<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=trust+management">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=trust+management]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for trust management]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/347/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/324/Security-Through-Policy-and-Trust-in-Mobile-Ad-Hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/74/Distributed-Trust-Management-in-Mobile-Ad-Hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/10/Securing-the-Semantic-Web-A-Trust-Management-Approach"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1212/TRUCE-TRUsted-Compliance-Enforcement-Service-for-Secure-Health-Data-Exchange"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1010/Trusted-Compliance-Enforcement-Framework-for-Sharing-Health-Big-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/490/Security-Through-Collaboration-and-Trust-in-MANETs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/546/SAT-an-SVM-based-Automated-Trust-Management-System-for-Mobile-Ad-hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/526/ATM-Automated-Trust-Management-for-Mobile-Ad-hoc-Networks-Using-Support-Vector-Machine"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1151/SMART-An-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/484/Coping-with-Node-Misbehaviors-in-Ad-Hoc-Networks-A-Multi-Dimensional-Trust-Management-Approach"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/305/Querying-in-Packs-Trustworthy-Data-Management-in-Ad-Hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/307/Investigations-into-Trust-for-Collaborative-Information-Repositories-A-Wikipedia-Case-Study"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/244/Active-Collaborations-for-Trustworthy-Data-Management-in-Ad-Hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/296/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks">
  <title><![CDATA[A Security Framework to Cope With Node Misbehaviors in Mobile Ad Hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks</link>
  <description><![CDATA[Ph.D. Dissertation Defense

A Mobile Ad-hoc NETwork (MANET) has no fixed infrastructure, and is generally composed of a dynamic set of cooperative peers. These peers share their wireless transmission power with other peers so that indirect communication can be possible between nodes that are not in the radio range of each other . The nature of MANETs, such as node mobility, unreliable transmission medium and restricted battery power, makes them extremely vulnerable to a variety of node misb...]]></description>
  <dc:date>2011-06-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems">
  <title><![CDATA[A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems</link>
  <description><![CDATA[Due to lack of pre-deployed infrastructure, nodes in Mobile Ad hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which are recognized as misbehaviors. In this talk, a holistic framework is presented to cope with these node mi...]]></description>
  <dc:date>2011-03-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/347/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks">
  <title><![CDATA[SMART: A SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/347/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks</link>
  <description><![CDATA[Due to lack of pre-deployed infrastructure, nodes in Mobile Ad hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. To address the security threats caused by various misbehaviors, a SV...]]></description>
  <dc:date>2010-05-18</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/324/Security-Through-Policy-and-Trust-in-Mobile-Ad-Hoc-Networks">
  <title><![CDATA[Security Through Policy and Trust in Mobile Ad Hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/324/Security-Through-Policy-and-Trust-in-Mobile-Ad-Hoc-Networks</link>
  <description><![CDATA[Abstract:

Mobile ad hoc networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media.Significant research efforts have been made to address the problem of misbehavior detection as well as trust management for MANETs. However,little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors an...]]></description>
  <dc:date>2009-11-03</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/74/Distributed-Trust-Management-in-Mobile-Ad-Hoc-Networks">
  <title><![CDATA[Distributed Trust Management in Mobile Ad Hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/74/Distributed-Trust-Management-in-Mobile-Ad-Hoc-Networks</link>
  <dc:date>2004-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/10/Securing-the-Semantic-Web-A-Trust-Management-Approach">
  <title><![CDATA[Securing the Semantic Web: A Trust Management Approach]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/10/Securing-the-Semantic-Web-A-Trust-Management-Approach</link>
  <description><![CDATA[A three year project funded by NSF (final approval pending) directed by PI Tm Finin and CO-PI Anupam Joshi to be carried out 2003-2006 with $240K in funding from the NSF Division of Information and Intelligent Systems, Data and Applications Security Program under the direction of program officer Bhavani Thuraisingham.

