Abstract is missing.
- Collaborative Privacy Policy Authoring in a Social Networking ContextRyan Wishart, Domenico Corapi, Srdjan Marinovic, Morris Sloman. 1-8 [doi]
- User Centric Policy Management in Online Social NetworksMohamed Shehab, Gorrell P. Cheek, Hakim Touati, Anna Cinzia Squicciarini, Pau-Chen Cheng. 9-13 [doi]
- A Policy Based Infrastructure for Social Data Access with Privacy GuaranteesPalanivel Balaji Kodeswaran, Evelyne Viegas. 14-17 [doi]
- Usable Policy Template Authoring for Iterative Policy RefinementMaritza Johnson, John Karat, Clare-Marie Karat, Keith Grueneberg. 18-21 [doi]
- Downstream Usage ControlLaurent Bussard, Gregory Neven, Franz-Stefan Preiss. 22-29 [doi]
- Coordinating Data Usage Control in Loosely-Connected NetworksGiovanni Russello, Enrico Scalavino, Naranker Dulay, Emil C. Lupu. 30-39 [doi]
- ACPT: A Tool for Modeling and Verifying Access Control PoliciesJeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay. 40-43 [doi]
- An Intelligent Network for Federated Testing of NetCentric SystemsEdward Chow, Mark James, Hsin-Ping Chang, Farrokh Vatan, Gurusham Sudhir. 44-52 [doi]
- Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management ScenariosEnrico Scalavino, Vaibhav Gowadia, Rudi Ball, Emil C. Lupu, Giovanni Russello. 53-56 [doi]
- Teleo-Reactive Policies in Ponder2Kevin P. Twidle, Srdjan Marinovic, Naranker Dulay. 57-60 [doi]
- Policy-Based Management for Resource-Constrained Devices and SystemsOliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing. 61-64 [doi]
- Policy Generation Framework for Large-Scale Storage InfrastructuresRamani Routray, Rui Zhang, David M. Eyers, Douglas Willcocks, Peter R. Pietzuch, Prasenjit Sarkar. 65-72 [doi]
- Linking Policies to the Spatial EnvironmentDavid Evans, David M. Eyers, Jean Bacon. 73-76 [doi]
- QoP and QoS Policy Cognizant Module CompositionPaul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia. 77-86 [doi]
- Automatic Policy Mapping to Management System ConfigurationsAbdelnasser Ouda, Hanan Lutfiyya, Michael A. Bauer. 87-94 [doi]
- DAuth: Fine-Grained Authorization Delegation for Distributed Web Application ConsumersJoshua Schiffman, Xinwen Zhang, Simon Gibbs. 95-102 [doi]
- Toward Self-Contained Authorization PoliciesRomain Laborde, Marwan Cheaito, François Barrère, Abdelmalek Benzekri. 103-106 [doi]
- A Small But Non-negligible Flaw in the Android Permission SchemeWook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka. 107-110 [doi]
- A Model for the Governance of Federated Healthcare Information SystemsNaftaly Minsky. 111-119 [doi]
- Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share PoliciesGrit Denker, Ashish Gehani, Minyoung Kim, David Hanz. 120-128 [doi]
- JTAM - A Joint Threshold Administration ModelAshish Kamra, Elisa Bertino. 129-132 [doi]
- A Negotiation Framework for Negotiation of Coalition PoliciesMandis Beigi, Jorge Lobo, Keith Grueneberg, Seraphin B. Calo, John Karat. 133-136 [doi]
- Enforcement of Data-Plane Policies in Next-Generation NetworksShashank Shanbhag, Tilman Wolf. 137-140 [doi]
- Towards Autonomous Administrations of Decentralized Authorization for Inter-domain CollaborationsHannah K. Lee. 141-145 [doi]
- Efficient Policy Checking across Administrative DomainsDavid Evans, David M. Eyers. 146-153 [doi]