<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=policy">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=policy]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for policy]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/7/Policy-2004"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/477/Attribute-based-Fine-Grained-Access-Control-for-Triple-Stores"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/447/Generating-Linked-Data-from-Tables-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/448/Privacy-and-Security-in-Online-Social-Media"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/414/Automation-of-Service-lifecycle-on-the-Cloud-by-using-Semantic-technologies"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/411/Masters-Thesis-Research-Proposal-Dibyajyoti-Ghosh-and-Sumit-More"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/394/Privacy-Preservation-in-Context-Aware-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/390/SAP-LAP-Policy-Paradigm-Application-for-Cyber-Security"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/38/Looking-back-at-the-ebiquity-research-group-s-2006"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/18/UMBC-ebiquity-group-launches-four-new-PhDs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/13/Lalana-Kagal-defends-dissertation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/6/SW-UBICOMP-INTEREST-SIG-formed"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/1/Context-Broker-Architecture-CoBrA-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/110/Medical-Data-Polygraph"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/26/Ontology-Editor-for-Eclipse"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/41/OWL-Rules-Language-Translator"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/99/Policy-Compliant-Integration-of-Linked-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/72/Policy-Management-for-Enterprise-Applications"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1079/A-Study-of-the-Landscape-of-Privacy-Policies-of-Smart-Devices"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1156/Privacy-Preserving-Data-Sharing-in-Agriculture-Enforcing-Policy-Rules-for-Secure-and-Confidential-Data-Synthesis"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1060/Policy-Integrated-Blockchain-to-Automate-HIPAA-Part-2-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1024/Semantically-Rich-Access-Control-in-Cloud-EHR-Systems-Based-on-MA-ABE"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1015/CAPD-A-Context-Aware-Policy-Driven-Framework-for-Secure-and-Resilient-IoBT-Operations"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1010/Trusted-Compliance-Enforcement-Framework-for-Sharing-Health-Big-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/38/Blockchain"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/44/A-Policy-Specification-Language-for-Governing-Open-Dynamic-Distributed-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/67/Authorization-and-Privacy-for-Semantic-Web-Services"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/354/BGP-Network-Ontology"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/232/Computational-Policies-in-a-Need-to-Share-Environment"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/235/Computational-Policies-in-a-Need-to-Share-Environment"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/274/Constraining-Information-Flow-in-Social-Networks-with-Privacy-Policies"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/349/Context-Aware-Privacy-Policies-in-Mobile-and-Social-Computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/302/DDRE-Managing-the-Assured-Information-Sharing-Lifecycle"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/270/Framework-for-Managing-the-Assured-Information-Sharing-Lifecycle"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web">
  <title><![CDATA[Policy Management for the Web]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web</link>
  <description><![CDATA[Policy Management for the Web is a one-day workshop to be held at 
the 
14th International World Wide Web Conference on 
Tuesday 10 May 2005 in Chiba Japan.



In order to realize the full potential of the World Wide Web as an open, dynamic, and distributed ``universe of network-accessible information'', it is important for web entities to behave appropriately. Policy management provides the openness, flexibility, and autonomy required to regulate this environment as entities can reaso...]]></description>
  <dc:date>2005-05-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services">
  <title><![CDATA[W3C Workshop on  Constraints and Capabilities for Web Services]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services</link>
  <description><![CDATA[Various aspects of a Web service may require description. This includes its constraints (e.g., "You must use HTTP Authentication when accessing this service") and its capabilities (e.g., "I can support GZIP compression"). Likewise, clients accessing Web services have constraints and capabilities of their own to consider when accessing services.

Many such aspects are typically associated with a number of orthogonal problem domains; for example, it may be desirable to describe constraints an...]]></description>
  <dc:date>2004-10-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/7/Policy-2004">
  <title><![CDATA[Policy 2004]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/7/Policy-2004</link>
  <description><![CDATA[Policy 2004 is the IEEE 5th International Workshop on Policies for Distributed Systems and Networks and  is the fifth in a successful series of workshops which, since 1999, has brought together leading researchers and industry experts to discuss problems, solutions and experiences in developing policy-based systems.

