default search action
POLICY 2009: London, UK
- POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3742-9
Privacy and Security Management
- Moritz Y. Becker, Jason F. Mackay, Blair Dillaway:
Abductive Authorization Credential Gathering. 1-8 - Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray:
Towards Session-Aware RBAC Administration and Enforcement with XACML. 9-16 - Adrian Baldwin, Marco Casassa Mont, Simon Shiu:
Using Modelling and Simulation for Policy Decision Support in Identity Management. 17-24
Short Paper Session 1
- Prathima Rao, Gabriel Ghinita, Elisa Bertino, Jorge Lobo:
Visualization for Access Control Policy Analysis Results Using Multi-level Grids. 25-28 - Dimosthenis Pediaditakis, Leonardo Mostarda, Changyu Dong, Naranker Dulay:
Policies for Self Tuning Home Networks. 29-32 - Michael J. May, Carl A. Gunter, Insup Lee, Steve Zdancewic:
Strong and Weak Policy Relations. 33-36 - Alberto E. Schaeffer Filho, Emil C. Lupu, Morris Sloman, Susan Eisenbach:
Verification of Policy-Based Self-Managed Cell Interactions Using Alloy. 37-40 - Fahd Al-Haidari, Mohammed H. Sqalli, Khaled Salah, Jameel Hamodi:
An Entropy-Based Countermeasure against Intelligent DoS Attacks Targeting Firewalls. 41-44
Applications
- Weili Han, Qun Ni, Hong Chen:
Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System. 45-52 - Jochen Bauknecht, Johannes Häussler, Daniel Kraft, Marcus Q. Kuhnen, Mario Lischka, Anett Schülke:
Policy-Based Real-Time Decision-Making for Personalized Service Delivery. 53-59 - Alan Jeffrey, Taghrid Samak:
Model Checking Firewall Policy Configurations. 60-67
Policy Refinement
- David Trastour, Robert Fink, Fen Liu:
ChangeRefinery: Assisted Refinement of High-Level IT Change Requests. 68-75 - Roshan K. Thomas, Giovanni Russello, Simon Tsang:
Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions. 76-83 - Achim D. Brucker, Helmut Petritsch, Andreas Schaad:
Delegation Assistance. 84-91
Poster and Demo Session
- Mathias Kohler, Robert Fies:
ProActive Caching - A Framework for Performance Optimized Access Control Evaluations. 92-94 - Hoi Y. Chan, Thomas Kwok:
A Policy-Based Sensor Selection System with Goal Oriented Singular Value Decomposition Technique. 95-97
Short Paper Session 2
- Yuri Demchenko, Mihai Cristea, Cees de Laat:
XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure. 98-101 - Cho-Yu Jason Chiang, Gary Levin, Shihwei Li, Constantin Serban, Michelle Wolberg, Ritu Chadha, Gregory Hadynski, Lee LaBarre:
Enabling Distributed Management for Dynamic Airborne Networks. 102-105 - Nicholas Paul Sheppard, Reihaneh Safavi-Naini, Mohammad Jafari:
A Digital Rights Management Model for Healthcare. 106-109 - Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle:
POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy. 110-113 - Carl A. Gunter:
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers. 114-117
Systems and Tools
- Said Marouf, Mohamed Shehab, Anna Cinzia Squicciarini, Smitha Sundareswaran:
Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation. 118-125 - Joseane Farias Fidalgo, Carlos Alberto Kamienski, Ramide Dantas, Djamel Sadok, Börje Ohlman:
Policy Processing: Don't Take it for Granted. 126-133 - Constantin Serban, Naftaly H. Minsky:
In Vivo Evolution of Policies that Govern a Distributed System. 134-141
Formal Semantics of Policies
- Fathieh Faghih, Morteza Amini, Rasool Jalili:
A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web. 142-149 - Tatyana Ryutov, Tatiana Kichkaylo, Robert Neches:
Access Control Policies for Semantic Networks. 150-157 - Yehia El Rakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia:
Formalization and Management of Group Obligations. 158-165
Short Paper Session 3
- Christian Wolter, Christian Weiss, Christoph Meinel:
An XACML Extension for Business Process-Centric Access Control Policies. 166-169 - Jéferson Campos Nobre, Lisandro Zambenedetti Granville:
Towards Consistency of Policy States in Decentralized Autonomic Network Management. 170-173 - Yuu-Heng Cheng, Mariana Raykova, Alexander Poylisher, D. Scott Alexander, Martin Eiger, Steven M. Bellovin:
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET. 174-177 - Giovanni Russello, Naranker Dulay:
xDUCON: Cross Domain Usage Control through Shared Data Spaces. 178-181 - Cheng-chun Shu, Erica Y. Yang, Alvaro E. Arenas:
Detecting Conflicts in ABAC Policies with Rule-Reduction and Binary-Search Techniques. 182-185 - Abdelnasser Ouda, Hanan Lutfiyya, Michael A. Bauer:
Mapping Policies to Management Systems. 186-189
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.