<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=bgp">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=bgp]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for bgp]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/341/Recovering-from-Internet-Routing-Failures-using-Declarative-Policies-and-Argumentation-Protocols"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/239/Using-semantic-policies-to-manage-border-gateway-route-exchanges"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/576/Managing-and-Securing-Critical-Infrastructure-A-Semantic-Policy-and-Trust-Driven-Approach"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/495/A-Declarative-Approach-for-Secure-and-Robust-Routing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/507/Correcting-Routing-Failures-Using-Declarative-Policies-and-Argumentation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/447/Utilizing-semantic-policies-for-managing-BGP-route-dissemination"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/393/Enforcing-security-in-semantics-driven-policy-based-networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/376/Utilizing-Semantic-Policies-for-Secure-BGP-Route-Dissemination"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/354/BGP-Network-Ontology"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/341/Recovering-from-Internet-Routing-Failures-using-Declarative-Policies-and-Argumentation-Protocols">
  <title><![CDATA[Recovering from Internet Routing Failures using Declarative Policies and Argumentation Protocols]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/341/Recovering-from-Internet-Routing-Failures-using-Declarative-Policies-and-Argumentation-Protocols</link>
  <description><![CDATA[Many Internet failures are caused by misconﬁgurations of the BGP routers that manage routing of trafﬁc between domains. The problems are usually due to a combination of human errors and the lack of a high-level language for specifying routing policies that can be used to generate router conﬁgurations. We describe an implemented approach that uses a declarative language for specifying network-wide routing policies to automatically conﬁgure routers and show how it can also be used by so...]]></description>
  <dc:date>2010-04-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/239/Using-semantic-policies-to-manage-border-gateway-route-exchanges">
  <title><![CDATA[Using semantic policies to manage border gateway route exchanges]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/239/Using-semantic-policies-to-manage-border-gateway-route-exchanges</link>
  <description><![CDATA[Policies in BGP are implemented as routing configurations that determine
how route information is shared among neighbors to control traffic flows
across networks. This process is generally template driven, device
centric, limited in its expressibility, time consuming and error prone
which can lead to configurations where policies are violated or there are
unintended consequences that are difficult to detect and resolve. In this
work, we propose an alternate mechanism for policy based ne...]]></description>
  <dc:date>2008-04-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/576/Managing-and-Securing-Critical-Infrastructure-A-Semantic-Policy-and-Trust-Driven-Approach">
  <title><![CDATA[Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/576/Managing-and-Securing-Critical-Infrastructure-A-Semantic-Policy-and-Trust-Driven-Approach</link>
  <description><![CDATA[Cyber-physical systems (CPS) and cyber infrastructure are key elements of the national infrastructure, and securing them is of vital importance to national security. There is ample evidence that these systems are vulnerable to disruption and damage due to natural disasters, social crises, and terrorism. CPS applications are becoming more widespread, ranging from healthcare patient monitoring systems to autonomous vehicles to integrated electrical power grids. Often, the new application domain...]]></description>
  <dc:date>2012-01-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks">
  <title><![CDATA[Enforcing security in semantics driven policy based networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks</link>
  <description><![CDATA[Security is an important requirement in scenarios such as mobile computing that allow users to make meaningful ad hoc collaborations. Traditional security solutions are not feasible for these scenarios due to the varying nature of the collaborations. We propose an extensible framework that takes the semantics of the collaboration into account and uses semantics driven policies for enforcing security. Our policies are rooted in semantic web languages which make them amenable to interoperabilit...]]></description>
  <dc:date>2011-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/495/A-Declarative-Approach-for-Secure-and-Robust-Routing">
  <title><![CDATA[A Declarative Approach for Secure and Robust Routing]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/495/A-Declarative-Approach-for-Secure-and-Robust-Routing</link>
  <description><![CDATA[Many Internet failures are caused by misconfigurations of the BGP routers that manage routing of traffic between domains.  The problems are usually due to a combination of human errors and the lack of a high-level language for specifying routing policies that can be used to generate router configurations. We describe an implemented approach that uses a declarative language for specifying network-wide routing policies to automatically configure routers and show how it can also be used by softw...]]></description>
  <dc:date>2010-10-04</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/507/Correcting-Routing-Failures-Using-Declarative-Policies-and-Argumentation">
  <title><![CDATA[Correcting Routing Failures Using Declarative Policies and Argumentation]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/507/Correcting-Routing-Failures-Using-Declarative-Policies-and-Argumentation</link>
  <description><![CDATA[Many Internet failures are caused by misconﬁgurations of the BGP routers that manage rout-ing of traffic between domains. The problems are usually due to a combination of human er-rors and the lack of a high-level language for specifying routing policies that can be used to generate router conﬁgurations. We describe an implemented approach that uses a declarative language for specifying network-wide routing policies to automatically conﬁgure routers and show how it can also be used by s...]]></description>
  <dc:date>2010-04-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/447/Utilizing-semantic-policies-for-managing-BGP-route-dissemination">
  <title><![CDATA[Utilizing semantic policies for managing BGP route dissemination]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/447/Utilizing-semantic-policies-for-managing-BGP-route-dissemination</link>
  <description><![CDATA[Policies in BGP are implemented as routing configurations that determine how route information is shared among neighbors to control traffic flows across networks. This process is generally template driven, device centric, limited in its expressibility, time consuming and error prone which can lead to configurations where policies are violated or there are unintended consequences that are difficult to detect and resolve. In this paper, we propose an alternate mechanism for policy based network...]]></description>
  <dc:date>2008-04-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/393/Enforcing-security-in-semantics-driven-policy-based-networks">
  <title><![CDATA[Enforcing security in semantics driven policy based networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/393/Enforcing-security-in-semantics-driven-policy-based-networks</link>
  <description><![CDATA[Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data being involved. Further more, the wide spread use of portable devices such as laptops, PDAs etc. allows users to make meaningful ad hoc collaborations. Traditional security solutions are not feasible for these scenarioes due to the varying nature of the collaborations in terms of entities involved and their roles, availa...]]></description>
  <dc:date>2008-04-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/376/Utilizing-Semantic-Policies-for-Secure-BGP-Route-Dissemination">
  <title><![CDATA[Utilizing Semantic Policies for Secure BGP Route Dissemination]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/376/Utilizing-Semantic-Policies-for-Secure-BGP-Route-Dissemination</link>
  <description><![CDATA[Policies in BGP are expressed as routing configurations
that determine how route information is shared among
neighbors to control traffic flows across networks. This process
is limited in its expressibility, time consuming and error prone
which can lead to configurations where policies are violated or
there are unintended consequences that are difficult to detect
and resolve. In this paper, we propose an alternate mechanism
for policy based networking that relies on using additional
s...]]></description>
  <dc:date>2007-09-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/354/BGP-Network-Ontology">
  <title><![CDATA[BGP Network Ontology]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/354/BGP-Network-Ontology</link>
  <description><![CDATA[An Ontology for BGP Policy Specification and Reasoning]]></description>
  <dc:date>2013-01-01</dc:date>
 </item>
</rdf:RDF>