 

The workshop will include both refereed papers and invited presentations which will be published by IEEE Press. In line with past workshops, there will be substantial time...]]></description>
  <dc:date>2004-06-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/477/Attribute-based-Fine-Grained-Access-Control-for-Triple-Stores">
  <title><![CDATA[Attribute-based Fine Grained Access Control for Triple Stores]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/477/Attribute-based-Fine-Grained-Access-Control-for-Triple-Stores</link>
  <description><![CDATA[The maturation of semantic web standards and associated web-based data representations like schema.org have made RDF a popular model for representing graph data and semi-structured knowledge. However, most existing SPARQL endpoint supports simple access control mechanism preventing its use for many applications. To protect the data stored in RDF stores, we describe a framework to support attribute-based fine grained access control and explore its feasibility. We implemented a prototype of the...]]></description>
  <dc:date>2015-09-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/447/Generating-Linked-Data-from-Tables-">
  <title><![CDATA[Generating Linked Data from Tables.]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/447/Generating-Linked-Data-from-Tables-</link>
  <description><![CDATA[Large amounts of information is stored in tables, spreadsheets, CSV files and databases for a number of domains, including the Web, healthcare, e-science and public policy. The tables' structure facilitates human understanding, yet this very structure makes it difficult for machine understanding. This talk will focus on describing our work on making the intended meaning of tabular data explicit by representing it as RDF linked data, potentially making large amounts of scientific and medical d...]]></description>
  <dc:date>2013-03-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/448/Privacy-and-Security-in-Online-Social-Media">
  <title><![CDATA[Privacy and Security in Online Social Media]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/448/Privacy-and-Security-in-Online-Social-Media</link>
  <description><![CDATA[With increase in usage of the Internet, there has been an exponential increase in the use of online social media on the Internet. Websites like Facebook, Google+, YouTube, Orkut, Twitter and Flickr have changed the way Internet is being used. There is a dire need to investigate, study and characterize privacy and security on online social media from various perspectives (computational, cultural, psychological). Real world scalable systems need to be built to detect and defend security and pri...]]></description>
  <dc:date>2013-03-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup">
  <title><![CDATA[Semantic Web Meetup]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup</link>
  <description><![CDATA[The UMBC Ebiquity Lab is hosting the November meeting of the Lotico Central Maryland Semantic Web Meetup from 6:00-8:00 pm in room 456 of the ITE building (directions).  All are welcome.  If you want to attend, please join the  Central MD Semantic Web Meetup group and RSVP.  The meeting will start with a pizza social from 6:00pm to 6:45pm and then continue with a series of short presentations of current Semantic Web research being done in our lab.

  Tim Finin: introduction and overview

...]]></description>
  <dc:date>2011-11-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/414/Automation-of-Service-lifecycle-on-the-Cloud-by-using-Semantic-technologies">
  <title><![CDATA[Automation of Service lifecycle on the Cloud by using Semantic technologies]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/414/Automation-of-Service-lifecycle-on-the-Cloud-by-using-Semantic-technologies</link>
  <description><![CDATA[Managing virtualized services efficiently over the cloud is an open challenge.  We propose a semantically rich, policy-based framework to automate the lifecycle of cloud services. We have divided the IT service lifecycle into the five phases of requirements, discovery, negotiation, composition, and consumption. We detail each phase and describe the high level ontologies that we have developed to describe them. Our research complements previous work on ontologies for service descriptions in t...]]></description>
  <dc:date>2011-10-18</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/411/Masters-Thesis-Research-Proposal-Dibyajyoti-Ghosh-and-Sumit-More">
  <title><![CDATA[Masters Thesis Research Proposal: Dibyajyoti Ghosh and Sumit More]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/411/Masters-Thesis-Research-Proposal-Dibyajyoti-Ghosh-and-Sumit-More</link>
  <description><![CDATA[In this week's lab meeting we will have Dibyajyoti Ghosh and Sumit More talk about the research they will be pursuing for their Masters Thesis.

Dibyajyoti will be talking about "Mobile application centric privacy policy preservation through context aware middleware in smartphones". His work is a part of the NSF granted Platys project. More specifically, he will be taking up Pramod Jagtap's work. 
 
