Abstract is missing.
- FLAVOR: A Formal Language for a Posteriori Verification of Legal RulesRomuald Thion, Daniel Le Métayer. 1-8 [doi]
- Rigorous Analysis of UML Access Control Policy ModelsWuliang Sun, Robert B. France, Indrakshi Ray. 9-16 [doi]
- Realization of User Level Fault Tolerant Policy Management through a Holistic Approach for Fault CorrelationByung H. Park, Thomas J. Naughton, Pratul K. Agarwal, David E. Bernholdt, Al Geist, Jennifer L. Tippens. 17-24 [doi]
- Towards Run-Time Verification in Access ControlFatih Turkmen, Eunjin Jung, Bruno Crispo. 25-32 [doi]
- A Virtualization Assurance Language for Isolation and DeploymentSören Bleikertz, Thomas Groß. 33-40 [doi]
- A Policy-Based Simulator for Assisted Adaptive Vertical HandoverIsmaeel Al Ridhawi, Nancy Samaan, Ahmed Karmouch. 41-48 [doi]
- Distributed Overlay Construction to Support Policy-Based Access ControlBong-Jun Ko, Starsky H. Y. Wong, Kang-Won Lee, Chi-Kin Chau. 49-56 [doi]
- Policy-Based Access Control in Mobile Social EcosystemsSara Hachem, Alessandra Toninelli, Animesh Pathak, Valérie Issarny. 57-64 [doi]
- iLayer: Toward an Application Access Control Framework for Content Management SystemsGorrell P. Cheek, Mohamed Shehab, Truong Ung, Ebonie Williams. 65-72 [doi]
- Lifecycle Management of Relational Records for External Auditing and Regulatory ComplianceAhmed A. Ataullah, Frank Wm. Tompa. 73-80 [doi]
- Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain MPLS NetworksMolka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi. 81-88 [doi]
- Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant PoliciesNataliia Bielova, Fabio Massacci. 89-96 [doi]
- Tool-Supported Refinement of High-Level Requirements and Constraints Into Low-Level PoliciesOliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing. 97-104 [doi]
- A Framework for Managing and Analyzing Changes of Security PoliciesAchim D. Brucker, Helmut Petritsch. 105-112 [doi]
- A Policy Language for Abstraction and Automation in Application-Oriented Access Controls: The Functionality-Based Application Confinement Policy LanguageZ. Cliffe Schreuders, Christian Payne, Tanya McGill. 113-116 [doi]
- GPF: A General Policy FrameworkSteve Barker, Gillian Lowen. 117-120 [doi]
- Policy of Composition ? Composition of PoliciesSebastian Speiser. 121-124 [doi]
- Automatic Policy Rule Extraction for Configuration ManagementRon Banner, Omer Barkol, Ruth Bergman, Shahar Golan, Yuval Carmel, Ido Ish-Hurwitz, Oded Zilinsky. 125-128 [doi]
- PrimAndroid: Privacy Policy Modelling and Analysis for Android ApplicationsGuillaume Benats, Arosha K. Bandara, Yijun Yu, Jean-Noel Colin, Bashar Nuseibeh. 129-132 [doi]
- Information Flow Control for Static Enforcement of User-Defined Privacy PoliciesSören Preibusch. 133-136 [doi]
- Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational ProcessesMarco Casassa Mont, Richard Brown. 137-140 [doi]
- Addressing Data Reuse Issues at the Protocol LevelOshani Seneviratne, Lalana Kagal. 141-144 [doi]
- Profile-Based Selection of Accountability Policies in Grid Computing SystemsWonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino. 145-148 [doi]
- Policy-Based Integration of Provenance MetadataAshish Gehani, Dawood Tariq, Basim Baig, Tanu Malik. 149-152 [doi]
- A Load Time Policy Checker for Open Multi-application Smart CardsNicola Dragoni, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci, Federica Paci. 153-156 [doi]
- Hard Disk Guard Based Policy EnforcementMark R. Beaumont, Chris J. North, Bradley D. Hopkins, Ken Yiu. 157-160 [doi]
- Authoring and Deploying Business Policies Dynamically for Compliance MonitoringYurdaer N. Doganata, Keith Grueneberg, John Karat, Nirmal Mukhi. 161-164 [doi]
- A Model-Driven Approach for Incorporating Reactive Rules in Declarative Interactive TV ApplicationsPatricia Dockhorn Costa, João Paulo A. Almeida, Igor Magri Vale, Izon Thomaz Mielke. 165-168 [doi]
- Inter-domain Multi-Hop Negotiation for the InternetHasan T. Karaoglu, Murat Yuksel. 169-170 [doi]
- CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using PoliciesWenjia Li, Pramod Jagtap, Rosa Laura Zavala Gutierrez, Anupam Joshi, Tim Finin. 171-172 [doi]
- Demonstration of Policy-Guided Data Preservation Using iRODSMike Conway, Reagan Moore, Arcot Rajasekar, Jean-Yves Nief. 173-174 [doi]
- Enforcing Multi-user Access Policies to Encrypted Cloud DatabasesMihaela Ion, Giovanni Russello, Bruno Crispo. 175-177 [doi]
- Policy Supersession in a Coalition ISR NetworkKeith Grueneberg, David Wood, Xiping Wang, Seraphin B. Calo, Maroun Touma. 178-179 [doi]
- A Multi-environment Application of Privacy Data EnvelopesMahmoud Ghorbel, Armen Aghasaryan, Marie-Pascale Dupont, Stéphane Betgé-Brezetz, Guy-Bertrand Kamga, Sophie Piekarec. 180-181 [doi]
- A Security Framework for Systems of SystemsDaniel Trivellato, Nicola Zannone, Sandro Etalle. 182-183 [doi]
- PPL: PrimeLife Privacy Policy EngineSlim Trabelsi, Jakub Sendor, Stefanie Reinicke. 184-185 [doi]
- (SC)²: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart CardsNicola Dragoni, Eduardo Lostal, Davide Papini. 186-187 [doi]
- Using MiniZnMASC Middleware with Different Algorithms for Business-Driven Adaptation of Business ProcessesQinghua Lu, Vladimir Tosic. 188-190 [doi]
- WS-Governance Tooling: SOA Governance Policies Analysis and AuthoringAntonio Manuel Gutiérrez, Jose Antonio Parejo, Pablo Fernandez, Antonio Ruiz Cortés. 191-192 [doi]