<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[Policy Management for the Web]]> http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web 2005-05-10 <![CDATA[W3C Workshop on Constraints and Capabilities for Web Services]]> http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services 2004-10-12 <![CDATA[First Workshop on Pervasive Security, Privacy and Trust (PSPT)]]> http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT- 2004-08-26 <![CDATA[International Symposium of Web Intelligence and Security]]> http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security 2004-07-21 <![CDATA[Modeling and Extracting information about Cybersecurity Events from Text]]> http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text 2017-05-16 <![CDATA[Semantic knowledge and privacy in the physical web]]> http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web 2016-09-27 <![CDATA[Are you in control or being controlled in your vehicle?]]> http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle- 2015-10-26 <![CDATA[Attribute-based Fine Grained Access Control for Triple Stores]]> http://ebiquity.umbc.edu/event/html/id/477/Attribute-based-Fine-Grained-Access-Control-for-Triple-Stores 2015-09-14 <![CDATA[Semantics for Cybersecurity and Privacy]]> http://ebiquity.umbc.edu/event/html/id/475/Semantics-for-Cybersecurity-and-Privacy 2015-05-01 <![CDATA[Semantics for Big Data (,) Security and Privacy]]> http://ebiquity.umbc.edu/event/html/id/468/Semantics-for-Big-Data-Security-and-Privacy 2014-09-16 <![CDATA[Extracting cybersecurity related entities, terms and concepts from text]]> http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text 2013-05-28 <![CDATA[MS defense: Social Media Analytics: Digital Footprints]]> http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints 2013-05-13 <![CDATA[A Collaborative Approach to Situational Awareness for CyberSecurity]]> http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity 2013-04-29 <![CDATA[Social Media Analytics: Digital Footprints]]> http://ebiquity.umbc.edu/event/html/id/453/Social-Media-Analytics-Digital-Footprints 2013-04-15 <![CDATA[Ebiquity team wins the Best Paper Award at the IEEE BigDataSecurity 2022 Conference]]> http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference 2022-05-07 <![CDATA[Yun Peng receives award from NIST for supply chain research]]> http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research 2011-03-10 <![CDATA[From 'Need to Know’ to ‘Need to Share’:]]> http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share- 2008-04-30 <![CDATA[UMBC ebqiuity members help organize SWPW]]> http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW 2005-05-01 <![CDATA[SweetRules v2.1 released]]> http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released 2005-04-25 <![CDATA[UMBC and IBM collaborate on autonomic computing]]> http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing 2005-02-24 <![CDATA[ebiquity helps organize PSPT 2004]]> http://ebiquity.umbc.edu/getnews/html/id/15/ebiquity-helps-organize-PSPT-2004 2004-08-26 <![CDATA[SW-UBICOMP-INTEREST SIG formed]]> http://ebiquity.umbc.edu/getnews/html/id/6/SW-UBICOMP-INTEREST-SIG-formed 2003-12-27 <![CDATA[Accelerated Cybersecurity]]> http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity 2016-09-01 <![CDATA[Cloud Security and Privacy]]> http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy 2011-08-01 <![CDATA[CoCoNet: Content and Context Aware Networking]]> http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking 2005-07-01 <![CDATA[DAML / ITTalks]]> http://ebiquity.umbc.edu/project/html/id/8/DAML-ITTalks 2000-10-01 <![CDATA[IDE for Rei Policy Language]]> http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language 2003-05-01 <![CDATA[MoGATU: Data Management in Pervasive Computing Environments]]> http://ebiquity.umbc.edu/project/html/id/2/MoGATU-Data-Management-in-Pervasive-Computing-Environments 2001-09-01 <![CDATA[Ontology Editor for Eclipse]]> http://ebiquity.umbc.edu/project/html/id/26/Ontology-Editor-for-Eclipse 2002-08-01 <![CDATA[Policy Compliant Integration of Linked Data]]> http://ebiquity.umbc.edu/project/html/id/99/Policy-Compliant-Integration-of-Linked-Data 2012-08-01 <![CDATA[Rei : A Policy Specification