<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=compliance">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=compliance]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for compliance]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/198/Aware-Home"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/110/Medical-Data-Polygraph"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/111/Medical-Device-Regulatory-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1214/Measuring-the-Compliance-Costs-of-Exchanging-Part-2-Healthcare-Claims-Data-Through-Blockchain"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1207/LLM-based-Knowledge-Graph-Approach-to-Automating-Medical-Device-Regulatory-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1212/TRUCE-TRUsted-Compliance-Enforcement-Service-for-Secure-Health-Data-Exchange"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1200/Automating-IoT-Data-Privacy-Compliance-by-Integrating-Knowledge-Graphs-With-Large-Language-Models"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1156/Privacy-Preserving-Data-Sharing-in-Agriculture-Enforcing-Policy-Rules-for-Secure-and-Confidential-Data-Synthesis"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/361/Cloud-Security-and-Compliance-Ontology"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/198/Aware-Home">
  <title><![CDATA[Aware Home]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/198/Aware-Home</link>
  <description><![CDATA[The average age of the world population is growing rapidly, while the fastest growing segment of the population is adults over the age of 65. Compounded by this growth is an increase in longevity, escalating instances of age-related diseases such as Alzheimer’s and dementia. Supporting the ability for the elderly or people with disabilities to live at home longer is of both personal and economic benefit to the individual. We expect that emerging technologies can facilitate this process. Our...]]></description>
  <dc:date>2007-04-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released">
  <title><![CDATA[SweetRules v2.1 released]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released</link>
  <description><![CDATA[First Platform for Semantic Web Rules Now Includes Web Services 
Support and More:  SweetRules V2.1 Released Open Source
 

Contacts: Chitro Neogy (chitro@mit.edu) and Benjamin Grosof (bgrosof@mit.edu)
 
CAMBRIDGE, MA, USA, April 25:  
 
SweetRules, a uniquely powerful integrated set of tools for semantic
web rules and ontologies, is newly enhanced in V2.1 with several
first-of-a-kind capabilities, including support for rule-triggered
WSDL Web Services, RuleML presentation syntax f...]]></description>
  <dc:date>2005-04-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics">
  <title><![CDATA[ALDA: Automated Legal Document Analytics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics</link>
  <description><![CDATA[There has been an exponential growth in use of digitized legal documents in recent years. Majority of services on the Internet have associated legal documents such as Terms of Services, Privacy Policies and Service Level agreements. A large corpus of court cases, judgments and compliance/regulations are now digitally available for e-discovery. Moreover, businesses are maintaining large data sets of legal contracts that they have signed with their employees, customers and contractors. Furtherm...]]></description>
  <dc:date>2014-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures">
  <title><![CDATA[Data Privacy management using Policy compliant Blockchain structures]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures</link>
  <description><![CDATA[An important requirement of any information management system is to protect data and resources against leak or improper modifications, while at the same time ensure data availability to legitimate users. Moreover, systems handling personal data must also track its provenance and be regularly audited to comply with regulations. By assuring auditable, privacy policy compliant actions, we can also guarantee that areas where privacy policies have been technically enforced are highlighted.

As p...]]></description>
  <dc:date>2016-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/110/Medical-Data-Polygraph">
  <title><![CDATA[Medical Data Polygraph]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/110/Medical-Data-Polygraph</link>
  <description><![CDATA[Healthcare organizations exchange sensitive health records, including behavioral health data, across peer-to-peer networks, and it is challenging to find and fix compliance issues proactively.

