Author: Lalana Kagal
Track this author via RSS

Showing 50 results

  1. "Information Integration and Analysis: A Semantic Approach to Privacy" Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust
  2. "Security Policies and Trust in Ubiquitous Computing" Philosophical Transactions of the Royal Society A
  3. "ROWLBAC - Representing Role Based Access Control in OWL" Proceedings of the 13th Symposium on Access control Models and Technologies
  4. "Role Based Access Control and OWL" Proceedings of the fourth OWL: Experiences and Directions Workshop
  5. "Using OWL to Model Role Based Access Control"
  6. "Security and Privacy Challenges in Open and Dynamic Environments " Computer
  7. "Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments " Proceedings of the Semantic Web and Policy Workshop
  8. "Modeling Conversation Policies using Permissions and Obligations" Journal of Autonomous Agents and Multi-Agent Systems
  9. "Proceedings of the Semantic Web and Policy Workshop"
  10. "Proceedings of the Policy Management for the Web workshop"
  11. "Policy-based Access Control for Task Computing Using Rei " Proceedings of the Policy Management for the Web Workshop
  12. "Enhancing Web Privacy Protection through Declarative Policies" Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005)
  13. "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments"
  14. "Modeling Communicative Behavior using Permissions and Obligations" Developments in Agent Communication, Eds. Frank Dignum, Rogier van Eijk, Marc-Philippe Huget
  15. "Intelligent Agents Meet the Semantic Web in Smart Spaces" IEEE Internet Computing
  16. "Declarative Policies for Describing Web Service Capabilities and Constraints" W3C Workshop on Constraints and Capabilities for Web Services
  17. "Enhancing P3P Framework through Policies and Trust" UMBC Technical Report, TR-CS-04-13
  18. " Authorization and Privacy for Semantic Web Services" IEEE Intelligent Systems (Special Issue on Semantic Web Services)
  19. "Policy Development Software for Security Policies" DIMACS workshop on Usable Privacy and Security Software
  20. "Enforcing Policies in Pervasive Environments" International Conference on Mobile and Ubiquitous Systems: Networking and Services
  21. "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks" International Conference on Mobile and Ubiquitous Systems: Networking and Services
  22. "Modeling Conversation Policies using Permissions and Obligations" AAMAS 2004 Workshop on Agent Communication (AC2004)
  23. "A Policy Based Collaboration Infrastructure for P2P Networking" Twelfth International Conference on Telecommunication Systems, Modeling and Analysis
  24. "Autonomic Policy-Based Collaboration for Cross-Agency Human Teams" Conference on the Human Impact and Application of Autonomic Computing Systems (CHIACS2)
  25. "Security, Privacy and Trust in Mobile Computing Environments" Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas
  26. "An Approach to Dynamic Service Management in Pervasive Computing" Proceedings of the Grace Hopper Celebration of Women in Computing
  27. "Authorization and Privacy for Semantic Web Services" First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium
  28. "An Agent Approach to Security for Pervasive Computing Environments" Doctoral Consortium, The Eighteenth National Conference on Artificial Intelligence (AAAI 02)
  29. "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing" ACM Wireless Networks Journal
  30. "Rei : A Policy Language for the Me-Centric Project"
  31. "Centaurus : A Framework for Intelligent Services in a Mobile Environment" International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems
  32. "A Delegation Based Model for Distributed Trust" Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence
  33. "A Framework for Distributed Trust Management" Second Workshop on Norms and Institutions in MAS, Autonomous Agents
  34. "Trust-Based Security in Pervasive Computing Environments" IEEE Computer
  35. "Developing Secure Agent Systems Using Delegation Based Trust Management" Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002)
  36. "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments" Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003)
  37. "A Policy Language for A Pervasive Computing Environment" IEEE 4th International Workshop on Policies for Distributed Systems and Networks
  38. "A Policy Based Approach to Security for the Semantic Web" 2nd International Semantic Web Conference (ISWC2003)
  39. "Information Agents for Mobile and Embedded Devices" Proceedings of the Fifth International Workshop Cooperative Information Agents
  40. "Security for DAML Web Services: Annotation and Matchmaking" Second International Semantic Web Conference
  41. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing"
  42. "Vigil: Providing Trust for Enhanced Security in Pervasive Systems"
  43. "ITTALKS: A Case Study in the Semantic Web and DAML" International Semantic Web Working Symposium (SWWS 2001)
  44. "ITTALKS: An Application of Agents in the Semantic Web" Engineering Societies in the Agents World (ESAW 2001)
  45. "Agents Making Sense of the Semantic Web" First GSFC/JPL Workshop on Radical Agent Concepts (WRAC)
  46. "Issues in Data Management for Pervasive Environments" NSF Workshop on Context-Aware Mobile Database Management
  47. "ITtalks: A Case Study in the Semantic Web and DAML+OIL" IEEE Intelligent Systems Special Issue
  48. "A Security Architecture Based on Trust Management for Pervasive Computing Systems" Grace Hopper Celebration of Women in Computing
  49. "Intelligent Agents for Mobile and Embedded Devices" International Journal of Cooperative Information Systems
  50. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing" ACM Monet: Special Issue on Security in Mobile Computing Environments

Publications
Log in