Existing mobile operating systems primarily offer permission based policies at install tim...]]></description>
  <dc:date>2011-10-04</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks">
  <title><![CDATA[A Security Framework to Cope With Node Misbehaviors in Mobile Ad Hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks</link>
  <description><![CDATA[Ph.D. Dissertation Defense

A Mobile Ad-hoc NETwork (MANET) has no fixed infrastructure, and is generally composed of a dynamic set of cooperative peers. These peers share their wireless transmission power with other peers so that indirect communication can be possible between nodes that are not in the radio range of each other . The nature of MANETs, such as node mobility, unreliable transmission medium and restricted battery power, makes them extremely vulnerable to a variety of node misb...]]></description>
  <dc:date>2011-06-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/394/Privacy-Preservation-in-Context-Aware-Systems">
  <title><![CDATA[Privacy Preservation in Context-Aware Systems]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/394/Privacy-Preservation-in-Context-Aware-Systems</link>
  <description><![CDATA[Pramod Jagtap will defend his MS thesis titled "Privacy Preservation in Context-Aware Systems". 

Abstract: 
 
Recent years have seen a confluence of two major trends – the increase of mobile devices such as smart phones as the primary access point to networked information and the rise of social media platforms that connect people. Their convergence supports the emergence of a new class of context-aware geosocial networking applications. While existing systems focus mostly on location...]]></description>
  <dc:date>2011-04-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/390/SAP-LAP-Policy-Paradigm-Application-for-Cyber-Security">
  <title><![CDATA[SAP-LAP Policy Paradigm – Application for Cyber Security]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/390/SAP-LAP-Policy-Paradigm-Application-for-Cyber-Security</link>
  <description><![CDATA[SAP-LAP (Situation Actor Process-Learning Action Performance) framework has been developed on the basis of Prof. John Warfield’s Interpretive Structural Modeling. It is a holistic framework that consists of a "situation" to be managed, an "actor" or a group of actors to deal with the situation and a "process" or a set of processes that respond to the situation and recreate it. The interplay and synthesis of SAP leads to Learning-Action-Performance (LAP). Key learning issues of interest abou...]]></description>
  <dc:date>2011-04-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems">
  <title><![CDATA[A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems</link>
  <description><![CDATA[Due to lack of pre-deployed infrastructure, nodes in Mobile Ad hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which are recognized as misbehaviors. In this talk, a holistic framework is presented to cope with these node mi...]]></description>
  <dc:date>2011-03-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/38/Looking-back-at-the-ebiquity-research-group-s-2006">
  <title><![CDATA[Looking back at the ebiquity research group's 2006]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/38/Looking-back-at-the-ebiquity-research-group-s-2006</link>
  <description><![CDATA[Maybe it's a bit of a cliché, but this is the traditional time to look back on the past year and reflect on how things are going.  It has been an active productive year.  Here's a rundown of our past year by the numbers.

205,000 is the number of visits to the Ebiquity web site.  Our monthly page visits increased five fold over the year and we currently receive about 25,000 visits a month.


   



743 people have
registered as users of the Swoogle
semantic web search system.  By ...]]></description>
  <dc:date>2007-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW">
  <title><![CDATA[UMBC ebqiuity members help organize SWPW]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW</link>
  <description><![CDATA[Lalana Kagal (MIT and a recent UMBC PhD graduate), Tim Finin (UMBC)
and Jim Hendler (UMCP) have organized a workshop focused on the use of
semantic web technology in describing and enforcing policies for
security and trust in open computing systems.

 The Semantic Web And Policy
Workshop (SWPW) will be held on 7 November 2005 in conjunction
with the 4th International
Semantic Web Conference in Galway, Ireland.