This research investigates distributed trust management as an alternative to traditional authentication and access control schemes in dynamic and pen computing environments ...]]></description>
  <dc:date>2003-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus">
  <title><![CDATA[Vigil / Secure Centaurus]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus</link>
  <description><![CDATA[Vigil / Secure Centaurus is an ongoing research project on smart home / smart office scenario.

The goal of the project is to demonstrate a smart office environment where mobile user can use her handheld device to ad-hocly operate over all resources/services embedded in  the environment. These services include doors, lights, music, powerpoint presentations, printers and various information services. A user can access these services through Bluetooth, Wi-Fi and IR enabled handheld devices as...]]></description>
  <dc:date>2000-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1212/TRUCE-TRUsted-Compliance-Enforcement-Service-for-Secure-Health-Data-Exchange">
  <title><![CDATA[TRUCE: TRUsted Compliance Enforcement Service for Secure Health Data Exchange]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1212/TRUCE-TRUsted-Compliance-Enforcement-Service-for-Secure-Health-Data-Exchange</link>
  <description><![CDATA[Organizations are increasingly sharing large volumes of sensitive Personally Identifiable Information (PII), like health records, with each other to better manage their services. Protecting PII data has become increasingly important in today's digital age, and several regulations have been formulated to ensure the secure exchange and management of sensitive personal data. However, at times some of these regulations are at loggerheads with each other, like the Health Insurance Portability and ...]]></description>
  <dc:date>2025-12-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1010/Trusted-Compliance-Enforcement-Framework-for-Sharing-Health-Big-Data">
  <title><![CDATA[Trusted Compliance Enforcement Framework for Sharing Health Big Data]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1010/Trusted-Compliance-Enforcement-Framework-for-Sharing-Health-Big-Data</link>
  <description><![CDATA[COVID pandemic management via contact tracing and vaccine distribution has resulted in a large volume and high velocity of Health-related data being collected and exchanged among various healthcare providers, regulatory and government agencies, and people. This unprecedented sharing of sensitive health-related Big Data has raised technical challenges of ensuring robust data exchange while adhering to security and privacy regulations. We have developed a semantically rich and trusted Complianc...]]></description>
  <dc:date>2021-12-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/490/Security-Through-Collaboration-and-Trust-in-MANETs">
  <title><![CDATA[Security Through Collaboration and Trust in MANETs]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/490/Security-Through-Collaboration-and-Trust-in-MANETs</link>
  <description><![CDATA[It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security schemes have been proposed that depend on cooperation amongst the nodes in a MANET for identifying nodes that are exhibiting malicious behaviors such as packet dropping, packet modification, and packet misrouting. We argue that in general, this problem can be viewed as an instance of detecting nodes whose behavior is ...]]></description>
  <dc:date>2012-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/546/SAT-an-SVM-based-Automated-Trust-Management-System-for-Mobile-Ad-hoc-Networks">
  <title><![CDATA[SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/546/SAT-an-SVM-based-Automated-Trust-Management-System-for-Mobile-Ad-hoc-Networks</link>
  <description><![CDATA[Mobile Ad-hoc Networks (MANETs) are extremely vulnerable to a variety of misbehaviors because of their basic features, including a lack of communication infrastructure, short transmission range, and dynamic network topology. To detect and mitigate those misbehaviors, many trust management schemes have been proposed for MANETs. Most rely on pre-defined weights to determine how each apparent misbehavior contributes to an overall measure of trustworthiness. The extremely dynamic nature of MANETs...]]></description>
  <dc:date>2011-11-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/526/ATM-Automated-Trust-Management-for-Mobile-Ad-hoc-Networks-Using-Support-Vector-Machine">
  <title><![CDATA[ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/526/ATM-Automated-Trust-Management-for-Mobile-Ad-hoc-Networks-Using-Support-Vector-Machine</link>
  <description><![CDATA[Mobile Ad-hoc NETworks (MANETs) are extremely
susceptible to various misbehaviors and a variety of trust management schemes have been proposed to detect and mitigate them. Most schemes rely on a set of pre-defined weights to determine how the extent of each misbehavior is used to evaluate the trustworthiness. However, due to the extremely dynamic nature of MANETs, it is not possible to determine a set of weights that are appropriate for all contexts. In this paper, an Automated Trust Managem...]]></description>
