Abstract is missing.
- Systematic Policy Analysis for High-Assurance Services in SELinuxGail-Joon Ahn, Wenjuan Xu, Xinwen Zhang. 3-10 [doi]
- Comparing Rule-Based PoliciesPiero A. Bonatti, Fabio Mogavero. 11-18 [doi]
- QoS Policy Modeling and Conflict AnalysisTaghrid Samak, Ehab Al-Shaer, Hong Li. 19-26 [doi]
- C:::2:::: The Case for a Network Configuration Checking LanguageJorge Lobo, Vasileios Pappas. 29-36 [doi]
- Policies for the Management of Ambient Networks: From Theory to PracticeRamide Dantas, Joseane Farias Fidalgo, Djamel Sadok, Carlos Alberto Kamienski, Börje Ohlman. 37-45 [doi]
- Policy Validation for System Automation: A Case StudyEmmanuel Zarpas, Cindy Eisner, Sivan Tal. 46-53 [doi]
- Using Dependency Tracking to Provide Explanations for Policy ManagementLalana Kagal, Chris Hanson, Daniel J. Weitzner. 54-61 [doi]
- Towards the Visualisation of Collaborative Policy DecompositionJohn Keeney, Owen Conlan, Declan O Sullivan, David Lewis, Vincent Wade. 65-69 [doi]
- A Transformational Approach to Facilitate Monitoring of High-Level PoliciesFredrik Seehusen, Ketil Stølen. 70-73 [doi]
- An Algebra for Integration and Analysis of Ponder2 PoliciesHang Zhao, Jorge Lobo, Steven M. Bellovin. 74-77 [doi]
- Geometric Interpretation of Policy SpecificationCataldo Basile, Alberto Cappadonia, Antonio Lioy. 78-81 [doi]
- Using an Information Model and Associated Ontology for Selection of Policies for Conflict AnalysisSteven Davy, Brendan Jennings, John Strassner. 82-85 [doi]
- Automatic Compliance of Privacy Policies in Federated Digital Identity ManagementAnna Cinzia Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, Elisa Bertino. 89-92 [doi]
- PEP = Point to Enhance ParticularlyRomain Laborde, Michel Kamel, François Barrère, Abdelmalek Benzekri. 93-96 [doi]
- Design Patterns for Policy-Based Service EngagementsYathiraj B. Udupi, Munindar P. Singh. 97-100 [doi]
- Model-Driven Engineering of a General Policy Modeling LanguageNima Kaviani, Dragan Gasevic, Milan Milanovic, Marek Hatala, Bardia Mohabbati. 101-104 [doi]
- PBNM Technology Evaluation: Practical CriteriaAlexander Poylisher, Ritu Chadha. 105-108 [doi]
- Concurrent Enforcement of Usage Control PoliciesHelge Janicke, Antonio Cau, François Siewe, Hussein Zedan. 111-118 [doi]
- Compile-Time Enforcement of Dynamic Security PoliciesDavid M. Eyers, Sriram Srinivasan, Ken Moody, Jean Bacon. 119-126 [doi]
- Policy Specification and Enforcement for Smart ID Cards DeploymentRamaswamy Chandramouli. 127-134 [doi]
- Policy-Based Information Sharing in Publish/Subscribe MiddlewareJatinder Singh, Luis Vargas, Jean Bacon, Ken Moody. 137-144 [doi]
- New Developments in Ontology-Based Policy Management: Increasing the Practicality and Comprehensiveness of KAoSAndrzej Uszok, Jeffrey M. Bradshaw, James Lott, Maggie R. Breedy, Larry Bunch, Paul J. Feltovich, Matthew Johnson, Hyuckchul Jung. 145-152 [doi]
- Consent-Based Workflows for Healthcare ManagementGiovanni Russello, Changyu Dong, Naranker Dulay. 153-161 [doi]
- An Information Model and Architecture for Context-Aware Management DomainsRicardo Neisse, Patricia Dockhorn Costa, Maarten Wegdam, Marten van Sinderen. 162-169 [doi]
- Or Best Offer: A Privacy Policy Negotiation ProtocolDaniel D. Walker, Eric G. Mercer, Kent E. Seamons. 173-180 [doi]
- A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labelingLei Zhang, Alexander Brodsky, Vipin Swarup, Sushil Jajodia. 181-188 [doi]
- A Logic for Multi-domain Authorization Considering AdministratorsZeinab Iranmanesh, Morteza Amini, Rasool Jalili. 189-196 [doi]
- Policy Management across Multiple Platforms and Application DomainsMatthew Johnson, Jeffrey M. Bradshaw, Hyuckchul Jung, Niranjan Suri, Marco M. Carvalho. 199-202 [doi]
- A Context-Aware, Policy-Based Framework for Ambient NetworkHassine Moungla. 203-206 [doi]
- Social Network Profile and PolicyJuliana Mitchell-Wong, Ryszard Kowalczyk, Quoc Bao Vo. 207-210 [doi]
- Policy Peering for Next-Generation NetworksKalyani Bogineni, Flemming Andreasen. 211-214 [doi]
- Towards Self-Configuring Policy-Based Management SystemsAbdelnasser Ouda, Hanan Lutfiyya, Michael A. Bauer. 215-218 [doi]
- How to Enable Policy-Based Interactions in Dynamic Wireless Networks?Chi-Kin Chau, Jon Crowcroft, Kang-Won Lee, Starsky H. Y. Wong. 219-222 [doi]
- A Demonstration of Formal Policy Reasoning Using an Extended Version of BaseVISorChristopher J. Matheus, Mieczyslaw M. Kokar, Robert Dionne. 225-227 [doi]
- A Trust Management Package for Policy-Driven Protection & Personalization of Web ContentJuri Luca De Coi, Daniel Olmedilla, Sergej Zerr, Piero A. Bonatti, Luigi Sauro. 228-230 [doi]
- Demonstrating Human-Robot Coordination through Dynamic RegulationMatthew Johnson, Paul J. Feltovich, Jeffrey M. Bradshaw, Larry Bunch. 231-232 [doi]
- Demonstrating Selected W3C Policy Languages Interest Group Use Cases Using the KAoS Policy Services FrameworkAndrzej Uszok, Jeffrey M. Bradshaw. 233-234 [doi]
- DRAMA: Distributed Policy Management for MANETsRitu Chadha, Cho-Yu Jason Chiang. 235-237 [doi]
- EXAM: An Environment for Access Control Policy Analysis and ManagementPrathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo. 238-240 [doi]
- Policy Enabled ITA Sensor Fabric, A Distributed Framework for the Validation of Experimental Algorithms Using Real and Simulated SensorsFlávio Bergamaschi, Dave Conway-Jones, Christopher Gibson, Andy Stanford-Clark, Dinesh C. Verma, Seraphin B. Calo, Greg Cirincione, Tiem Pham. 241-242 [doi]
- Policy-Governed Information Exchange in a U.S. Army Operational ScenarioLarry Bunch, Jeffrey M. Bradshaw, Clifford O. Young. 243-244 [doi]
- Ponder2 - A Policy Environment for Autonomous Pervasive SystemsKevin P. Twidle, Emil Lupu, Naranker Dulay, Morris Sloman. 245-246 [doi]
- The Coalition Policy Management Portal for Policy Authoring, Verification, and DeploymentCarolyn Brodie, David George, Clare-Marie Karat, John Karat, Jorge Lobo, Mandis Beigi, Xiping Wang, Seraphin B. Calo, Dinesh C. Verma, Alberto E. Schaeffer Filho, Emil Lupu, Morris Sloman. 247-249 [doi]