<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=enterprise">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=enterprise]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for enterprise]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/456/Energy-efficient-semantic-context-model-for-managing-privacy-on-smartphones"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/457/Energy-efficient-semantic-context-model-for-managing-privacy-on-smartphones"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/450/An-energy-efficient-semantic-context-model-for-managing-privacy-on-smartphones"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/441/An-architecture-for-enterprise-information-interoperability"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/318/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/278/Reverse-engineering-RBAC-policies-using-ILP"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/201/Service-Oriented-Computing-Next-Generation-Integration-of-Software-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/198/Aware-Home"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/181/The-Business-of-Blogging"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/33/Intrusion-Detection"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/72/Policy-Management-for-Enterprise-Applications"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/106/Secure-and-Oblivious-Cloud-Storage-and-Deletion"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/948/An-Integrated-Knowledge-Graph-to-Automate-Cloud-Data-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/878/Scalability-Analysis-of-Blockchain-on-a-Serverless-Cloud"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/762/ALDA-Cognitive-Assistant-for-Legal-Document-Analytics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/737/Managing-Cloud-Storage-Obliviously"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/654/Cloud-Data-Management-Policies-Security-and-Privacy-Checklist"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/617/ACM-HotMobile-2013-Poster-An-Energy-Efficient-Semantic-Context-Model-for-Managing-Privacy-on-Smartphones"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/601/A-Supplier-Discovery-Framework-For-Effective-And-Efficient-Configuration-Of-A-Supply-Chain"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/541/Context-Aware-Middleware-for-Activity-Recognition"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/393/Enforcing-security-in-semantics-driven-policy-based-networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/281/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/98/Introducing-Semantic-Technologies-and-the-Vision-of-the-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/43/Ontologies-for-mobile-and-pervasive-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/188/Semantic-Web-Technologies-A-Tutorial"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/206/The-Business-of-Blogging-the-Good-Bad-and-the-Wonderful"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/456/Energy-efficient-semantic-context-model-for-managing-privacy-on-smartphones">
  <title><![CDATA[Energy efficient semantic context model for managing privacy on smartphones]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/456/Energy-efficient-semantic-context-model-for-managing-privacy-on-smartphones</link>
  <description><![CDATA[Modern smartphones are capable of gathering massive amounts of data about a user and her context. While this data is mostly utilized for providing services that are better suited to the user, user data and context leakage from smart phones can have disastrous results. This is especially true as most enterprises are going to a Bring-Your-Own-Device (BYOD) model for mobile devices such as smartphones. We recognize this change as a potential threat to data privacy, both of the user and also of c...]]></description>
  <dc:date>2013-04-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/457/Energy-efficient-semantic-context-model-for-managing-privacy-on-smartphones">
  <title><![CDATA[Energy efficient semantic context model for managing privacy on smartphones]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/457/Energy-efficient-semantic-context-model-for-managing-privacy-on-smartphones</link>
  <description><![CDATA[Modern smartphones are capable of gathering massive amounts of data about a user and her context. While this data is mostly utilized for providing services that are better suited to the user, user data and context leakage from smart phones can have disastrous results. This is especially true as most enterprises are going to a Bring-Your-Own-Device (BYOD) model for mobile devices such as smartphones. We recognize this change as a potential threat to data privacy, both of the user and also of c...]]></description>
  <dc:date>2013-04-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/450/An-energy-efficient-semantic-context-model-for-managing-privacy-on-smartphones">
  <title><![CDATA[An energy efficient semantic context model for managing privacy on smartphones]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/450/An-energy-efficient-semantic-context-model-for-managing-privacy-on-smartphones</link>
  <description><![CDATA[Modern smartphones are capable of gathering massive amounts of data about a user and her context. While this data is mostly utilized for providing services that are better suited to the user, user data and context leakage from smart phones can have disastrous results. This is especially true as most enterprises are going to a Bring-Your-Own-Device (BYOD) model for mobile devices such as smartphones. We recognize this change as a potential threat to data privacy, both of the user and also of c...]]></description>
  <dc:date>2013-03-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/441/An-architecture-for-enterprise-information-interoperability">
  <title><![CDATA[An architecture for enterprise information interoperability]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/441/An-architecture-for-enterprise-information-interoperability</link>
  <description><![CDATA[The World Wide Web differed from other early hypertext systems in the removal of "back links" (the ability of a hyperlinked object to link back to a referring resource). The removal of back links allowed the scalability inherent in the Web's design, but sacrificed the knowledge necessary to update links when content moved. Persistent URLs (PURLs) have been used on the Web since 1995 to provide an inexpensive and partial solution to link updates via HTTP redirection: PURLs do not change thei...]]></description>
  <dc:date>2012-11-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition">
  <title><![CDATA[Context-Aware Middleware for Activity Recognition]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition</link>
  <description><![CDATA[Smartphones and other mobile devices have a simple notion of context largely restricted to temporal and spatial coordinates. Service providers and enterprise administrators can deploy systems incorporating activity and relations context to enhance the user experience, but this raises considerable collaboration, trust and privacy issues between different service providers. Our work is an initial step toward enabling devices themselves to represent, acquire and use a richer notion of context th...]]></description>
  <dc:date>2011-05-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/318/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web">
  <title><![CDATA[Blackbook3:  A Graph Analytic Processing Platform For The Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/318/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web</link>
  <description><![CDATA[Lance Byrd and Set Cruz will talk about Blackbook, a Graph Analytic Processing Platform For The Semantic Web.

