<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=cloud">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=cloud]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for cloud]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/447/Generating-Linked-Data-from-Tables-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/442/Cloud-based-Active-Archiving-Solution-for-Databases"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/414/Automation-of-Service-lifecycle-on-the-Cloud-by-using-Semantic-technologies"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/404/MD-Semantic-Web-Meetup-semantic-integration-frameworks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/408/Programming-with-Hadoop-A-Hands-On-Introduction"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/400/Generating-Linked-Data-by-inferring-the-semantics-of-tables"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/395/Overview-of-Mendelay"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/385/A-Framework-for-Mobile-Cloud-Computing-Applications"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/376/COVER-Model-Pivot-Index-for-Flexible-Adaptable-and-Agile-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/45/Ebiquity-student-Karuna-Joshi-s-IBM-Ph-D-Fellowship-renewed-for-2012-13"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/41/Ebiquity-student-Karuna-Joshi-receives-IBM-Ph-D-Fellowship"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/106/Secure-and-Oblivious-Cloud-Storage-and-Deletion"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/93/Semantic-Cloud-Services-Framework"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/96/Tables-to-Linked-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1066/CDFMR-A-Distributed-Statistical-Analysis-of-Stock-Market-Data-using-MapReduce-with-Cumulative-Distribution-Function"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1058/Semantically-Rich-Differential-Access-to-Secure-Cloud-EHR"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1024/Semantically-Rich-Access-Control-in-Cloud-EHR-Systems-Based-on-MA-ABE"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1013/A-Machine-Learning-Plume-Resolving-Model-Implementation-over-North-America-for-Mega-Wildland-Fire-Smoke-Impacts-on-Distant-Planetary-Boundary-Layers"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1012/A-Semantically-Rich-Framework-to-Automate-Cloud-Service-Level-Agreements"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/852/Delegated-Authorization-Framework-for-EHR-Services-using-Attribute-Based-Encryption"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/993/The-Effect-of-Text-Ambiguity-on-creating-Policy-Knowledge-Graphs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/30/Cloud-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/333/Automatically-Generating-Linked-Data-from-Tables"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/281/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/361/Cloud-Security-and-Compliance-Ontology"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/349/Context-Aware-Privacy-Policies-in-Mobile-and-Social-Computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/316/Generating-Linked-Data-by-inferring-the-semantics-of-tables"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/321/Generating-Linked-Data-by-inferring-the-semantics-of-tables"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/325/IT-Service-Ontology"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/368/Oblivious-Cloud-Storage-Ontology"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/344/Ontology-for-Cloud-Services-SLA-Service-Level-Agreement-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/370/Ontology-for-Data-Privacy-Policy"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/447/Generating-Linked-Data-from-Tables-">
  <title><![CDATA[Generating Linked Data from Tables.]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/447/Generating-Linked-Data-from-Tables-</link>
  <description><![CDATA[Large amounts of information is stored in tables, spreadsheets, CSV files and databases for a number of domains, including the Web, healthcare, e-science and public policy. The tables' structure facilitates human understanding, yet this very structure makes it difficult for machine understanding. This talk will focus on describing our work on making the intended meaning of tabular data explicit by representing it as RDF linked data, potentially making large amounts of scientific and medical d...]]></description>
  <dc:date>2013-03-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/442/Cloud-based-Active-Archiving-Solution-for-Databases">
  <title><![CDATA[Cloud based Active Archiving Solution for Databases]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/442/Cloud-based-Active-Archiving-Solution-for-Databases</link>
  <description><![CDATA[In the second talk of the UMBC ACM Student Chapter's Tech Talk Series, ACM Distinguished Speaker Dr. Mukesh Mohania will visit UMBC and talk about "Cloud based Active Archiving Solution for Databases".