The Healthcare industry anticipates a growing need to audit substance use disorder patient data, commonly referred to as Part 2 data, having been shared without a release of information signed by the patient. To address this need, we developed and evaluated a novel methodology to detect Part 2 data e...]]></description>
  <dc:date>2022-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/111/Medical-Device-Regulatory-Compliance">
  <title><![CDATA[Medical Device Regulatory Compliance]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/111/Medical-Device-Regulatory-Compliance</link>
  <description><![CDATA[Healthcare providers are deploying a large number of AI-driven Medical devices to help monitor and medicate patients. For patients with chronic ailments, like diabetes or gastric diseases, usage of these devices becomes part of their daily lifestyle. These medical devices often capture personally identifiable information (PII) and hence are strictly regulated by the Food and Drug Administration (FDA) to ensure the safety and efficacy of the medical device. Medical device regulations are curre...]]></description>
  <dc:date>2023-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1214/Measuring-the-Compliance-Costs-of-Exchanging-Part-2-Healthcare-Claims-Data-Through-Blockchain">
  <title><![CDATA[Measuring the Compliance Costs of Exchanging Part 2 Healthcare Claims Data Through Blockchain]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1214/Measuring-the-Compliance-Costs-of-Exchanging-Part-2-Healthcare-Claims-Data-Through-Blockchain</link>
  <description><![CDATA[Patient selections for keeping data confidential may differ between healthcare organizations, creating conflicts
in confidentiality for how sensitive and demographic data is linked and merged. Validating that patient data
exchange between organizations adheres to healthcare regulations, like the Health Insurance Portability and
Accountability Act (HIPAA), is challenging and time-consuming and relies upon organizational due diligence
to validate data upon receipt, or in the case of breache...]]></description>
  <dc:date>2026-03-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1207/LLM-based-Knowledge-Graph-Approach-to-Automating-Medical-Device-Regulatory-Compliance">
  <title><![CDATA[LLM based Knowledge Graph Approach to Automating Medical Device Regulatory Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1207/LLM-based-Knowledge-Graph-Approach-to-Automating-Medical-Device-Regulatory-Compliance</link>
  <description><![CDATA[Advanced medical devices increasingly rely on AI driven frameworks to automate compliance processes, ensuring safety and efficacy while reducing regulatory burdens. In the US, software-based medical devices, including those utilizing AI/ML models, are regulated by the FDA’s Center for Devices and Radiological Health (CDRH) under the Code of Federal Regulations (CFR) Title 21. These regulations are extensive, cross-referenced documents that require significant human effort to parse, leading ...]]></description>
  <dc:date>2025-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin">
  <title><![CDATA[Security Compliance for Smart Manufacturing using Knowledgegraph based Digital Twin]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin</link>
  <description><![CDATA[The combination of Information Technology (IT) and Operational Technology (OT) in smart manufacturing, driven by smart factory innovations and Internet of Things (IoT) devices, generates vast, diverse, and rapidly evolving Big Data, which in turn increases cybersecurity and compliance issues. Adherence to security standards, such as NIST SP 800-171, which requires rigorous access control and audit reporting, is currently obstructed by the resource-intensive and error-prone aspects of manual e...]]></description>
  <dc:date>2025-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1212/TRUCE-TRUsted-Compliance-Enforcement-Service-for-Secure-Health-Data-Exchange">
  <title><![CDATA[TRUCE: TRUsted Compliance Enforcement Service for Secure Health Data Exchange]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1212/TRUCE-TRUsted-Compliance-Enforcement-Service-for-Secure-Health-Data-Exchange</link>
  <description><![CDATA[Organizations are increasingly sharing large volumes of sensitive Personally Identifiable Information (PII), like health records, with each other to better manage their services. Protecting PII data has become increasingly important in today's digital age, and several regulations have been formulated to ensure the secure exchange and management of sensitive personal data. However, at times some of these regulations are at loggerheads with each other, like the Health Insurance Portability and ...]]></description>
  <dc:date>2025-12-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1200/Automating-IoT-Data-Privacy-Compliance-by-Integrating-Knowledge-Graphs-With-Large-Language-Models">
  <title><![CDATA[Automating IoT Data Privacy Compliance by Integrating Knowledge Graphs With Large Language Models]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1200/Automating-IoT-Data-Privacy-Compliance-by-Integrating-Knowledge-Graphs-With-Large-Language-Models</link>