The workshop will cover policy-based frameworks for the semantic
web as...]]></description>
  <dc:date>2005-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released">
  <title><![CDATA[SweetRules v2.1 released]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released</link>
  <description><![CDATA[First Platform for Semantic Web Rules Now Includes Web Services 
Support and More:  SweetRules V2.1 Released Open Source
 

Contacts: Chitro Neogy (chitro@mit.edu) and Benjamin Grosof (bgrosof@mit.edu)
 
CAMBRIDGE, MA, USA, April 25:  
 
SweetRules, a uniquely powerful integrated set of tools for semantic
web rules and ontologies, is newly enhanced in V2.1 with several
first-of-a-kind capabilities, including support for rule-triggered
WSDL Web Services, RuleML presentation syntax f...]]></description>
  <dc:date>2005-04-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing">
  <title><![CDATA[UMBC and IBM collaborate on autonomic computing]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing</link>
  <description><![CDATA[University of Maryland, Baltimore County and IBM Collaborate on 
Autonomic Computing Research

BALTIMORE, February 24, 2005 - IBM today announced a new Shared University Research (SUR) grant awarded a group of faculty researchers of the eBiquity research group at the University of Maryland, Baltimore County to help build a major new center for high performance computational research. 

This SUR grant is part of the latest series of Shared University Research (SUR) awards, bringing IBM's ...]]></description>
  <dc:date>2005-02-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/18/UMBC-ebiquity-group-launches-four-new-PhDs">
  <title><![CDATA[UMBC ebiquity group launches four new PhDs]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/18/UMBC-ebiquity-group-launches-four-new-PhDs</link>
  <description><![CDATA[Four ebiquity laboratory researchers were awarded PhD
degrees in UMBC's 2004 Winter Commencement: Drs Lalana
Kagal, Harry (Lik) Chen, Xiaochen Luan and Dipanjan
Chakraborty.

 Harry (Lik) Chen's
dissertation,  An
Intelligent Broker Architecture for Pervasive Context-Aware
Systems , advanced understanding of how we can build
Wireless computing environments that offer intelligent
services while protecting privacy.  Dr. Chen has joined Image Matters LLC, a
Leesburg VA company speciali...]]></description>
  <dc:date>2004-12-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/13/Lalana-Kagal-defends-dissertation">
  <title><![CDATA[Lalana Kagal defends dissertation]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/13/Lalana-Kagal-defends-dissertation</link>
  <description><![CDATA[Lalana Kagal successfully defended her dissertation on "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments".  She will begin a post doctoral appointment at the MIT CSAIL Lab in 2005.]]></description>
  <dc:date>2004-09-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/6/SW-UBICOMP-INTEREST-SIG-formed">
  <title><![CDATA[SW-UBICOMP-INTEREST SIG formed]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/6/SW-UBICOMP-INTEREST-SIG-formed</link>
  <description><![CDATA[Semantic Web in
UbiComp SIG (SW-UbiComp-SIG) is an open community for exploring
the use of Semantic Web technology in building Pervasive/Ubiquitous
Computing applications.  The group's current goal is to define a
standard ontology to support pervasive computing applications (see our
web site for the draft proposal). This includes OWL ontologies for
person, device, time, space, event, digital documents, and policy (for
security and privacy).  SW-UbiComp-SIG welcomes anyone who is
inter...]]></description>
  <dc:date>2003-12-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery">
  <title><![CDATA[Allia: Alliance-based Service Discovery]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery</link>
  <description><![CDATA[Directory based service discovery mechanisms are unsuitable for ad-hoc m-commerce environments. Working towards finding an
alternate mechanism, we developed Allia: a peer-to-peer caching based and policy-driven agent-service discovery framework that
facilitates cross-platform service discovery in ad-hoc environments. Our approach achieves a high degree of flexibility in
adapting itself to changes in ad-hoc environments and is devoid of common problems associated with structured compound
f...]]></description>
  <dc:date>2002-03-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy">
  <title><![CDATA[Cloud Security and Privacy]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy</link>
  <description><![CDATA[This project covers research on Security and Privacy pertaining to Cloud computing and cloud based services. 
We have developed a   semantically rich, policy driven approach to address the privacy, security and usage concerns around such cloud data.]]></description>
  <dc:date>2011-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/1/Context-Broker-Architecture-CoBrA-">
  <title><![CDATA[Context Broker Architecture (CoBrA)]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/1/Context-Broker-Architecture-CoBrA-</link>
  <description><![CDATA[Context Broker Architecture (CoBrA) is an agent based architecture for supporting context-aware systems in smart spaces (e.g., intelligent meeting rooms, smart homes, and smart vehicles). Central to this architecture is an intelligent agent called  context broker that maintains a shared model of context on the behalf of a community of agents, services, and devices in the space and provides privacy protections for the users in the space by enforcing the policy rules that they define.]]></description>
  <dc:date>2002-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures">
  <title><![CDATA[Data Privacy management using Policy compliant Blockchain structures]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures</link>
  <description><![CDATA[An important requirement of any information management system is to protect data and resources against leak or improper modifications, while at the same time ensure data availability to legitimate users. Moreover, systems handling personal data must also track its provenance and be regularly audited to comply with regulations. By assuring auditable, privacy policy compliant actions, we can also guarantee that areas where privacy policies have been technically enforced are highlighted.