Cloud computing offers an exciting opportunity to bring on-demand applications to customers and is being used for delivering hosted services over the Internet and/or processing massive amount of data for business intelligence. In this talk, we will discuss the architecture of cloud computing...]]></description>
  <dc:date>2012-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup">
  <title><![CDATA[Semantic Web Meetup]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup</link>
  <description><![CDATA[The UMBC Ebiquity Lab is hosting the November meeting of the Lotico Central Maryland Semantic Web Meetup from 6:00-8:00 pm in room 456 of the ITE building (directions).  All are welcome.  If you want to attend, please join the  Central MD Semantic Web Meetup group and RSVP.  The meeting will start with a pizza social from 6:00pm to 6:45pm and then continue with a series of short presentations of current Semantic Web research being done in our lab.

  Tim Finin: introduction and overview

...]]></description>
  <dc:date>2011-11-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/414/Automation-of-Service-lifecycle-on-the-Cloud-by-using-Semantic-technologies">
  <title><![CDATA[Automation of Service lifecycle on the Cloud by using Semantic technologies]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/414/Automation-of-Service-lifecycle-on-the-Cloud-by-using-Semantic-technologies</link>
  <description><![CDATA[Managing virtualized services efficiently over the cloud is an open challenge.  We propose a semantically rich, policy-based framework to automate the lifecycle of cloud services. We have divided the IT service lifecycle into the five phases of requirements, discovery, negotiation, composition, and consumption. We detail each phase and describe the high level ontologies that we have developed to describe them. Our research complements previous work on ontologies for service descriptions in t...]]></description>
  <dc:date>2011-10-18</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/404/MD-Semantic-Web-Meetup-semantic-integration-frameworks">
  <title><![CDATA[MD Semantic Web Meetup: semantic integration frameworks]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/404/MD-Semantic-Web-Meetup-semantic-integration-frameworks</link>
  <description><![CDATA[Dean Allemang, Chief Scientist at Top Braid, will talk about semantic integration frameworks.

Five steps to build a semantic integration framework to support a
federated query environment through two working illustrations. First,
Dean outlines a project to integrate several large datasets in service
of drug discovery from both internal and public sources (e.g.,
bio2rdf).  The result is a "linked data cloud", where adding new
datasets is as easy as describing them. Secondly, Dean detai...]]></description>
  <dc:date>2011-09-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/408/Programming-with-Hadoop-A-Hands-On-Introduction">
  <title><![CDATA[Programming with Hadoop - A Hands On Introduction]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/408/Programming-with-Hadoop-A-Hands-On-Introduction</link>
  <description><![CDATA[In this week's meeting we will dive right into writing MapReduce programs, and we skip all the gory details about Hadoop setup and MapReduce theory. In one hour, we will write a MapReduce Java program using Eclipse to create an inverted-index, test it on a local box, and run it on an already set up Hadoop cluster. If we have time, we will also see how to do the same using Python instead of Java. 

You are encouraged to do the following before the meeting  if you want to code along.



...]]></description>
  <dc:date>2011-09-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/400/Generating-Linked-Data-by-inferring-the-semantics-of-tables">
  <title><![CDATA[Generating Linked Data by inferring the semantics of tables]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/400/Generating-Linked-Data-by-inferring-the-semantics-of-tables</link>
  <description><![CDATA[Ph.D. Preliminary Examination
A vast amount of information is encoded in tables on the web, spreadsheets and databases. Considerable work has been focused on exploiting unstructured free text; however techniques that are effective for documents and free text do not work well with tables. In this research we present techniques to generate high quality linked data from tables by jointly inferring the semantics of column headers, table cell values (e.g., strings and numbers), relations between ...]]></description>
  <dc:date>2011-05-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/395/Overview-of-Mendelay">
  <title><![CDATA[Overview of Mendelay]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/395/Overview-of-Mendelay</link>
  <description><![CDATA[As the scientific literature grows, so does the need of scientists to keep up with some portion of it.  Collecting documents on paper is problematic for several reasons, including the fact that people want to work wherever they are, and not just where their personal library of papers may be.  With Mendelay, users store their personal library of (possibly annotated) papers in the cloud.  Mendelay has a large bibliographic database of its own, and portals to various digital libraries.  In this...]]></description>