 Started in 2006, Blackbook3 is primarily an RDF middleware framework for integrating data and executing algorithms.  Its purpose is to enable content providers and developers to focus on their unique problem, allowing Blackbook3 to handle the production-level, enterprise framing that is commonly duplicated.  Security, web services, ingestion tools, visualizers,workflow, and analys...]]></description>
  <dc:date>2009-10-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/278/Reverse-engineering-RBAC-policies-using-ILP">
  <title><![CDATA[Reverse engineering RBAC policies using ILP]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/278/Reverse-engineering-RBAC-policies-using-ILP</link>
  <description><![CDATA[RBAC (Role Based Access Control [1]) is a predominant model used for
advanced access control. A variety of IT vendors have provided RBAC
implementations in their systems. RBAC provides great flexibility and
breadth of application. System administrators can control access at
a level of abstraction that is natural to the way that enterprises
typically conduct business. These features of RBAC make it suitable
for deployment over a variety of web applications like social
networks, academic...]]></description>
  <dc:date>2008-12-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/201/Service-Oriented-Computing-Next-Generation-Integration-of-Software-Systems">
  <title><![CDATA[Service-Oriented Computing: Next-Generation Integration of Software Systems]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/201/Service-Oriented-Computing-Next-Generation-Integration-of-Software-Systems</link>
  <description><![CDATA[The inception of the Internet has greatly enhanced the modularity in distributed software systems. Either by accessing networked services, realized as web services, or by downloading and exploiting component-based software from open source repositories, consumers have a greater capability for incorporating the software modules of other entities into their own systems environment. Sometimes referred to as "enterprise integration", this area is equally applicable to the electronic commerce doma...]]></description>
  <dc:date>2007-05-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/198/Aware-Home">
  <title><![CDATA[Aware Home]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/198/Aware-Home</link>
  <description><![CDATA[The average age of the world population is growing rapidly, while the fastest growing segment of the population is adults over the age of 65. Compounded by this growth is an increase in longevity, escalating instances of age-related diseases such as Alzheimer’s and dementia. Supporting the ability for the elderly or people with disabilities to live at home longer is of both personal and economic benefit to the individual. We expect that emerging technologies can facilitate this process. Our...]]></description>
  <dc:date>2007-04-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/181/The-Business-of-Blogging">
  <title><![CDATA[The Business of Blogging]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/181/The-Business-of-Blogging</link>
  <description><![CDATA[Blogs are radically changing the face of communications on the Internet.
Beyond publishing content, blogs enable users to engage in conversation and form tight knit communities, constituting a highly influential subset on the Web. While the benefit of blogs to individuals is well studied, their
utility for an enterprise is less well understood.