As p...]]></description>
  <dc:date>2016-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language">
  <title><![CDATA[IDE for Rei Policy Language]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language</link>
  <description><![CDATA[Security policies define rules for access control, authentication, or authorization of entities in a system. With the increase in interest in web based e-commerce, the amount of business that is transacted on-line and the explosion in the amount of services available, the ability to
handle security and privacy is a must. Also, as computationally enabled devices (laptops, phones, PDAs, and even household appliances) become more commonplace and short range wireless connectivity improves; there...]]></description>
  <dc:date>2003-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/110/Medical-Data-Polygraph">
  <title><![CDATA[Medical Data Polygraph]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/110/Medical-Data-Polygraph</link>
  <description><![CDATA[Healthcare organizations exchange sensitive health records, including behavioral health data, across peer-to-peer networks, and it is challenging to find and fix compliance issues proactively.

The Healthcare industry anticipates a growing need to audit substance use disorder patient data, commonly referred to as Part 2 data, having been shared without a release of information signed by the patient. To address this need, we developed and evaluated a novel methodology to detect Part 2 data e...]]></description>
  <dc:date>2022-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/26/Ontology-Editor-for-Eclipse">
  <title><![CDATA[Ontology Editor for Eclipse]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/26/Ontology-Editor-for-Eclipse</link>
  <description><![CDATA[In computer science, policies are rules and
constraints that govern the behavior of software agents. The use of
policies makes systems more flexible by separating the declarative
components of the system from its implementation. Policies are usually
expressed in a readable declarative language that can be understood by
a human. Policy based security model defines rules for access control,
authorization, and authentication of software objects and entities,
and can be greatly beneficia...]]></description>
  <dc:date>2002-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/41/OWL-Rules-Language-Translator">
  <title><![CDATA[OWL Rules Language Translator]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/41/OWL-Rules-Language-Translator</link>
  <description><![CDATA[Implement a translator from the proposed   OWL Rules Language  to one or more common rules languages such as Prolog and Jess.  Investigate the application to the Rei policy language. For more information, contact Tim FInin]]></description>
  <dc:date>2003-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/99/Policy-Compliant-Integration-of-Linked-Data">
  <title><![CDATA[Policy Compliant Integration of Linked Data]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/99/Policy-Compliant-Integration-of-Linked-Data</link>
  <description><![CDATA[Tim Finin and Anupam Joshi have received a $400,000 research award from the NSF Secure and Trustworthy  Cyberspace (SaTC) program  for a three year project to investigate how to better manage security and privacy constraints while querying semantically annotated linked data sources.  The project, Policy Compliant Integration of Linked Data, is a collaboration with researchers at M.I.T. and the University of Texas at Dallas.

The ubiquity of computing technology and the Internet have created...]]></description>
  <dc:date>2012-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/72/Policy-Management-for-Enterprise-Applications">
  <title><![CDATA[Policy Management for Enterprise Applications]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/72/Policy-Management-for-Enterprise-Applications</link>
  <description><![CDATA[This project explores the role of policy management in enterprise applications where --

