


default search action
POLICY 2011: Pisa, Italy
- POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011. IEEE Computer Society 2011, ISBN 978-1-4244-9879-6

Session 1: Policy Models and Languages
- Romuald Thion, Daniel Le Métayer:

FLAVOR: A Formal Language for a Posteriori Verification of Legal Rules. 1-8 - Wuliang Sun, Robert B. France, Indrakshi Ray:

Rigorous Analysis of UML Access Control Policy Models. 9-16 - Byung H. Park, Thomas J. Naughton, Pratul K. Agarwal

, David E. Bernholdt
, Al Geist, Jennifer L. Tippens:
Realization of User Level Fault Tolerant Policy Management through a Holistic Approach for Fault Correlation. 17-24 - Fatih Turkmen

, Eunjin Jung, Bruno Crispo:
Towards Run-Time Verification in Access Control. 25-32
Session 2: Applications
- Sören Bleikertz, Thomas Groß:

A Virtualization Assurance Language for Isolation and Deployment. 33-40 - Ismaeel Al Ridhawi, Nancy Samaan, Ahmed Karmouch:

A Policy-Based Simulator for Assisted Adaptive Vertical Handover. 41-48 - Bong Jun Ko, Starsky H. Y. Wong, Kang-Won Lee, Chi-Kin Chau

:
Distributed Overlay Construction to Support Policy-Based Access Control. 49-56 - Sara Hachem, Alessandra Toninelli

, Animesh Pathak, Valérie Issarny:
Policy-Based Access Control in Mobile Social Ecosystems. 57-64 - Gorrell P. Cheek, Mohamed Shehab

, Truong Ung, Ebonie Williams:
iLayer: Toward an Application Access Control Framework for Content Management Systems. 65-72 - Ahmed A. Ataullah, Frank Wm. Tompa

:
Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance. 73-80 - Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi:

Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain MPLS Networks. 81-88
Session 3: Privacy and Security
- Nataliia Bielova

, Fabio Massacci
:
Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies. 89-96 - Oliver Dohndorf

, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Tool-Supported Refinement of High-Level Requirements and Constraints Into Low-Level Policies. 97-104 - Achim D. Brucker

, Helmut Petritsch:
A Framework for Managing and Analyzing Changes of Security Policies. 105-112
Short Papers Session 1
- Z. Cliffe Schreuders, Christian Payne, Tanya Jane McGill:

A Policy Language for Abstraction and Automation in Application-Oriented Access Controls: The Functionality-Based Application Confinement Policy Language. 113-116 - Steve Barker, Gillian Lowen:

GPF: A General Policy Framework. 117-120 - Sebastian Speiser:

Policy of Composition ? Composition of Policies. 121-124 - Ron Banner, Omer Barkol, Ruth Bergman, Shahar Golan

, Yuval Carmel, Ido Ish-Hurwitz, Oded Zilinsky:
Automatic Policy Rule Extraction for Configuration Management. 125-128
Short Papers Session 2
- Guillaume Benats, Arosha K. Bandara, Yijun Yu, Jean-Noël Colin, Bashar Nuseibeh:

PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. 129-132 - Sören Preibusch:

Information Flow Control for Static Enforcement of User-Defined Privacy Policies. 133-136 - Marco Casassa Mont

, Richard Brown:
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes. 137-140
Short Papers Session 3
- Oshani Seneviratne

, Lalana Kagal:
Addressing Data Reuse Issues at the Protocol Level. 141-144 - Wonjun Lee, Anna Cinzia Squicciarini

, Elisa Bertino:
Profile-Based Selection of Accountability Policies in Grid Computing Systems. 145-148 - Ashish Gehani, Dawood Tariq, Basim Baig, Tanu Malik:

Policy-Based Integration of Provenance Metadata. 149-152 - Nicola Dragoni

, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci
, Federica Paci
:
A Load Time Policy Checker for Open Multi-application Smart Cards. 153-156 - Mark R. Beaumont

, Chris North, Bradley D. Hopkins
, Ken Yiu:
Hard Disk Guard Based Policy Enforcement. 157-160 - Yurdaer N. Doganata, Keith Grueneberg, John Karat, Nirmal Mukhi:

Authoring and Deploying Business Policies Dynamically for Compliance Monitoring. 161-164 - Patricia Dockhorn Costa, João Paulo A. Almeida

, Igor Magri Vale, Izon Thomaz Mielke:
A Model-Driven Approach for Incorporating Reactive Rules in Declarative Interactive TV Applications. 165-168
Poster and Demo Session
- Hasan T. Karaoglu, Murat Yuksel:

Inter-domain Multi-Hop Negotiation for the Internet. 169-170 - Wenjia Li

, Pramod Jagtap, Rosa Laura Zavala Gutierrez, Anupam Joshi
, Tim Finin:
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies. 171-172 - Mike C. Conway, Reagan W. Moore, Arcot Rajasekar, Jean-Yves Nief:

Demonstration of Policy-Guided Data Preservation Using iRODS. 173-174 - Mihaela Ion, Giovanni Russello, Bruno Crispo:

Enforcing Multi-user Access Policies to Encrypted Cloud Databases. 175-177 - Keith Grueneberg, David Wood, Xiping Wang, Seraphin B. Calo, Maroun Touma:

Policy Supersession in a Coalition ISR Network. 178-179 - Mahmoud Ghorbel, Armen Aghasaryan, Marie-Pascale Dupont, Stéphane Betgé-Brezetz, Guy-Bertrand Kamga, Sophie Piekarec:

A Multi-environment Application of Privacy Data Envelopes. 180-181 - Daniel Trivellato, Nicola Zannone

, Sandro Etalle:
A Security Framework for Systems of Systems. 182-183 - Slim Trabelsi, Jakub Sendor, Stefanie Reinicke:

PPL: PrimeLife Privacy Policy Engine. 184-185 - Nicola Dragoni

, Eduardo Lostal, Davide Papini:
(SC)²: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards. 186-187 - Qinghua Lu, Vladimir Tosic:

Using MiniZnMASC Middleware with Different Algorithms for Business-Driven Adaptation of Business Processes. 188-190 - Antonio Manuel Gutiérrez

, José Antonio Parejo
, Pablo Fernandez
, Antonio Ruiz Cortés
:
WS-Governance Tooling: SOA Governance Policies Analysis and Authoring. 191-192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














