default search action
POLICY 2011: Pisa, Italy
- POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011. IEEE Computer Society 2011, ISBN 978-1-4244-9879-6
Session 1: Policy Models and Languages
- Romuald Thion, Daniel Le Métayer:
FLAVOR: A Formal Language for a Posteriori Verification of Legal Rules. 1-8 - Wuliang Sun, Robert B. France, Indrakshi Ray:
Rigorous Analysis of UML Access Control Policy Models. 9-16 - Byung H. Park, Thomas J. Naughton, Pratul K. Agarwal, David E. Bernholdt, Al Geist, Jennifer L. Tippens:
Realization of User Level Fault Tolerant Policy Management through a Holistic Approach for Fault Correlation. 17-24 - Fatih Turkmen, Eunjin Jung, Bruno Crispo:
Towards Run-Time Verification in Access Control. 25-32
Session 2: Applications
- Sören Bleikertz, Thomas Groß:
A Virtualization Assurance Language for Isolation and Deployment. 33-40 - Ismaeel Al Ridhawi, Nancy Samaan, Ahmed Karmouch:
A Policy-Based Simulator for Assisted Adaptive Vertical Handover. 41-48 - Bong Jun Ko, Starsky H. Y. Wong, Kang-Won Lee, Chi-Kin Chau:
Distributed Overlay Construction to Support Policy-Based Access Control. 49-56 - Sara Hachem, Alessandra Toninelli, Animesh Pathak, Valérie Issarny:
Policy-Based Access Control in Mobile Social Ecosystems. 57-64 - Gorrell P. Cheek, Mohamed Shehab, Truong Ung, Ebonie Williams:
iLayer: Toward an Application Access Control Framework for Content Management Systems. 65-72 - Ahmed A. Ataullah, Frank Wm. Tompa:
Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance. 73-80 - Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi:
Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain MPLS Networks. 81-88
Session 3: Privacy and Security
- Nataliia Bielova, Fabio Massacci:
Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies. 89-96 - Oliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Tool-Supported Refinement of High-Level Requirements and Constraints Into Low-Level Policies. 97-104 - Achim D. Brucker, Helmut Petritsch:
A Framework for Managing and Analyzing Changes of Security Policies. 105-112
Short Papers Session 1
- Z. Cliffe Schreuders, Christian Payne, Tanya Jane McGill:
A Policy Language for Abstraction and Automation in Application-Oriented Access Controls: The Functionality-Based Application Confinement Policy Language. 113-116 - Steve Barker, Gillian Lowen:
GPF: A General Policy Framework. 117-120 - Sebastian Speiser:
Policy of Composition ? Composition of Policies. 121-124 - Ron Banner, Omer Barkol, Ruth Bergman, Shahar Golan, Yuval Carmel, Ido Ish-Hurwitz, Oded Zilinsky:
Automatic Policy Rule Extraction for Configuration Management. 125-128
Short Papers Session 2
- Guillaume Benats, Arosha K. Bandara, Yijun Yu, Jean-Noël Colin, Bashar Nuseibeh:
PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. 129-132 - Sören Preibusch:
Information Flow Control for Static Enforcement of User-Defined Privacy Policies. 133-136 - Marco Casassa Mont, Richard Brown:
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes. 137-140
Short Papers Session 3
- Oshani Seneviratne, Lalana Kagal:
Addressing Data Reuse Issues at the Protocol Level. 141-144 - Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino:
Profile-Based Selection of Accountability Policies in Grid Computing Systems. 145-148 - Ashish Gehani, Dawood Tariq, Basim Baig, Tanu Malik:
Policy-Based Integration of Provenance Metadata. 149-152 - Nicola Dragoni, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci, Federica Paci:
A Load Time Policy Checker for Open Multi-application Smart Cards. 153-156 - Mark R. Beaumont, Chris North, Bradley D. Hopkins, Ken Yiu:
Hard Disk Guard Based Policy Enforcement. 157-160 - Yurdaer N. Doganata, Keith Grueneberg, John Karat, Nirmal Mukhi:
Authoring and Deploying Business Policies Dynamically for Compliance Monitoring. 161-164 - Patricia Dockhorn Costa, João Paulo A. Almeida, Igor Magri Vale, Izon Thomaz Mielke:
A Model-Driven Approach for Incorporating Reactive Rules in Declarative Interactive TV Applications. 165-168
Poster and Demo Session
- Hasan T. Karaoglu, Murat Yuksel:
Inter-domain Multi-Hop Negotiation for the Internet. 169-170 - Wenjia Li, Pramod Jagtap, Rosa Laura Zavala Gutierrez, Anupam Joshi, Tim Finin:
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies. 171-172 - Mike C. Conway, Reagan W. Moore, Arcot Rajasekar, Jean-Yves Nief:
Demonstration of Policy-Guided Data Preservation Using iRODS. 173-174 - Mihaela Ion, Giovanni Russello, Bruno Crispo:
Enforcing Multi-user Access Policies to Encrypted Cloud Databases. 175-177 - Keith Grueneberg, David Wood, Xiping Wang, Seraphin B. Calo, Maroun Touma:
Policy Supersession in a Coalition ISR Network. 178-179 - Mahmoud Ghorbel, Armen Aghasaryan, Marie-Pascale Dupont, Stéphane Betgé-Brezetz, Guy-Bertrand Kamga, Sophie Piekarec:
A Multi-environment Application of Privacy Data Envelopes. 180-181 - Daniel Trivellato, Nicola Zannone, Sandro Etalle:
A Security Framework for Systems of Systems. 182-183 - Slim Trabelsi, Jakub Sendor, Stefanie Reinicke:
PPL: PrimeLife Privacy Policy Engine. 184-185 - Nicola Dragoni, Eduardo Lostal, Davide Papini:
(SC)²: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards. 186-187 - Qinghua Lu, Vladimir Tosic:
Using MiniZnMASC Middleware with Different Algorithms for Business-Driven Adaptation of Business Processes. 188-190 - Antonio Manuel Gutiérrez, José Antonio Parejo, Pablo Fernandez, Antonio Ruiz Cortés:
WS-Governance Tooling: SOA Governance Policies Analysis and Authoring. 191-192
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.