The workflow and the information it operates on are well structured.
Knowledge on the Web influences decisions made by role players.]]></description>
  <dc:date>2005-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments">
  <title><![CDATA[Impostors Among Us: An Agentic Approach to Identifying and Resolving Conflicts in Collaborative Network Environments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments</link>
  <description><![CDATA[Today’s networked cyber-physical environments contain a wide range of agents, including fixed sensors, unmanned aerial vehicles (UAVs), and unmanned ground vehicles (UGVs), which help accomplish the objective(s) of a given mission. These collaborating agents support informed decision making for humans to accomplish mission objectives such as surveillance or search and rescue. However, these agents and their sensors are subject to various failures, including power, communication, hardware, a...]]></description>
  <dc:date>2025-10-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems">
  <title><![CDATA[Comparison of attribute‑based encryption schemes in securing healthcare systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems</link>
  <description><![CDATA[E-health has become a top priority for healthcare organizations focused on advancing healthcare
services. Thus, medical organizations have been widely adopting cloud services, resulting in the
effective storage of sensitive data. To prevent privacy and security issues associated with the data,
attribute-based encryption (ABE) has been a popular choice for encrypting private data. Likewise,
the attribute-based access control (ABAC) technique has been widely adopted for controlling data
ac...]]></description>
  <dc:date>2024-03-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1079/A-Study-of-the-Landscape-of-Privacy-Policies-of-Smart-Devices">
  <title><![CDATA[A Study of the Landscape of Privacy Policies of Smart Devices]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1079/A-Study-of-the-Landscape-of-Privacy-Policies-of-Smart-Devices</link>
  <description><![CDATA[As the adoption of smart devices continues to permeate all aspects of our lives, concerns surrounding user privacy have become more pertinent than ever before. While privacy policies define the data management practices of their manufacturers, previous work has shown that they are rarely read and understood by users. Hence, automatic analysis of privacy policies has been shown to help provide users with appropriate insights. Previous research has extensively analyzed privacy policies of websi...]]></description>
  <dc:date>2023-12-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1156/Privacy-Preserving-Data-Sharing-in-Agriculture-Enforcing-Policy-Rules-for-Secure-and-Confidential-Data-Synthesis">
  <title><![CDATA[Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1156/Privacy-Preserving-Data-Sharing-in-Agriculture-Enforcing-Policy-Rules-for-Secure-and-Confidential-Data-Synthesis</link>
  <description><![CDATA[Big Data empowers the farming community with the information needed to optimize resource usage, increase productivity, and enhance the sustainability of agricultural practices. The use of Big Data in farming requires the collection and analysis of data from various sources such as sensors, satellites, and farmer surveys. While Big Data can provide the farming community with valuable insights and improve efficiency, there is significant concern regarding the security of this data as well as th...]]></description>
  <dc:date>2023-12-18</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations">
  <title><![CDATA[Ensuring Privacy Policy Compliance of Wearables with IoT Regulations]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1111/Ensuring-Privacy-Policy-Compliance-of-Wearables-with-IoT-Regulations</link>
  <description><![CDATA[In an era where wearables, particularly those in non-hospital settings, collect and transmit sensitive personal data, it is imperative to implement stringent privacy safeguards. The National Institute of Standards and Technology (NIST) Internal Report 8228 provides regulations for securing Internet of Things (IoT) devices, data, and the privacy of individuals. We have developed a novel framework for examining the privacy policies governing the data and information utilized by wearable devices...]]></description>
  <dc:date>2023-11-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems">
  <title><![CDATA[Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems</link>
  <description><![CDATA[With the explosion of available data and computational power, machine learning and deep learning techniques are being increasingly used to solve problems. The domain of cybersecurity is no exception, as we have seen multiple papers in the recent past using data-driven machine learning approaches for different tasks.