  <dc:date>2011-05-03</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/385/A-Framework-for-Mobile-Cloud-Computing-Applications">
  <title><![CDATA[A Framework for Mobile Cloud Computing Applications]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/385/A-Framework-for-Mobile-Cloud-Computing-Applications</link>
  <description><![CDATA[Tim Blattner and Fahad Zafar from UMBC MC2 lab will talk about "A Framework for Mobile Cloud Computing Applications" 



Mobile devices provide the advantage of constant availability, ease of use , and are getting more common every day. Since these devices have to be portable, they are restricted in size and weight, and thus processing power.  We present a framework for binding cloud computing to a smart phone interface to drastically increase device performance. Our framework is a servic...]]></description>
  <dc:date>2011-03-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/376/COVER-Model-Pivot-Index-for-Flexible-Adaptable-and-Agile-Systems">
  <title><![CDATA[COVER Model Pivot Index for Flexible, Adaptable, and Agile Systems]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/376/COVER-Model-Pivot-Index-for-Flexible-Adaptable-and-Agile-Systems</link>
  <description><![CDATA[To support corporate business’ competition on speed to market for product and service development, generically modeled data structures have been  used in the development of vertical application software systems, and in storing XML and RDF data for its flexibility, adaptability, and agility. However, generic data models require multiple self-joins on a single table with a large volume of data, causing slow performance for business intelligence (BI) applications. Conversely, traditional speci...]]></description>
  <dc:date>2010-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference">
  <title><![CDATA[Ebiquity team wins the Best Paper Award at the IEEE BigDataSecurity 2022 Conference]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference</link>
  <description><![CDATA[The paper "Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE" authored by Sharad Dixit, Karuna Pande Joshi, SeungGeol Choi, and Lavanya Elluri won the Best Paper Award at the IEEE Big Data Security on the Cloud 2022 held in May 6-8 at Jinan, China.]]></description>
  <dc:date>2022-05-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/45/Ebiquity-student-Karuna-Joshi-s-IBM-Ph-D-Fellowship-renewed-for-2012-13">
  <title><![CDATA[Ebiquity student Karuna Joshi's IBM Ph.D. Fellowship renewed for 2012-13]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/45/Ebiquity-student-Karuna-Joshi-s-IBM-Ph-D-Fellowship-renewed-for-2012-13</link>
  <description><![CDATA[Ebiquity Ph.D. student Karuna Joshi's  IBM Ph.D. Fellowship award has been renewed for the 2012-2013 academic year. She received this award for the 2011-2012 year as well. Ms. Joshi's dissertation involves developing a new framework for automating the configuration, negotiation and procurement of services in a cloud computing environment using semantic web technologies. She is working with co-advisers Professors Yelena Yesha and Tim Finin.

The IBM Ph.D. Fellowship Awards Program is highly ...]]></description>
  <dc:date>2012-04-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/41/Ebiquity-student-Karuna-Joshi-receives-IBM-Ph-D-Fellowship">
  <title><![CDATA[Ebiquity student Karuna Joshi receives IBM Ph.D. Fellowship]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/41/Ebiquity-student-Karuna-Joshi-receives-IBM-Ph-D-Fellowship</link>
  <description><![CDATA[Ebiquity Ph.D. student Karuna Joshi has received a IBM Ph.D. Fellowship award for the 2011-2012 academic year. Ms. Joshi's dissertation involves developing a new framework for automating the configuration, negotiation and procurement of services in a cloud computing environment using semantic web technologies. She is working with co-advisers Professors Yelena Yesha and Tim Finin. The IBM Ph.D. Fellowship Awards Program is highly competitive and selects exceptional Ph.D. students who have an i...]]></description>
  <dc:date>2011-03-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics">
  <title><![CDATA[ALDA: Automated Legal Document Analytics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics</link>
  <description><![CDATA[There has been an exponential growth in use of digitized legal documents in recent years. Majority of services on the Internet have associated legal documents such as Terms of Services, Privacy Policies and Service Level agreements. A large corpus of court cases, judgments and compliance/regulations are now digitally available for e-discovery. Moreover, businesses are maintaining large data sets of legal contracts that they have signed with their employees, customers and contractors. Furtherm...]]></description>
  <dc:date>2014-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy">
  <title><![CDATA[Cloud Security and Privacy]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy</link>
  <description><![CDATA[This project covers research on Security and Privacy pertaining to Cloud computing and cloud based services. 