  <description><![CDATA[Regulatory compliance is mandatory for Internet of Things (IoT) manufacturers, particularly under stringent frameworks such as the General Data Protection Regulation (GDPR), which governs the handling of personal data. We introduce a novel framework for automating IoT compliance verification by integrating a Large Language Model (LLM) with a domain-specific Knowledge Graph (KG). The framework achieves two primary objectives: 1) leveraging the LLM to interpret natural-language compliance queri...]]></description>
  <dc:date>2025-07-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance">
  <title><![CDATA[Integrating Knowledge Graphs with Retrieval-Augmented Generation to Automate IoT Device Security Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance</link>
  <description><![CDATA[As IoT device adoption grows, ensuring cybersecurity compliance with IoT standards, like National Institute of Standards and Technology Interagency (NISTIR) 8259A, has become increasingly complex. These standards are typically presented in lengthy, text-based formats that are difficult to process and query automatically. We built a knowledge graph to address this challenge to represent the key concepts, relationships, and references within NISTIR 8259A. We further integrate this knowledge gra...]]></description>
  <dc:date>2025-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance">
  <title><![CDATA[MedReg-KG: KnowledgeGraph for Streamlining Medical Device Regulatory Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance</link>
  <description><![CDATA[Healthcare providers are deploying a large number
of AI-driven Medical devices to help monitor and medicate
patients. For patients with chronic ailments, like diabetes or
gastric diseases, usage of these devices becomes part of their
daily lifestyle. These medical devices often capture personally
identifiable information (PII) and hence are strictly regulated by
the Food and Drug Administration (FDA) to ensure the safety
and efficacy of the medical device. Medical device regulations
a...]]></description>
  <dc:date>2024-12-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1156/Privacy-Preserving-Data-Sharing-in-Agriculture-Enforcing-Policy-Rules-for-Secure-and-Confidential-Data-Synthesis">
  <title><![CDATA[Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1156/Privacy-Preserving-Data-Sharing-in-Agriculture-Enforcing-Policy-Rules-for-Secure-and-Confidential-Data-Synthesis</link>
  <description><![CDATA[Big Data empowers the farming community with the information needed to optimize resource usage, increase productivity, and enhance the sustainability of agricultural practices. The use of Big Data in farming requires the collection and analysis of data from various sources such as sensors, satellites, and farmer surveys. While Big Data can provide the farming community with valuable insights and improve efficiency, there is significant concern regarding the security of this data as well as th...]]></description>
  <dc:date>2023-12-18</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance">
  <title><![CDATA[IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance</link>
  <description><![CDATA[The proliferation of the Internet of Things (IoT) has led to an exponential increase in data generation, especially from wearable IoT devices. While this data influx offers unparalleled insights and connectivity, it also brings significant privacy and security challenges. Existing regulatory frameworks like the United States (US) National Institute of Standards and Technology Interagency or Internal Report (NISTIR) 8228, the US Health Insurance Portability and Accountability Act (HIPAA), and ...]]></description>
  <dc:date>2023-12-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations">
  <title><![CDATA[Ensuring Privacy Policy Compliance of Wearables with IoT Regulations]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations</link>
  <description><![CDATA[In an era where wearables, particularly those in non-hospital settings, collect and transmit sensitive personal data, it is imperative to implement stringent privacy safeguards. The National Institute of Standards and Technology (NIST) Internal Report 8228 provides regulations for securing Internet of Things (IoT) devices, data, and the privacy of individuals. We have developed a novel framework for examining the privacy policies governing the data and information utilized by wearable devices...]]></description>
  <dc:date>2023-11-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System">
  <title><![CDATA[Question and Answering (QnA) System]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System</link>
  <description><![CDATA[Our research focuses on developing new techniques and approaches to developing Question and Answer (QnA) systems. We focus on developing semantically rich , policy based applications that cater to a variety of domains like cybersecurity and Legal/Compliance.]]></description>
  <dc:date>2026-04-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/361/Cloud-Security-and-Compliance-Ontology">
  <title><![CDATA[Cloud Security and Compliance Ontology]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/361/Cloud-Security-and-Compliance-Ontology</link>
  <description><![CDATA[Ontology describing Cloud data threats, security controls and compliance standards]]></description>
  <dc:date>2014-07-27</dc:date>
 </item>
</rdf:RDF>