Rule-based and supervised machine learning-based approaches are often brittle in detecting attacks, can be defeated by adversaries that adapt, and cannot use the knowledge of e...]]></description>
  <dc:date>2023-07-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1060/Policy-Integrated-Blockchain-to-Automate-HIPAA-Part-2-Compliance">
  <title><![CDATA[Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1060/Policy-Integrated-Blockchain-to-Automate-HIPAA-Part-2-Compliance</link>
  <description><![CDATA[Healthcare organizations exchange sensitive health records, including behavioral health data, across peer-to-peer networks, and it is challenging to find and fix compliance issues proactively. The Healthcare industry anticipates a growing need to audit substance use disorder patient data, commonly referred to as Part 2 data, having been shared without a release of information signed by the patient. To address this need, we developed and evaluated a novel methodology to detect Part 2 data exch...]]></description>
  <dc:date>2023-07-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1024/Semantically-Rich-Access-Control-in-Cloud-EHR-Systems-Based-on-MA-ABE">
  <title><![CDATA[Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1024/Semantically-Rich-Access-Control-in-Cloud-EHR-Systems-Based-on-MA-ABE</link>
  <description><![CDATA[Winner of the Best Paper Award in the conferenceWith the rapid implementation of Cloud-based Electronic Health Record (EHR) systems, health providers are specifically concerned about handling data privacy on the cloud. Existing methods have either scalability issues by requiring that patients grant access to their medical data or a trust issue by having a single authority, thereby creating the problem of a single point of attack. Hence there is a need to develop an EHR system that addresses t...]]></description>
  <dc:date>2022-05-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1015/CAPD-A-Context-Aware-Policy-Driven-Framework-for-Secure-and-Resilient-IoBT-Operations">
  <title><![CDATA[CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1015/CAPD-A-Context-Aware-Policy-Driven-Framework-for-Secure-and-Resilient-IoBT-Operations</link>
  <description><![CDATA[The Internet of Battlefield Things (IoBT) will advance the operational effectiveness of infantry units. However, this requires autonomous assets such as sensors, drones, combat equipment, and uncrewed vehicles to collaborate, securely share information, and be resilient to adversary attacks in contested multi-domain operations. CAPD addresses this problem by providing a context-aware, policy-driven framework supporting data and knowledge exchange among autonomous entities in a battlespace. We...]]></description>
  <dc:date>2022-04-04</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1010/Trusted-Compliance-Enforcement-Framework-for-Sharing-Health-Big-Data">
  <title><![CDATA[Trusted Compliance Enforcement Framework for Sharing Health Big Data]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1010/Trusted-Compliance-Enforcement-Framework-for-Sharing-Health-Big-Data</link>
  <description><![CDATA[COVID pandemic management via contact tracing and vaccine distribution has resulted in a large volume and high velocity of Health-related data being collected and exchanged among various healthcare providers, regulatory and government agencies, and people. This unprecedented sharing of sensitive health-related Big Data has raised technical challenges of ensuring robust data exchange while adhering to security and privacy regulations. We have developed a semantically rich and trusted Complianc...]]></description>
  <dc:date>2021-12-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/38/Blockchain">
  <title><![CDATA[Blockchain]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/38/Blockchain</link>
  <description><![CDATA[Projects looking at policy rich Blockchains for managing Data Privacy and Security]]></description>
  <dc:date>2026-03-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System">
  <title><![CDATA[Question and Answering (QnA) System]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System</link>
  <description><![CDATA[Our research focuses on developing new techniques and approaches to developing Question and Answer (QnA) systems. We focus on developing semantically rich , policy based applications that cater to a variety of domains like cybersecurity and Legal/Compliance.]]></description>
  <dc:date>2026-03-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/44/A-Policy-Specification-Language-for-Governing-Open-Dynamic-Distributed-Environments">
  <title><![CDATA[A Policy Specification Language for Governing Open, Dynamic Distributed Environments]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/44/A-Policy-Specification-Language-for-Governing-Open-Dynamic-Distributed-Environments</link>
  <description><![CDATA[Talk given at W3C]]></description>
  <dc:date>2004-08-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems">
  <title><![CDATA[An Intelligent Broker for Pervasive Context-Aware Systems]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems</link>
  <description><![CDATA[Presentation slides used in Harry Chen's PhD dissertation defense.