  <dc:date>2011-06-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1151/SMART-An-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks">
  <title><![CDATA[SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1151/SMART-An-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks</link>
  <description><![CDATA[Due to a lack of pre-deployed infrastructure, nodes in Mobile Ad hoc Networks (MANETs) are required to relay data packets
for other nodes to enable multi-hop communication between nodes that are not in radio range with each other. However, whether
for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them,
both of which are recognized as misbehaviors. In this paper, we describe an SVM-based Misbehavior Detection and Tru...]]></description>
  <dc:date>2010-10-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/484/Coping-with-Node-Misbehaviors-in-Ad-Hoc-Networks-A-Multi-Dimensional-Trust-Management-Approach">
  <title><![CDATA[Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/484/Coping-with-Node-Misbehaviors-in-Ad-Hoc-Networks-A-Multi-Dimensional-Trust-Management-Approach</link>
  <description><![CDATA[Nodes in Mobile Ad hoc Networks (MANETs) are required to relay data packets to enable communication between other nodes that are not in radio range with each other. However, whether for selfish or malicious reasons, a node may fail to cooperate during the network operations or even attempt to disturb them, both of which have been recognized as misbehaviors. Various trust management schemes have been studied to assess the behaviors of nodes so as to detect and mitigate node misbehaviors in
MA...]]></description>
  <dc:date>2010-05-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/305/Querying-in-Packs-Trustworthy-Data-Management-in-Ad-Hoc-Networks">
  <title><![CDATA[Querying in Packs: Trustworthy Data Management in Ad Hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/305/Querying-in-Packs-Trustworthy-Data-Management-in-Ad-Hoc-Networks</link>
  <description><![CDATA[We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing environments. Available resources include those in the fixed surrounding infrastructure as well as services offered by other nearby mobile devices. We take a holistic approach that considers data trust, security, and privacy and focus on the collaborative mechanisms providing a trustworthy data management platform in...]]></description>
  <dc:date>2006-06-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/307/Investigations-into-Trust-for-Collaborative-Information-Repositories-A-Wikipedia-Case-Study">
  <title><![CDATA[Investigations into Trust for Collaborative Information Repositories: A Wikipedia Case Study]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/307/Investigations-into-Trust-for-Collaborative-Information-Repositories-A-Wikipedia-Case-Study</link>
  <description><![CDATA[As collaborative repositories grow in popularity and use, issues
concerning the quality and trustworthiness of information grow.
Some current popular repositories contain contributions from a wide
variety of users, many of which will be unknown to a potential end
user. Additionally the content may change rapidly and information
that was previously contributed by a known user may be updated
by an unknown user. End users are now faced with more
challenges as they evaluate how much they m...]]></description>
  <dc:date>2006-05-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/244/Active-Collaborations-for-Trustworthy-Data-Management-in-Ad-Hoc-Networks">
  <title><![CDATA[Active Collaborations for Trustworthy Data Management in Ad Hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/244/Active-Collaborations-for-Trustworthy-Data-Management-in-Ad-Hoc-Networks</link>
  <description><![CDATA[We propose a trust-based data management framework for enabling individual devices to harness the potential power of distributed computation, storage, and sensory resources available in pervasive computing environments. Available  resources include those
currently present in the fixed surrounding infrastructure as well as those resources made available by other mobile devices in the vicinity. We take a holistic approach that considers trust, security, and privacy issues of data management in...]]></description>
  <dc:date>2005-11-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/296/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks">
  <title><![CDATA[SMART: A SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/296/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks</link>
  <description><![CDATA[Due to lack of pre-deployed infrastructure, nodes in Mobile Ad hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have been recognized as misbehaviors. To address the security threats caused by various misbehaviors, a SV...]]></description>
  <dc:date>2010-05-18</dc:date>
 </item>
</rdf:RDF>
