default search action
POLICY 2010: Fairfax, VA, USA
- POLICY 2010, IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8206-1
Social Networking and Usability
- Ryan Wishart, Domenico Corapi, Srdjan Marinovic, Morris Sloman:
Collaborative Privacy Policy Authoring in a Social Networking Context. 1-8 - Mohamed Shehab, Gorrell P. Cheek, Hakim Touati, Anna Cinzia Squicciarini, Pau-Chen Cheng:
User Centric Policy Management in Online Social Networks. 9-13 - Palanivel A. Kodeswaran, Evelyne Viegas:
A Policy Based Infrastructure for Social Data Access with Privacy Guarantees. 14-17 - Maritza Johnson, John Karat, Clare-Marie Karat, Keith Grueneberg:
Usable Policy Template Authoring for Iterative Policy Refinement. 18-21
Usage Control
- Laurent Bussard, Gregory Neven, Franz-Stefan Preiss:
Downstream Usage Control. 22-29 - Giovanni Russello, Enrico Scalavino, Naranker Dulay, Emil C. Lupu:
Coordinating Data Usage Control in Loosely-Connected Networks. 30-39
Debugging Policies
- JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay:
ACPT: A Tool for Modeling and Verifying Access Control Policies. 40-43 - Edward Chow, Mark James, Hsin-Ping Chang, Farrokh Vatan, Gurusham Sudhir:
An Intelligent Network for Federated Testing of NetCentric Systems. 44-52
Policy Application I
- Enrico Scalavino, Vaibhav Gowadia, Rudi Ball, Emil C. Lupu, Giovanni Russello:
Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios. 53-56 - Kevin P. Twidle, Srdjan Marinovic, Naranker Dulay:
Teleo-Reactive Policies in Ponder2. 57-60 - Oliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Policy-Based Management for Resource-Constrained Devices and Systems. 61-64
Policy Application II
- Ramani Routray, Rui Zhang, David M. Eyers, Douglas Willcocks, Peter R. Pietzuch, Prasenjit Sarkar:
Policy Generation Framework for Large-Scale Storage Infrastructures. 65-72 - David Evans, David M. Eyers, Jean Bacon:
Linking Policies to the Spatial Environment. 73-76 - Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia:
QoP and QoS Policy Cognizant Module Composition. 77-86 - Abdelnasser Ouda, Hanan Lutfiyya, Michael A. Bauer:
Automatic Policy Mapping to Management System Configurations. 87-94
Authorization
- Joshua Schiffman, Xinwen Zhang, Simon Gibbs:
DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers. 95-102 - Romain Laborde, Marwan Cheaito, François Barrère, Abdelmalek Benzekri:
Toward Self-Contained Authorization Policies. 103-106 - Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Small But Non-negligible Flaw in the Android Permission Scheme. 107-110 - Naftaly H. Minsky:
A Model for the Governance of Federated Healthcare Information Systems. 111-119
Policy Models and Languages
- Grit Denker, Ashish Gehani, Minyoung Kim, David Hanz:
Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies. 120-128 - Ashish Kamra, Elisa Bertino:
JTAM - A Joint Threshold Administration Model. 129-132
Networking and Virtual Organizations
- Mandis Beigi, Jorge Lobo, Keith Grueneberg, Seraphin B. Calo, John Karat:
A Negotiation Framework for Negotiation of Coalition Policies. 133-136 - Shashank Shanbhag, Tilman Wolf:
Enforcement of Data-Plane Policies in Next-Generation Networks. 137-140 - Hannah K. Lee:
Towards Autonomous Administrations of Decentralized Authorization for Inter-domain Collaborations. 141-145 - David Evans, David M. Eyers:
Efficient Policy Checking across Administrative Domains. 146-153
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.