Abstract is missing.
- Autonomous Pervasive Systems and the Policy Challenges of a Small World!Emil Lupu, Naranker Dulay, Joe Sventek, Morris Sloman. 3-7 [doi]
- Confidentiality, Privacy and Trust Policy Enforcement for the Semantic WebBhavani M. Thuraisingham. 8-11 [doi]
- Policy-Driven Distributed Authorization: Status and ProspectsMarianne Winslett. 12-18 [doi]
- Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case StudyBjørnar Solhaug, Dag Elgesem, Ketil Stølen. 19-28 [doi]
- A Socio-cognitive Approach to Modeling Policies in Open EnvironmentsTatyana Ryutov. 29-38 [doi]
- On Interoperable Trust Negotiation StrategiesSabrina Baselice, Piero A. Bonatti, Marco Faella. 39-50 [doi]
- On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in EnterprisesMarco Casassa Mont, Filipe Beato. 51-55 [doi]
- Handling Dynamic Organizational Change with Community-Based Policy ManagementKevin Feeney, David Lewis, Vincent Wade. 56-60 [doi]
- Expertise Knowledge-Based Policy Refinement ProcessTaufiq Rochaeli, Claudia Eckert. 61-65 [doi]
- Infrastructure-Aware Autonomic Manager for Change ManagementHady S. AbdelSalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair. 66-69 [doi]
- Towards Privacy-Aware Handling of AuthorizationsWolfgang Dobmeier, Günther Pernul. 70-76 [doi]
- XACML-Based Composition Policies for Ambient NetworksCarlos Alberto Kamienski, Joseane Farias Fidalgo, Ramide Dantas, Djamel Sadok, Börje Ohlman. 77-86 [doi]
- Overriding of Access Control in XACMLJa far Alqatawna, Erik Rissanen, Babak Sadighi Firozabadi. 87-95 [doi]
- A Multi-level Policy Representation for Management Services in Maritime NetworksFrancis St-Onge, David Kidston, Isabelle Labbé. 96-108 [doi]
- Privacy in the Semantic Web: What Policy Languages Have to OfferClaudiu Duma, Almut Herzog, Nahid Shahmehri. 109-118 [doi]
- Specifying and Enforcing High-Level Semantic Obligation PoliciesZhen Liu, Anand Ranganathan, Anton Riabov. 119-128 [doi]
- Proteus: A Semantic Context-Aware Adaptive Policy ModelAlessandra Toninelli, Rebecca Montanari, Lalana Kagal, Ora Lassila. 129-140 [doi]
- Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese WallApu Kapadia, Prasad Naldurg, Roy H. Campbell. 141-150 [doi]
- An Automated Framework for Validating Firewall Policy EnforcementAdel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li. 151-160 [doi]
- Deriving Enforcement Mechanisms from PoliciesHelge Janicke, Antonio Cau, François Siewe, Hussein Zedan. 161-172 [doi]
- Data-Purpose Algebra: Modeling Data Usage PoliciesChris Hanson, Tim Berners-Lee, Lalana Kagal, Gerald Jay Sussman, Daniel J. Weitzner. 173-177 [doi]
- XACML Function AnnotationsPrathima Rao, Dan Lin, Elisa Bertino. 178-182 [doi]
- Using SAML and XACML for Complex Resource Provisioning in Grid Based ApplicationsYuri Demchenko, Leon Gommans, Cees de Laat. 183-187 [doi]
- Web Rule Languages to Carry PoliciesNima Kaviani, Dragan Gasevic, Marek Hatala, Gerd Wagner. 188-192 [doi]
- Policy Analysis Using a Hybrid Semantic Reasoning EngineKris Verlaenen, Bart De Win, Wouter Joosen. 193-200 [doi]
- Authorisation and Conflict Resolution for Hierarchical DomainsGiovanni Russello, Changyu Dong, Naranker Dulay. 201-210 [doi]
- Policy-Driven Negotiation for Authorization in the GridIonut Constandache, Daniel Olmedilla, Frank Siebenlist. 211-220 [doi]
- Performance Evaluation of Privacy-Preserving Policy Reconciliation ProtocolsJonathan Voris, Sotiris Ioannidis, Susanne Wetzel, Ulrike Meyer. 221-228 [doi]
- Identity Delegation in Policy Based SystemsRajeev Gupta, Shourya Roy, Manish Bhide. 229-240 [doi]
- Towards Effective Security Policy Management for Heterogeneous Network EnvironmentsLawrence Teo, Gail-Joon Ahn. 241-245 [doi]
- A Policy-Driven Trading Framework for Market-Based Spectrum AssignmentPatroklos G. Argyroudis, Timothy K. Forde, Linda Doyle, Donal O Mahony. 246-250 [doi]
- Call Management Policy Specification for the Asterisk Telephone Private Branch ExchangeGeorge Konstantoulakis, Morris Sloman. 251-255 [doi]
- On Automated Policy Generation for Mobile Ad Hoc NetworksCho-Yu Jason Chiang, Gary Levin, Yitzchak Gottlieb, Ritu Chadha, Shihwei Li, Alexander Poylisher, Scott Newman, Richard Lo. 256-260 [doi]
- CoRaL - Policy Language and Reasoning Techniques for Spectrum PoliciesDaniel Elenius, Grit Denker, Mark-Oliver Stehr, Rukman Senanayake, Carolyn L. Talcott, David Wilkins. 261-265 [doi]
- Dynamic Adaptation of Policies in Data Center ManagementWael Hosny Fouad Ali, Hanan Lutfiyya. 266-272 [doi]
- Analysis of Policy and Standards for Joint C4ISR Network TechnologiesMarion G. Ceruti, LorRaine Duffy, Y. Meriah Arias-Thode. 273 [doi]
- Towards Learning Privacy PoliciesArosha K. Bandara, Alessandra Russo, Emil C. Lupu. 274 [doi]
- DUKE - Distributed Usage Control EnforcementManuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter. 275 [doi]
- Policy-Based Parametric Firewall Configuration: A Real-Case ApplicationMassimo Marchi, Romeo Penzo, Alessandro Provetti. 276 [doi]
- Hybrid Multi-module Security Policy VerificationIgor V. Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov. 277 [doi]
- Towards Practical Security Monitors of UML Policies for Mobile ApplicationsFabio Massacci, Katsiaryna Naliuka. 278 [doi]
- Towards an Approach for Hybrid Trust ModelPhilippe Jaillon, Marc Roelens, Xavier Serpaggi, Hoan Vu. 279 [doi]
- POSITIF: A Policy-Based Security Management SystemCataldo Basile, Antonio Lioy, Gregorio Martínez Pérez, Félix J. García Clemente, Antonio F. Gómez-Skarmeta. 280 [doi]
- Adaptive Web Data Extraction PoliciesGiacomo Fiumara, Massimo Marchi, Alessandro Provetti. 281 [doi]
- Web Services Security: Challenges and TechniquesAnoop Singhal. 282 [doi]