This presentation details how enterprises can benefit from adopting blogs, internally, and externally, in the context of IBM.  We discuss how b...]]></description>
  <dc:date>2006-10-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released">
  <title><![CDATA[SweetRules v2.1 released]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released</link>
  <description><![CDATA[First Platform for Semantic Web Rules Now Includes Web Services 
Support and More:  SweetRules V2.1 Released Open Source
 

Contacts: Chitro Neogy (chitro@mit.edu) and Benjamin Grosof (bgrosof@mit.edu)
 
CAMBRIDGE, MA, USA, April 25:  
 
SweetRules, a uniquely powerful integrated set of tools for semantic
web rules and ontologies, is newly enhanced in V2.1 with several
first-of-a-kind capabilities, including support for rule-triggered
WSDL Web Services, RuleML presentation syntax f...]]></description>
  <dc:date>2005-04-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics">
  <title><![CDATA[ALDA: Automated Legal Document Analytics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics</link>
  <description><![CDATA[There has been an exponential growth in use of digitized legal documents in recent years. Majority of services on the Internet have associated legal documents such as Terms of Services, Privacy Policies and Service Level agreements. A large corpus of court cases, judgments and compliance/regulations are now digitally available for e-discovery. Moreover, businesses are maintaining large data sets of legal contracts that they have signed with their employees, customers and contractors. Furtherm...]]></description>
  <dc:date>2014-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking">
  <title><![CDATA[CoCoNet: Content and Context Aware Networking]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking</link>
  <description><![CDATA[The current Internet was originally designed to provide best-effort data
transport over a wired infrastructure with end hosts utilizing a layered
network stack to provide reliability, quality of service, security etc.
for user applications.  However, the proliferation of inelastic
applications, coupled with wide spread migration towards hybrid networks
utilizing wired and wireless links and the plethora of end host variants
ranging from cell phones to enterprise servers necessitates the...]]></description>
  <dc:date>2005-07-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/33/Intrusion-Detection">
  <title><![CDATA[Intrusion Detection]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/33/Intrusion-Detection</link>
  <description><![CDATA[Our vision of an intrusion detection system is one where the "system" encompasses the entire enterprise and where intrusion detection is a distributed and collaborative process involving the entities within the enterprise.  We view an entity as any
computational device to include computers, servers, switches, and
routers and where intrusion detectors are comprised of both anomaly and signature detectors that communicate with each other.  We have initiated work toward realizing our vision an...]]></description>
  <dc:date>2002-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/72/Policy-Management-for-Enterprise-Applications">
  <title><![CDATA[Policy Management for Enterprise Applications]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/72/Policy-Management-for-Enterprise-Applications</link>
  <description><![CDATA[This project explores the role of policy management in enterprise applications where --

The workflow and the information it operates on are well structured.
Knowledge on the Web influences decisions made by role players.]]></description>
  <dc:date>2005-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/106/Secure-and-Oblivious-Cloud-Storage-and-Deletion">
  <title><![CDATA[Secure and Oblivious Cloud Storage and Deletion]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/106/Secure-and-Oblivious-Cloud-Storage-and-Deletion</link>
  <description><![CDATA[Cloud based storage services are increasingly being used by consumers for their enterprise storage needs. Cloud storage service should provide confidentiality and integrity along with high availability and reliability. These often contradicting requirements results in research challenges that this project aims to address.
 This project addressed the open issues with developing an Oblivious Cloud storage  architecture. 