We have developed a   semantically rich, policy driven approach to address the privacy, security and usage concerns around such cloud data.]]></description>
  <dc:date>2011-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures">
  <title><![CDATA[Data Privacy management using Policy compliant Blockchain structures]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures</link>
  <description><![CDATA[An important requirement of any information management system is to protect data and resources against leak or improper modifications, while at the same time ensure data availability to legitimate users. Moreover, systems handling personal data must also track its provenance and be regularly audited to comply with regulations. By assuring auditable, privacy policy compliant actions, we can also guarantee that areas where privacy policies have been technically enforced are highlighted.

As p...]]></description>
  <dc:date>2016-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics">
  <title><![CDATA[IT Services Metrics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics</link>
  <description><![CDATA[Regarding information technology (IT) artifacts as services delivered to the end user (XaaS) is a paradigm shift that is fast changing the way management looks at the role of IT within an organization.  IT Service development and maintenance which was in the past regarded as an integral part of an organization, has been outsourced or off shored by most companies to external consultants who provide onsite or hosted services. This outsourcing model is now being replaced by a new delivery model ...]]></description>
  <dc:date>2009-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/106/Secure-and-Oblivious-Cloud-Storage-and-Deletion">
  <title><![CDATA[Secure and Oblivious Cloud Storage and Deletion]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/106/Secure-and-Oblivious-Cloud-Storage-and-Deletion</link>
  <description><![CDATA[Cloud based storage services are increasingly being used by consumers for their enterprise storage needs. Cloud storage service should provide confidentiality and integrity along with high availability and reliability. These often contradicting requirements results in research challenges that this project aims to address.
 This project addressed the open issues with developing an Oblivious Cloud storage  architecture. 
This project was a joint collaboration between UMBC and USNA. This proje...]]></description>
  <dc:date>2014-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/93/Semantic-Cloud-Services-Framework">
  <title><![CDATA[Semantic Cloud Services Framework]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/93/Semantic-Cloud-Services-Framework</link>
  <description><![CDATA[ Delivery of IT Service is moving away from a single provider mode, and is increasingly based on the composition of multiple services and assets (technological, human, or process) that may be supplied by one or more service providers distributed across the network – in the cloud. Moreover, a single service could be a part of many composite services as needed. The service, in effect, is virtualized on the cloud. This  project is developing an integrated methodology for IT Services delivered...]]></description>
  <dc:date>2009-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/96/Tables-to-Linked-Data">
  <title><![CDATA[Tables to Linked Data]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/96/Tables-to-Linked-Data</link>
  <description><![CDATA[Vast amounts of information is encoded in tables found in documents, on the Web, and in spreadsheets or databases. Integrating or searching over this information benefits from understanding its intended meaning and making it explicit in a semantic representation language like RDF. Most current approaches to generating Semantic Web representations from tables requires human input to create schemas and often results in graphs that do not follow best practices for linked data. Evidence for a tab...]]></description>
  <dc:date>2010-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records">
  <title><![CDATA[Leveraging semantic context to establish access controls for secure cloud-based electronic health records]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records</link>
  <description><![CDATA[With the continuous growth of cloud-based Electronic Health Record (EHR) systems and medical data, medical organizations are particularly concerned about storing patient data to provide fast services while adhering to privacy and security concerns. Existing EHR systems often face challenges in handling heterogeneous data and maintaining good performance with data growth. These systems mostly use relational databases or partially store data in a knowledge graph, making it challenging to handle...]]></description>
  <dc:date>2024-04-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems">
  <title><![CDATA[Comparison of attribute‑based encryption schemes in securing healthcare systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems</link>
  <description><![CDATA[E-health has become a top priority for healthcare organizations focused on advancing healthcare