Language]]> http://ebiquity.umbc.edu/project/html/id/34/Rei-A-Policy-Specification-Language 2002-04-01 <![CDATA[Secure and Oblivious Cloud Storage and Deletion]]> http://ebiquity.umbc.edu/project/html/id/106/Secure-and-Oblivious-Cloud-Storage-and-Deletion 2014-06-01 <![CDATA[Leveraging semantic context to establish access controls for secure cloud-based electronic health records]]> http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records 2024-04-01 <![CDATA[Comparison of attribute‑based encryption schemes in securing healthcare systems]]> http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems 2024-03-26 <![CDATA[Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations]]> http://ebiquity.umbc.edu/paper/html/id/1128/Secure-and-Privacy-Compliant-Data-Sharing-An-Essential-Framework-for-Healthcare-Organizations 2024-01-04 <![CDATA[Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis]]> http://ebiquity.umbc.edu/paper/html/id/1156/Privacy-Preserving-Data-Sharing-in-Agriculture-Enforcing-Policy-Rules-for-Secure-and-Confidential-Data-Synthesis 2023-12-18 <![CDATA[IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance]]> http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance 2023-12-15 <![CDATA[An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains]]> http://ebiquity.umbc.edu/paper/html/id/1073/An-Overview-of-Cybersecurity-Knowledge-Graphs-Mapped-to-the-MITRE-ATT-CK-Framework-Domains 2023-10-03 <![CDATA[Change Management using Generative Modeling on Digital Twins]]> http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins 2023-10-02 <![CDATA[Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy]]> http://ebiquity.umbc.edu/paper/html/id/1104/Knowledge-Enhanced-Neurosymbolic-Artificial-Intelligence-for-Cybersecurity-and-Privacy 2023-09-01 <![CDATA[Knowledge Infusion in Privacy Preserving Data Generation]]> http://ebiquity.umbc.edu/paper/html/id/1136/Knowledge-Infusion-in-Privacy-Preserving-Data-Generation 2023-08-06 <![CDATA[Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems]]> http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems 2023-07-19 <![CDATA[Blockchain]]> http://ebiquity.umbc.edu/research/area/id/38/Blockchain 2024-03-29 <![CDATA[Question and Answering (QnA) System]]> http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System 2024-03-29 <![CDATA[Security, Trust and Privacy]]> http://ebiquity.umbc.edu/research/area/id/13/Security-Trust-and-Privacy 2024-03-29 <![CDATA[A Dynamic Pipeline for Cybersecurity Information Extraction and Understanding]]> http://ebiquity.umbc.edu/resource/html/id/382/A-Dynamic-Pipeline-for-Cybersecurity-Information-Extraction-and-Understanding 2021-10-14 <![CDATA[A Holistic Approach to Secure Sensor Networks]]> http://ebiquity.umbc.edu/resource/html/id/133/A-Holistic-Approach-to-Secure-Sensor-Networks 2005-08-10 <![CDATA[Agent approaches to Security, Trust and Privacy in Pervasive Computing]]> http://ebiquity.umbc.edu/resource/html/id/41/Agent-approaches-to-Security-Trust-and-Privacy-in-Pervasive-Computing 2004-07-20 <![CDATA[Annotations of Cybersecurity blogs and articles]]> http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles 2013-05-30 <![CDATA[Authorization and Privacy for Semantic Web Services]]> http://ebiquity.umbc.edu/resource/html/id/67/Authorization-and-Privacy-for-Semantic-Web-Services 2004-08-01 <![CDATA[Blackbook3: A Graph Analytic Processing Platform For The Semantic Web]]> http://ebiquity.umbc.edu/resource/html/id/281/Blackbook3-A-Graph-Analytic-Processing-Platform-For-The-Semantic-Web 2009-10-06 <![CDATA[Cloud Security and Compliance Ontology]]> http://ebiquity.umbc.edu/resource/html/id/361/Cloud-Security-and-Compliance-Ontology 2014-07-27 <![CDATA[Context-Aware Policies for Privacy and Security]]> http://ebiquity.umbc.edu/resource/html/id/340/Context-Aware-Policies-for-Privacy-and-Security 2012-04-17 <![CDATA[Context-Dependent Privacy and Security Management on Mobile Devices]]> http://ebiquity.umbc.edu/resource/html/id/375/Context-Dependent-Privacy-and-Security-Management-on-Mobile-Devices 2017-08-22 <![CDATA[Context-Dependent Privacy and Security Management on Mobile Devices]]> http://ebiquity.umbc.edu/resource/html/id/376/Context-Dependent-Privacy-and-Security-Management-on-Mobile-Devices 2017-08-22