Abstract is missing.
- Chisel: A Policy-Driven, Context-Aware, Dynamic Adaptation FrameworkJohn Keeney, Vinny Cahill. 3-14 [doi]
- Using UML and Maude for Writing and Reasoning about ODP PoliciesFrancisco Durán, Javier Herrador, Antonio Vallecillo. 15-25 [doi]
- Using Event Calculus to Formalise Policy Specification and AnalysisArosha K. Bandara, Emil Lupu, Alessandra Russo. 26 [doi]
- Prediction-Based Policy Adaptation for QoS Management in Wireless NetworksNancy Samaan, Ahmed Karmouch. 43-51 [doi]
- PECAN: Policy-Enabled Configuration Across NetworksRitu Chadha, Yuu-Heng Cheng, Thanh Cheng, Shrirang Gadgil, Abdelhakim Hafid, Keith Kim, Gary Levin, Narayanan Natarajan, Kirthika Parmeswaran, Alexander Poylisher, John Unger. 52-62 [doi]
- A Policy Language for a Pervasive Computing EnvironmentLalana Kagal, Timothy W. Finin, Anupam Joshi. 63 [doi]
- Analysis of Integrity Policies using Soft ConstraintsStefano Bistarelli, Simon N. Foley. 77-80 [doi]
- X-TNL: An XML-based Language for Trust NegotiationsElisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini. 81-84 [doi]
- Towards Policy-based Information Management for the Joint BattleSpace InfoSphereR. Cherinka, C. Wild, D. Allen, C. Smith, Y. Zhang, R. Panek, S. Semy. 85-88 [doi]
- A Toolkit-Based Approach to Policy-Managed StorageMurthy V. Devarakonda, Alla Segal, David M. Chess. 89-92 [doi]
- KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and EnforcementAndrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers, Niranjan Suri, Patrick J. Hayes, Maggie R. Breedy, Larry Bunch, Matt Johnson, Shriniwas Kulkarni, James Lott. 93 [doi]
- Policy Contexts: Controlling Information Flow in Parameterised RBACAndrás Belokosztolszki, David M. Eyers, Ken Moody. 99-110 [doi]
- Towards Automated Negotiation of Access Control PoliciesVijay G. Bharadwaj, John S. Baras. 111-119 [doi]
- Organization based access controAnas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin. 120 [doi]
- Translating Privacy Practices into Privacy Promises -How to Promise What You Can KeepGünter Karjoth, Matthias Schunter, Els Van Herreweghen. 135-146 [doi]
- Spatial Policies for Sentient Mobile ApplicationsDavid Scott, Alastair R. Beresford, Alan Mycroft. 147-157 [doi]
- Analyzing Security-Enhanced Linux Policy SpecificationsMyla Archer, Elizabeth I. Leonard, Matteo Pradella. 158 [doi]
- Toward Explicit Policy Management for Virtual OrganizationsGlenn S. Wasson, Marty Humphrey. 173-182 [doi]
- Towards Federated Policy ManagementRichard Hull, Bharat Kumar, Daniel F. Lieuwen. 183 [doi]
- Policy Based Electronic Transmission of PrescriptionsDavid W. Chadwick, Darren P. Mundy. 197-206 [doi]
- Using Policies in the Checking of Business to Business ContractsPeter F. Linington, Stephen W. Neal. 207-218 [doi]
- Policy-Driven Licensing Model for Component SoftwareQian Zhao, Yu Zhou, Mark Perry. 219 [doi]
- Enforcing History-Based Security Policies in Mobile Agent SystemsPedro Dias, Carlos Ribeiro, Paulo Ferreira. 231-234 [doi]
- A Policy Based Approach for Automated Topology Management of Peer To Peer Networks and a Prototype ImplementationAntonio Di Ferdinando, Paul McKee, Alessandro Amoroso. 235-238 [doi]
- Inter-Domains policy negociationFrançois Barrère, Abdelmalek Benzekri, Frédéric Grasset, Romain Laborde, Bassem Nasser. 239-242 [doi]
- A PBNM System for Integrated QoS and Multicast ManagementLisandro Zambenedetti Granville, Leandro Vaguetti, Maria Janilce B. Almeida, Liane Margarida Rockenbach Tarouco. 243-246 [doi]
- Enforcement of Communications Policies in Software Agent Systems through Mobile CodeNiranjan Suri, Marco M. Carvalho, Jeffrey M. Bradshaw, Maggie R. Breedy, Thomas B. Cowin, Paul T. Groth, Raul Saavedra, Andrzej Uszok. 247-250 [doi]