This project was a joint collaboration between UMBC and USNA. This proje...]]></description>
  <dc:date>2014-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/948/An-Integrated-Knowledge-Graph-to-Automate-Cloud-Data-Compliance">
  <title><![CDATA[An Integrated Knowledge Graph to Automate Cloud Data Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/948/An-Integrated-Knowledge-Graph-to-Automate-Cloud-Data-Compliance</link>
  <description><![CDATA[To address data protection concerns, authorities and standards bodies worldwide have released a plethora of regulations, guidelines, and software controls to be applied to Cloud data. As a result, service providers maintaining their end-user’s private attributes have seen a surge in compliance requirements. Since most of these regulations are not available in a machine-processable format, it requires significant manual effort to adhere to them. Often many of the laws have overlapping rules,...]]></description>
  <dc:date>2020-11-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/878/Scalability-Analysis-of-Blockchain-on-a-Serverless-Cloud">
  <title><![CDATA[Scalability Analysis of Blockchain on a Serverless Cloud]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/878/Scalability-Analysis-of-Blockchain-on-a-Serverless-Cloud</link>
  <description><![CDATA[While adopting Blockchain technologies to automate their enterprise functionality, organizations are recognizing the challenges of scalability and manual configuration that the state of art present. Scalability of Hyperledger Fabric is an open challenge recognized by the research community. We have automated many of the configuration steps of installing Hyperledger Fabric Blockchain on AWS infrastructure and have benchmarked the scalability of that system. We have used the UCR (University of ...]]></description>
  <dc:date>2019-12-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/762/ALDA-Cognitive-Assistant-for-Legal-Document-Analytics">
  <title><![CDATA[ALDA : Cognitive Assistant for Legal Document Analytics]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/762/ALDA-Cognitive-Assistant-for-Legal-Document-Analytics</link>
  <description><![CDATA[In recent times, there has been an exponential growth in digitization of legal documents such as case records, contracts,
terms of services, regulations, privacy documents and compliance guidelines. Courts have been digitizing their archived
cases and also making it available for e-discovery. On the
other hand, businesses are now maintaining large data sets
of legal contracts that they have signed with their employees,
customers and contractors. Large public sector organizations
are oft...]]></description>
  <dc:date>2016-09-18</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/737/Managing-Cloud-Storage-Obliviously">
  <title><![CDATA[Managing Cloud Storage Obliviously]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/737/Managing-Cloud-Storage-Obliviously</link>
  <description><![CDATA[Consumers want to ensure that their enterprise data is stored securely and obliviously on the cloud, such that the data objects or their access patterns are not revealed to anyone, including the cloud provider, in the public cloud environment. We have created a detailed ontology describing the oblivious cloud stor-age models and role based access controls that should be in place to manage this risk. We have developed an algorithm to store cloud data using oblivious data structure defined in t...]]></description>
  <dc:date>2016-06-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/654/Cloud-Data-Management-Policies-Security-and-Privacy-Checklist">
  <title><![CDATA[Cloud Data Management Policies: Security and Privacy Checklist]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/654/Cloud-Data-Management-Policies-Security-and-Privacy-Checklist</link>
  <description><![CDATA[Organizations have complex enterprise data policies, as well as legal and statutory constraints, that require compliance. Such policies are today enforced on internal resources that are completely controlled by the organization. On moving to a cloud based solution, the organization has to often hand over this control to the service provider. Hence, acquiring cloud services requires significant human intervention and negotiation -- people have to check whether a provider’s service attributes...]]></description>
  <dc:date>2014-05-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/617/ACM-HotMobile-2013-Poster-An-Energy-Efficient-Semantic-Context-Model-for-Managing-Privacy-on-Smartphones">
  <title><![CDATA[ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/617/ACM-HotMobile-2013-Poster-An-Energy-Efficient-Semantic-Context-Model-for-Managing-Privacy-on-Smartphones</link>
  <description><![CDATA[Modern smartphones are capable of gathering massive amounts of data about a user and her context. While this data is mostly utilized for providing services that are better suited to the user, user data and context leakage from smart phones can have disastrous results. This is especially true as most enterprises are going to a Bring-Your-Own-Device (BYOD) model for mobile devices such as smartphones. We recognize this change as a potential threat to data privacy, both of the user and also of c...]]></description>
  <dc:date>2013-07-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/601/A-Supplier-Discovery-Framework-For-Effective-And-Efficient-Configuration-Of-A-Supply-Chain">
  <title><![CDATA[A Supplier Discovery Framework For Effective And Efficient Configuration Of A Supply Chain]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/601/A-Supplier-Discovery-Framework-For-Effective-And-Efficient-Configuration-Of-A-Supply-Chain</link>
  <description><![CDATA[A supplier registry can play a central role in configuring a global supply chain for service-oriented enterprise integration by
providing an open platform for publishing and discovering suppliers distributed over Internet. The availability of correct 
classification schemes used to organize suppliers based on their capability descriptions is the key to building an effective 
registry. This paper discusses the clustering-based construction of classification schemes from existing  capability...]]></description>
