Abstract is missing.
- Abductive Authorization Credential GatheringMoritz Y. Becker, Jason F. Mackay, Blair Dillaway. 1-8 [doi]
- Towards Session-Aware RBAC Administration and Enforcement with XACMLMin Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray. 9-16 [doi]
- Using Modelling and Simulation for Policy Decision Support in Identity ManagementAdrian Baldwin, Marco Casassa Mont, Simon Shiu. 17-24 [doi]
- Visualization for Access Control Policy Analysis Results Using Multi-level GridsPrathima Rao, Gabriel Ghinita, Elisa Bertino, Jorge Lobo. 25-28 [doi]
- Policies for Self Tuning Home NetworksDimosthenis Pediaditakis, Leonardo Mostarda, Changyu Dong, Naranker Dulay. 29-32 [doi]
- Strong and Weak Policy RelationsMichael J. May, Carl A. Gunter, Insup Lee, Steve Zdancewic. 33-36 [doi]
- Verification of Policy-Based Self-Managed Cell Interactions Using AlloyAlberto E. Schaeffer Filho, Emil C. Lupu, Morris Sloman, Susan Eisenbach. 37-40 [doi]
- An Entropy-Based Countermeasure against Intelligent DoS Attacks Targeting FirewallsF. Al-Haidari, Mohammed Sqalli, Khaled Salah, J. Hamodi. 41-44 [doi]
- Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow SystemWeili Han, Qun Ni, Hong Chen. 45-52 [doi]
- Policy-Based Real-Time Decision-Making for Personalized Service DeliveryJochen Bauknecht, Johannes Haussler, Daniel Kraft, Marcus Q. Kuhnen, Mario Lischka, Anett Schülke. 53-59 [doi]
- Model Checking Firewall Policy ConfigurationsAlan Jeffrey, Taghrid Samak. 60-67 [doi]
- ChangeRefinery: Assisted Refinement of High-Level IT Change RequestsDavid Trastour, Robert Fink, Fen Liu. 68-75 [doi]
- Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research DirectionsRoshan K. Thomas, Giovanni Russello, Simon Tsang. 76-83 [doi]
- Delegation AssistanceAchim D. Brucker, Helmut Petritsch, Andreas Schaad. 84-91 [doi]
- ProActive Caching - A Framework for Performance Optimized Access Control EvaluationsMathias Kohler, Robert Fies. 92-94 [doi]
- A Policy-Based Sensor Selection System with Goal Oriented Singular Value Decomposition TechniqueHoi Chan, Thomas Kwok. 95-97 [doi]
- XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation InfrastructureYuri Demchenko, Mihai Cristea, Cees de Laat. 98-101 [doi]
- Enabling Distributed Management for Dynamic Airborne NetworksCho-Yu Jason Chiang, Gary Levin, Shihwei Li, Constantin Serban, Michelle Wolberg, Ritu Chadha, Gregory Hadynski, Lee LaBarre. 102-105 [doi]
- A Digital Rights Management Model for HealthcareNicholas Paul Sheppard, Reihaneh Safavi-Naini, Mohammad Jafari. 106-109 [doi]
- POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomyDaniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle. 110-113 [doi]
- Security Policy Implementation Strategies for Common Carrier Monitoring Service ProvidersCarl A. Gunter. 114-117 [doi]
- Statistics & Clustering Based Framework for Efficient XACML Policy EvaluationSaid Marouf, Mohamed Shehab, Anna Cinzia Squicciarini, Smitha Sundareswaran. 118-125 [doi]
- Policy Processing: Don t Take it for GrantedJoseane Farias Fidalgo, Carlos Alberto Kamienski, Ramide Dantas, Djamel Sadok, Börje Ohlman. 126-133 [doi]
- In Vivo Evolution of Policies that Govern a Distributed SystemConstantin Serban, Naftaly H. Minsky. 134-141 [doi]
- A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic WebFathieh Faghih, Morteza Amini, Rasool Jalili. 142-149 [doi]
- Access Control Policies for Semantic NetworksTatyana Ryutov, Tatiana Kichkaylo, Robert Neches. 150-157 [doi]
- Formalization and Management of Group ObligationsYehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia. 158-165 [doi]
- An XACML Extension for Business Process-Centric Access Control PoliciesChristian Wolter, Christian Weiss, Christoph Meinel. 166-169 [doi]
- Towards Consistency of Policy States in Decentralized Autonomic Network ManagementJéferson Campos Nobre, Lisandro Zambenedetti Granville. 170-173 [doi]
- The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANETYuu-Heng Cheng, Mariana Raykova, Alexander Poylisher, Scott Alexander, Martin Eiger, Steven M. Bellovin. 174-177 [doi]
- xDUCON: Cross Domain Usage Control through Shared Data SpacesGiovanni Russello, Naranker Dulay. 178-181 [doi]
- Detecting Conflicts in ABAC Policies with Rule-Reduction and Binary-Search TechniquesCheng-chun Shu, Erica Y. Yang, Alvaro E. Arenas. 182-185 [doi]
- Mapping Policies to Management SystemsAbdelnasser Ouda, Hanan Lutfiyya, Michael A. Bauer. 186-189 [doi]