Context-aware systems exploit the use of situational information, or context, to provide relevant information and services to users. A great challenge remains in defining an architecture that supports context-aware systems. Critical research issues include modeling and reasoning (how to represent contextual information for machine processing and reasoning), knowledge sharing (how to enable agents to acquire consistent knowl...]]></description>
  <dc:date>2004-12-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/67/Authorization-and-Privacy-for-Semantic-Web-Services">
  <title><![CDATA[Authorization and Privacy for Semantic Web Services]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/67/Authorization-and-Privacy-for-Semantic-Web-Services</link>
  <description><![CDATA[Providing guarantees for security and privacy is paramount to the success of Semantic Web Services. In this article, the authors describe OWL-S policy annotations and extend the OWL-S Matchmaker and OWL-S Virtual Machine to support the processing of those policies.]]></description>
  <dc:date>2004-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/354/BGP-Network-Ontology">
  <title><![CDATA[BGP Network Ontology]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/354/BGP-Network-Ontology</link>
  <description><![CDATA[An Ontology for BGP Policy Specification and Reasoning]]></description>
  <dc:date>2013-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/232/Computational-Policies-in-a-Need-to-Share-Environment">
  <title><![CDATA[Computational Policies in a Need to Share Environment]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/232/Computational-Policies-in-a-Need-to-Share-Environment</link>
  <description><![CDATA[As applications become more sophisticated, intelligent and function in open and dynamic en-vironments, they require greater degrees of decision making and autonomy.  A long range vision is for societies of intelligent, adaptive, autonomous agents, but even today, we find the new lev-els of autonomy emerging in infrastructures like the Web, Grid computing, and pervasive com-puting environments. These systems exchange information about services offered and sought and negotiate for information s...]]></description>
  <dc:date>2007-06-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/235/Computational-Policies-in-a-Need-to-Share-Environment">
  <title><![CDATA[Computational Policies in a Need to Share Environment]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/235/Computational-Policies-in-a-Need-to-Share-Environment</link>
  <dc:date>2007-06-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/274/Constraining-Information-Flow-in-Social-Networks-with-Privacy-Policies">
  <title><![CDATA[Constraining Information Flow in Social Networks with Privacy Policies]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/274/Constraining-Information-Flow-in-Social-Networks-with-Privacy-Policies</link>
  <description><![CDATA[Online social networking systems are a phenomenon that has grown exponentially over the past few years. These systems provide platforms for people to easily share information, especially about themselves and about their interests. With the recent emergence of geolocation technologies, social networking can allow users to interact relative to location and time. Most systems began with few or no privacy controls and have gradually been adding and enhancing them to meet the demands of their user...]]></description>
  <dc:date>2009-08-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/349/Context-Aware-Privacy-Policies-in-Mobile-and-Social-Computing">
  <title><![CDATA[Context-Aware Privacy Policies in Mobile and Social Computing]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/349/Context-Aware-Privacy-Policies-in-Mobile-and-Social-Computing</link>
  <description><![CDATA[Social media and mobile computing are becomming increasingly intertwined.  Most of us now use our laptops, tablets and smartphones much more than desktop computers.  These devices sync all kinds of data with the cloud and each other.  We should attend to both mobile computering and social computing in addressing privacy by giving users ways to limit who can see what,

Presentation for the SRI Social Media Workshop -- Social Media Analytics, Communications and Use Cases, Arlington, VA, Janua...]]></description>
  <dc:date>2013-01-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/302/DDRE-Managing-the-Assured-Information-Sharing-Lifecycle">
  <title><![CDATA[DDRE: Managing the Assured Information Sharing Lifecycle]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/302/DDRE-Managing-the-Assured-Information-Sharing-Lifecycle</link>
  <description><![CDATA[AISL (Assured Information Sharing Lifecycle) is a MURI project that is developing new approaches to support assured information sharing. The team includes researchers from UMBC, Purdue University, and the Universities of Illinois, Michigan, Texas at Dallas, and Texas at San Antonio. Our research is framed by the recognition of a life cycle for shared information comprising five phases: advertising and discovery, negotiation for access and usage rights, integration and analysis, generation of ...]]></description>
  <dc:date>2010-07-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/270/Framework-for-Managing-the-Assured-Information-Sharing-Lifecycle">
  <title><![CDATA[Framework for Managing the Assured Information Sharing Lifecycle]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/270/Framework-for-Managing-the-Assured-Information-Sharing-Lifecycle</link>
  <description><![CDATA[AISL (Assured Information Sharing Lifecycle) is a MURI project that is developing new approaches to support assured information sharing. The team includes researchers from UMBC, Purdue University, and the Universities of Illinois, Michigan, Texas at Dallas, and Texas at San Antonio. Our research is framed by the recognition of a life cycle for shared information comprising five phases: advertising and discovery, negotiation for access and usage rights, integration and analysis, generation of ...]]></description>
  <dc:date>2009-06-22</dc:date>
 </item>
</rdf:RDF>
