  10. S. Avancha, D. Chakraborty, H. Chen, L. Kagal, F. Perich, T. Finin, and A. Joshi, "Issues in Data Management for Pervasive Environments", InProceedings, NSF Workshop on Context-Aware Mobile Database Management, January 2002, 4298 downloads, 2 citations.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 9316 downloads, 214 citations.
  2. A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4483 downloads.
  3. L. Kagal, T. Finin, and Y. Peng, "A Delegation Based Model for Distributed Trust", InProceedings, Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, August 2001, 1279 downloads, 69 citations.
  4. L. Kagal, T. Finin, R. S. Cost, and Y. Peng, "A Framework for Distributed Trust Management", InProceedings, Second Workshop on Norms and Institutions in multi-agent systems, May 2001, 3910 downloads, 1 citation.

2000

  1. T. Finin and B. Grosof, "Knowledge-Based Electronic Markets", Proceedings, AAAI Press, August 2000, 2 citations.

1998

  1. M. A. Rabi, "Relationships among security and algebraic properties of cryptographic objects, and a security infrastructure for agent communication languages", PhdThesis, University of Maryland, Baltimore County, July 1998, 337 downloads.