services. Thus, medical organizations have been widely adopting cloud services, resulting in the
effective storage of sensitive data. To prevent privacy and security issues associated with the data,
attribute-based encryption (ABE) has been a popular choice for encrypting private data. Likewise,
the attribute-based access control (ABAC) technique has been widely adopted for controlling data
ac...]]></description>
  <dc:date>2024-03-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins">
  <title><![CDATA[Change Management using Generative Modeling on Digital Twins]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins</link>
  <description><![CDATA[A key challenge faced by small and medium-sized business entities is securely managing software updates and changes. Specifically, with rapidly evolving cybersecurity threats, changes/updates/patches to software systems are necessary to stay ahead of emerging threats and are often mandated by regulators or statutory authorities to counter these. However, security patches/updates require stress testing before they can be released in the production system. Stress testing in production environme...]]></description>
  <dc:date>2023-10-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1066/CDFMR-A-Distributed-Statistical-Analysis-of-Stock-Market-Data-using-MapReduce-with-Cumulative-Distribution-Function">
  <title><![CDATA[CDFMR: A Distributed Statistical Analysis of Stock Market Data using MapReduce with Cumulative Distribution Function]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1066/CDFMR-A-Distributed-Statistical-Analysis-of-Stock-Market-Data-using-MapReduce-with-Cumulative-Distribution-Function</link>
  <description><![CDATA[The stock market generates massive data daily on
top of a deluge of historical data. Investors and traders look to
stock market data analysis for assurance in their investments, a
prime indicator of our global economy. This has led to immense
popularity in the topic, and consequently, much research has been
done on stock market predictions and future trends. However,
due to the relatively slow electronic trading systems and order
processing times, the velocity of data, the variety of d...]]></description>
  <dc:date>2023-07-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1058/Semantically-Rich-Differential-Access-to-Secure-Cloud-EHR">
  <title><![CDATA[Semantically Rich Differential Access to Secure Cloud EHR]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1058/Semantically-Rich-Differential-Access-to-Secure-Cloud-EHR</link>
  <description><![CDATA[Existing Cloud-based Electronic Health Record (EHR) services face challenges in handling heterogeneous data and maintaining performance with large records since they often use a relational database or only partially store information in a graph database. We have developed a novel approach that allows fine-grained field-level security for Cloud EHRs to protect patient privacy and data security. Our graph-based EHR has been developed by integrating Attribute-based Encryption (ABE) with ontology...]]></description>
  <dc:date>2023-05-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1024/Semantically-Rich-Access-Control-in-Cloud-EHR-Systems-Based-on-MA-ABE">
  <title><![CDATA[Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1024/Semantically-Rich-Access-Control-in-Cloud-EHR-Systems-Based-on-MA-ABE</link>
  <description><![CDATA[Winner of the Best Paper Award in the conferenceWith the rapid implementation of Cloud-based Electronic Health Record (EHR) systems, health providers are specifically concerned about handling data privacy on the cloud. Existing methods have either scalability issues by requiring that patients grant access to their medical data or a trust issue by having a single authority, thereby creating the problem of a single point of attack. Hence there is a need to develop an EHR system that addresses t...]]></description>
  <dc:date>2022-05-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1013/A-Machine-Learning-Plume-Resolving-Model-Implementation-over-North-America-for-Mega-Wildland-Fire-Smoke-Impacts-on-Distant-Planetary-Boundary-Layers">
  <title><![CDATA[A Machine Learning Plume-Resolving Model Implementation over North America for Mega-Wildland Fire Smoke Impacts on Distant Planetary Boundary Layers]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1013/A-Machine-Learning-Plume-Resolving-Model-Implementation-over-North-America-for-Mega-Wildland-Fire-Smoke-Impacts-on-Distant-Planetary-Boundary-Layers</link>
  <description><![CDATA[Recent persistent droughts and extreme heatwave events over the Western states of the US are creating highly favorable conditions for mega wildland fires. The IPCC AR6 report suggests that such extreme events will continue occurring with increasing frequency and intensity over forested regions, globally. We have shown that smoke produced from such wildland fires, which contain the burnt biomass carbon-based particulate matter at 2.5 microns, can be dynamically transported 1000s of km to affec...]]></description>
