default search action
POLICY 2007: Bologna, Italy
- 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy. IEEE Computer Society 2007, ISBN 0-7695-2767-1
Invited Talks
- Emil Lupu, Naranker Dulay, Joe Sventek, Morris Sloman:
Autonomous Pervasive Systems and the Policy Challenges of a Small World! 3-7 - Bhavani Thuraisingham:
Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. 8-11 - Marianne Winslett:
Policy-Driven Distributed Authorization: Status and Prospects. 12-18
Session I: Modeling Policies
- Bjørnar Solhaug, Dag Elgesem, Ketil Stølen:
Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study. 19-28 - Tatyana Ryutov:
A Socio-cognitive Approach to Modeling Policies in Open Environments. 29-38 - Sabrina Baselice, Piero A. Bonatti, Marco Faella:
On Interoperable Trust Negotiation Strategies. 39-50
Session II: Policy Design and Management (Short Papers)
- Marco Casassa Mont, Filipe Beato:
On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises. 51-55 - Kevin Feeney, David Lewis, Vincent Wade:
Handling Dynamic Organizational Change with Community-Based Policy Management. 56-60 - Taufiq Rochaeli, Claudia Eckert:
Expertise Knowledge-Based Policy Refinement Process. 61-65 - Hady S. AbdelSalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair:
Infrastructure-Aware Autonomic Manager for Change Management. 66-69 - Wolfgang Dobmeier, Günther Pernul:
Towards Privacy-Aware Handling of Authorizations. 70-76
Session III: XML-Based Policies
- Carlos Alberto Kamienski, Joseane Farias Fidalgo, Ramide Dantas, Djamel Sadok, Börje Ohlman:
XACML-Based Composition Policies for Ambient Networks. 77-86 - Ja'far Alqatawna, Erik Rissanen, Babak Sadighi Firozabadi:
Overriding of Access Control in XACML. 87-95 - Francis St-Onge, David Kidston, Isabelle Labbé:
A Multi-level Policy Representation for Management Services in Maritime Networks. 96-108
Session IV: SW Policy Languages
- Claudiu Duma, Almut Herzog, Nahid Shahmehri:
Privacy in the Semantic Web: What Policy Languages Have to Offer. 109-118 - Zhen Liu, Anand Ranganathan, Anton Riabov:
Specifying and Enforcing High-Level Semantic Obligation Policies. 119-128 - Alessandra Toninelli, Rebecca Montanari, Lalana Kagal, Ora Lassila:
Proteus: A Semantic Context-Aware Adaptive Policy Model. 129-140
Session V: Policy Enforcement
- Apu Kapadia, Prasad Naldurg, Roy H. Campbell:
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. 141-150 - Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li:
An Automated Framework for Validating Firewall Policy Enforcement. 151-160 - Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan:
Deriving Enforcement Mechanisms from Policies. 161-172
Session VI: Policy Analysis and Semantic Enhancements (Short Papers)
- Chris Hanson, Tim Berners-Lee, Lalana Kagal, Gerald J. Sussman, Daniel J. Weitzner:
Data-Purpose Algebra: Modeling Data Usage Policies. 173-177 - Prathima Rao, Dan Lin, Elisa Bertino:
XACML Function Annotations. 178-182 - Yuri Demchenko, Leon Gommans, Cees de Laat:
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications. 183-187 - Nima Kaviani, Dragan Gasevic, Marek Hatala, Gerd Wagner:
Web Rule Languages to Carry Policies. 188-192 - Kris Verlaenen, Bart De Win, Wouter Joosen:
Policy Analysis Using a Hybrid Semantic Reasoning Engine. 193-200
Session VII: Policy Negotiation and Resolution
- Giovanni Russello, Changyu Dong, Naranker Dulay:
Authorisation and Conflict Resolution for Hierarchical Domains. 201-210 - Ionut Constandache, Daniel Olmedilla, Frank Siebenlist:
Policy-Driven Negotiation for Authorization in the Grid. 211-220 - Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, Ulrike Meyer:
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols. 221-228 - Rajeev Gupta, Shourya Roy, Manish Bhide:
Identity Delegation in Policy Based Systems. 229-240
Session VIII: Applications (Short Papers)
- Lawrence Teo, Gail-Joon Ahn:
Towards Effective Security Policy Management for Heterogeneous Network Environments. 241-245 - Patroklos G. Argyroudis, Timothy K. Forde, Linda Doyle, Donal O'Mahony:
A Policy-Driven Trading Framework for Market-Based Spectrum Assignment. 246-250 - George Konstantoulakis, Morris Sloman:
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange. 251-255 - Cho-Yu Jason Chiang, Gary Levin, Yitzchak M. Gottlieb, Ritu Chadha, Shihwei Li, Alexander Poylisher, Scott Newman, Richard Lo:
On Automated Policy Generation for Mobile Ad Hoc Networks. 256-260 - Daniel Elenius, Grit Denker, Mark-Oliver Stehr, Rukman Senanayake, Carolyn L. Talcott, David Wilkins:
CoRaL - Policy Language and Reasoning Techniques for Spectrum Policies. 261-265 - Wael Hosny Fouad Aly, Hanan Lutfiyya:
Dynamic Adaptation of Policies in Data Center Management. 266-272
Posters
- Marion G. Ceruti, LorRaine Duffy, Y. Meriah Arias-Thode:
Analysis of Policy and Standards for Joint C4ISR Network Technologies. 273 - Arosha K. Bandara, Alessandra Russo, Emil C. Lupu:
Towards Learning Privacy Policies. 274 - Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter:
DUKE - Distributed Usage Control Enforcement. 275 - Massimo Marchi, Romeo Penzo, Alessandro Provetti:
Policy-Based Parametric Firewall Configuration: A Real-Case Application. 276 - Igor V. Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov:
Hybrid Multi-module Security Policy Verification. 277 - Fabio Massacci, Katsiaryna Naliuka:
Towards Practical Security Monitors of UML Policies for Mobile Applications. 278 - Philippe Jaillon, Marc Roelens, Xavier Serpaggi, Hoan Vu:
Towards an Approach for Hybrid Trust Model. 279 - Cataldo Basile, Antonio Lioy, Gregorio Martínez Pérez, Félix J. García Clemente, Antonio Fernandez Gómez-Skarmeta:
POSITIF: A Policy-Based Security Management System. 280 - Giacomo Fiumara, Massimo Marchi, Alessandro Provetti:
Adaptive Web Data Extraction Policies. 281 - Anoop Singhal:
Web Services Security: Challenges and Techniques. 282
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.