  <dc:date>2011-11-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/541/Context-Aware-Middleware-for-Activity-Recognition">
  <title><![CDATA[Context-Aware Middleware for Activity Recognition]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/541/Context-Aware-Middleware-for-Activity-Recognition</link>
  <description><![CDATA[Smart phones and other mobile devices have a simple notion of context largely restricted to temporal and spatial coordinates. Service providers and enterprise administrators can deploy systems incorporating activity and relations context to enhance the user experience, but this raises considerable collaboration, trust and privacy issues between different service providers. Our work is an initial step toward enabling devices themselves to represent, acquire and use a richer notion of context t...]]></description>
  <dc:date>2011-05-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks">
  <title><![CDATA[Enforcing security in semantics driven policy based networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks</link>
  <description><![CDATA[Security is an important requirement in scenarios such as mobile computing that allow users to make meaningful ad hoc collaborations. Traditional security solutions are not feasible for these scenarios due to the varying nature of the collaborations. We propose an extensible framework that takes the semantics of the collaboration into account and uses semantics driven policies for enforcing security. Our policies are rooted in semantic web languages which make them amenable to interoperabilit...]]></description>
  <dc:date>2011-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/393/Enforcing-security-in-semantics-driven-policy-based-networks">
  <title><![CDATA[Enforcing security in semantics driven policy based networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/393/Enforcing-security-in-semantics-driven-policy-based-networks</link>
  <description><![CDATA[Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data being involved. Further more, the wide spread use of portable devices such as laptops, PDAs etc. allows users to make meaningful ad hoc collaborations. Traditional security solutions are not feasible for these scenarioes due to the varying nature of the collaborations in terms of entities involved and their roles, availa...]]></description>
  <dc:date>2008-04-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/281/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web">
  <title><![CDATA[Blackbook3: A Graph Analytic Processing Platform For The Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/281/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web</link>
  <description><![CDATA[Started in 2006, Blackbook3 is primarily an RDF middleware framework for integrating data and executing algorithms. Its purpose is to enable content providers and developers to focus on their unique problem, allowing Blackbook3 to handle the production-level, enterprise framing that is commonly duplicated. Security, web services, ingestion tools, visualizers,workflow, and analyst applications are provided as additional features. This talk will go into the current and future use cases for Bla...]]></description>
  <dc:date>2009-10-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/98/Introducing-Semantic-Technologies-and-the-Vision-of-the-Semantic-Web">
  <title><![CDATA[Introducing Semantic Technologies and the Vision of the Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/98/Introducing-Semantic-Technologies-and-the-Vision-of-the-Semantic-Web</link>
  <description><![CDATA[A recent white paper 
Introducing Semantic Technologies and the Vision of the Semantic
Web (PDF) (v5.4, 16 February 2005) is aimed at explaining
applications of semantic technologies to agency executives, CIOs,
enterprise architects, IT professionals, program managers, and others
within government agencies responsible for data and knowledge
management.  The paper discusses applications to semantic web
services, information interoperability, and intelligent search as well
as the curren...]]></description>
  <dc:date>2005-02-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/43/Ontologies-for-mobile-and-pervasive-computing">
  <title><![CDATA[Ontologies for mobile and pervasive computing]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/43/Ontologies-for-mobile-and-pervasive-computing</link>
  <description><![CDATA[This tutorial by TIm Finin and Harry Chen provides an overview of the use of ontologies and semantic web languages in mobile and pervasive computing Applications. In information systems, ontologies are explicit formal specifications of a domain's concepts, objects, and relations. Ontologies provide both a model of information to be represented and a vocabulary to use in describing it. The semantic web languages RDF and OWL have been developed and standardized by the W3C to allow data and know...]]></description>
  <dc:date>2004-08-03</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/188/Semantic-Web-Technologies-A-Tutorial">
  <title><![CDATA[Semantic Web Technologies: A Tutorial]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/188/Semantic-Web-Technologies-A-Tutorial</link>
  <description><![CDATA[People become "smarter" by using web search engines like Google to obtain relevant and useful information from the World Wide Web. The Semantic Web aims at making such knowledge more accessible to computer programs, i.e. building “a web of data, in some ways like a global database” as suggested by Tim Berners-Lee.  This tutorial gives an overview of Semantic Web technologies and their utility.

The Semantic Web technologies can be studied from two aspects. From the web aspect, Semantic ...]]></description>
  <dc:date>2006-07-18</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/206/The-Business-of-Blogging-the-Good-Bad-and-the-Wonderful">
  <title><![CDATA[The Business of Blogging: the Good, Bad and the Wonderful]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/206/The-Business-of-Blogging-the-Good-Bad-and-the-Wonderful</link>
  <dc:date>2006-10-20</dc:date>
 </item>
</rdf:RDF>