  <dc:date>2022-01-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1012/A-Semantically-Rich-Framework-to-Automate-Cloud-Service-Level-Agreements">
  <title><![CDATA[A Semantically Rich Framework to Automate Cloud Service Level Agreements]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1012/A-Semantically-Rich-Framework-to-Automate-Cloud-Service-Level-Agreements</link>
  <description><![CDATA[Consumers evaluate and choose cloud-based services based on the Service Level Agreements (SLA). These agreements
list the service terms and metrics to be agreed upon by the service providers and the customers. Current cloud SLAs are text
documents that require significant manual effort to parse and determine if providers meet the SLAs. Moreover, due to the lack of
standardization, providers differ in the way they define the terms and metrics, making it more difficult to compare different p...]]></description>
  <dc:date>2022-01-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/852/Delegated-Authorization-Framework-for-EHR-Services-using-Attribute-Based-Encryption">
  <title><![CDATA[Delegated Authorization Framework for EHR Services using Attribute Based Encryption]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/852/Delegated-Authorization-Framework-for-EHR-Services-using-Attribute-Based-Encryption</link>
  <description><![CDATA[Medical organizations find it challenging to adopt cloud-based Electronic Health Records (EHR) services due to the risk of data breaches and the resulting compromise of patient data. Existing authorization models follow a patient-centric approach for EHR management, where the responsibility of authorizing data access is handled at the patient's end. This creates a significant overhead for the patient who must authorize every access of their health record. This is not practical given that mult...]]></description>
  <dc:date>2021-11-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/993/The-Effect-of-Text-Ambiguity-on-creating-Policy-Knowledge-Graphs">
  <title><![CDATA[The Effect of Text Ambiguity on creating Policy Knowledge Graphs]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/993/The-Effect-of-Text-Ambiguity-on-creating-Policy-Knowledge-Graphs</link>
  <description><![CDATA[A growing number of web and cloud-based products and services rely on data sharing between consumers, service providers, and their subsidiaries and third parties. There is a growing concern around the security and privacy of data in such large-scale shared architectures. Most organizations have a human-written privacy policy that discloses all the ways that data is shared, stored, and used. The organizational privacy policies must also be compliant with government and administrative regulatio...]]></description>
  <dc:date>2021-09-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/30/Cloud-computing">
  <title><![CDATA[Cloud computing]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/30/Cloud-computing</link>
  <description><![CDATA[Delivery of IT Service is moving away from a single provider mode, and is increasingly based on the composition of multiple services and assets (technological, human, or process) that may be supplied by one or more service providers distributed across the network – in the cloud. Moreover, a single service could be a part of many composite services as needed. The service, in effect, is virtualized on the cloud. Our research in this area is currently concentrated on developing methodology for...]]></description>
  <dc:date>2026-04-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/333/Automatically-Generating-Linked-Data-from-Tables">
  <title><![CDATA[Automatically Generating Linked Data from Tables]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/333/Automatically-Generating-Linked-Data-from-Tables</link>
  <description><![CDATA[Evidence for a table’s meaning can be found in its metadata but currently requires human interpretation. We describe techniques grounded in graphical models and probabilistic reasoning to infer meaning associated with a table. Using background knowledge from the Linked Open Data cloud, we automatically infer the semantics of column headers, table cell values (e.g., strings and numbers) and relations between columns and represent the inferred meaning as graph of RDF triples.]]></description>
  <dc:date>2011-11-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/281/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web">
  <title><![CDATA[Blackbook3: A Graph Analytic Processing Platform For The Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/281/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web</link>
  <description><![CDATA[Started in 2006, Blackbook3 is primarily an RDF middleware framework for integrating data and executing algorithms. Its purpose is to enable content providers and developers to focus on their unique problem, allowing Blackbook3 to handle the production-level, enterprise framing that is commonly duplicated. Security, web services, ingestion tools, visualizers,workflow, and analyst applications are provided as additional features. This talk will go into the current and future use cases for Bla...]]></description>
  <dc:date>2009-10-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/361/Cloud-Security-and-Compliance-Ontology">
  <title><![CDATA[Cloud Security and Compliance Ontology]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/361/Cloud-Security-and-Compliance-Ontology</link>
  <description><![CDATA[Ontology describing Cloud data threats, security controls and compliance standards]]></description>
  <dc:date>2014-07-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/349/Context-Aware-Privacy-Policies-in-Mobile-and-Social-Computing">
  <title><![CDATA[Context-Aware Privacy Policies in Mobile and Social Computing]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/349/Context-Aware-Privacy-Policies-in-Mobile-and-Social-Computing</link>
  <description><![CDATA[Social media and mobile computing are becomming increasingly intertwined.  Most of us now use our laptops, tablets and smartphones much more than desktop computers.  These devices sync all kinds of data with the cloud and each other.  We should attend to both mobile computering and social computing in addressing privacy by giving users ways to limit who can see what,

Presentation for the SRI Social Media Workshop -- Social Media Analytics, Communications and Use Cases, Arlington, VA, Janua...]]></description>
  <dc:date>2013-01-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/316/Generating-Linked-Data-by-inferring-the-semantics-of-tables">
  <title><![CDATA[Generating Linked Data by inferring the semantics of tables]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/316/Generating-Linked-Data-by-inferring-the-semantics-of-tables</link>
  <description><![CDATA[A vast amount of information is encoded in tables on the web, spreadsheets and databases. Considerable work has been focused on exploiting unstructured free text; however techniques that are effective for documents and free text do not work well with tables. Early work in table interpretation in the field of document analysis and later on the Web, focused mainly on understanding and extracting tables from scanned documents and html web pages. Relatively little work has addressed the understan...]]></description>
  <dc:date>2011-05-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/321/Generating-Linked-Data-by-inferring-the-semantics-of-tables">
  <title><![CDATA[Generating Linked Data by inferring the semantics of tables]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/321/Generating-Linked-Data-by-inferring-the-semantics-of-tables</link>
  <description><![CDATA[Vast amounts of information is encoded in structured tables found in documents, on the Web, and in spreadsheets or databases. Integrating or searching over this information benefits from understanding its intended meaning. Evidence for a table's meaning can be found in its column headers, cell values, implicit relations between columns, caption and surrounding text but also requires general and domain-specific background knowledge. We represent a table's meaning by mapping columns to classes ...]]></description>
  <dc:date>2011-09-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/325/IT-Service-Ontology">
  <title><![CDATA[IT Service Ontology]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/325/IT-Service-Ontology</link>
  <description><![CDATA[OWL Ontology for IT Services delivered via the Cloud. Developed by Karuna P Joshi, CSEE Department, UMBC Last Update: Sep 30 2009.

https://ebiquity.umbc.edu/ontologies/itso/1.0/itso.owl]]></description>
  <dc:date>1999-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/368/Oblivious-Cloud-Storage-Ontology">
  <title><![CDATA[Oblivious Cloud Storage Ontology]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/368/Oblivious-Cloud-Storage-Ontology</link>
  <description><![CDATA[This is ontology defined for storing data obliviously on cloud infrastructure. It defines classes such as encryption policy, storage policy, key management etc.]]></description>
  <dc:date>2016-03-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/344/Ontology-for-Cloud-Services-SLA-Service-Level-Agreement-">
  <title><![CDATA[Ontology for Cloud Services SLA (Service Level Agreement)]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/344/Ontology-for-Cloud-Services-SLA-Service-Level-Agreement-</link>
  <description><![CDATA[Ontology for Cloud Services SLA. This ontology is used to automate negotiation while acquiring virtualized cloud based services.]]></description>
  <dc:date>2012-04-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/370/Ontology-for-Data-Privacy-Policy">
  <title><![CDATA[Ontology for Data Privacy Policy]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/370/Ontology-for-Data-Privacy-Policy</link>
  <description><![CDATA[We have developed a detailed ontology, using semantic web language OWL, to define the range of information that should be included in the Privacy Policy documents. This ontology can be used by user communities to determine their privacy policies for using applications in the E-Commerce, Big Data and Cloud Computing domain.]]></description>
  <dc:date>2016-10-30</dc:date>
 </item>
</rdf:RDF>
