|
Conferences in DBLP
- Emil Lupu, Naranker Dulay, Joe Sventek, Morris Sloman
Autonomous Pervasive Systems and the Policy Challenges of a Small World! [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:3-7 [Conf]
- Bhavani M. Thuraisingham
Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:8-11 [Conf]
- Marianne Winslett
Policy-Driven Distributed Authorization: Status and Prospects. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:12-18 [Conf]
- Bjørnar Solhaug, Dag Elgesem, Ketil Stølen
Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:19-28 [Conf]
- Tatyana Ryutov
A Socio-cognitive Approach to Modeling Policies in Open Environments. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:29-38 [Conf]
- Sabrina Baselice, Piero A. Bonatti, Marco Faella
On Interoperable Trust Negotiation Strategies. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:39-50 [Conf]
- Marco Casassa Mont, Filipe Beato
On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:51-55 [Conf]
- Kevin Feeney, David Lewis, Vincent Wade
Handling Dynamic Organizational Change with Community-Based Policy Management. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:56-60 [Conf]
- Taufiq Rochaeli, Claudia Eckert
Expertise Knowledge-Based Policy Refinement Process. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:61-65 [Conf]
- H. AbdelSalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair
Infrastructure-Aware Autonomic Manager for Change Management. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:66-69 [Conf]
- Wolfgang Dobmeier, Günther Pernul
Towards Privacy-Aware Handling of Authorizations. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:70-76 [Conf]
- Carlos Alberto Kamienski, Joseane Farias Fidalgo, Ramide Dantas, Djamel Sadok, Börje Ohlman
XACML-Based Composition Policies for Ambient Networks. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:77-86 [Conf]
- Ja'far Alqatawna, Erik Rissanen, Babak Sadighi Firozabadi
Overriding of Access Control in XACML. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:87-95 [Conf]
- Francis St-Onge, David Kidston, Isabelle Labbé
A Multi-level Policy Representation for Management Services in Maritime Networks. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:96-108 [Conf]
- Claudiu Duma, Almut Herzog, Nahid Shahmehri
Privacy in the Semantic Web: What Policy Languages Have to Offer. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:109-118 [Conf]
- Zhen Liu, Anand Ranganathan, Anton Riabov
Specifying and Enforcing High-Level Semantic Obligation Policies. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:119-128 [Conf]
- Alessandra Toninelli, Rebecca Montanari, Lalana Kagal, Ora Lassila
Proteus: A Semantic Context-Aware Adaptive Policy Model. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:129-140 [Conf]
- Apu Kapadia, Prasad Naldurg, Roy H. Campbell
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:141-150 [Conf]
- Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li
An Automated Framework for Validating Firewall Policy Enforcement. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:151-160 [Conf]
- Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan
Deriving Enforcement Mechanisms from Policies. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:161-172 [Conf]
- Chris Hanson, Tim Berners-Lee, Lalana Kagal, Gerald J. Sussman, Daniel J. Weitzner
Data-Purpose Algebra: Modeling Data Usage Policies. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:173-177 [Conf]
- Prathima Rao, Dan Lin, Elisa Bertino
XACML Function Annotations. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:178-182 [Conf]
- Yuri Demchenko, Leon Gommans, Cees de Laat
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:183-187 [Conf]
- Nima Kaviani, Dragan Gasevic, Marek Hatala, Gerd Wagner
Web Rule Languages to Carry Policies. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:188-192 [Conf]
- Kris Verlaenen, Bart De Win, Wouter Joosen
Policy Analysis Using a Hybrid Semantic Reasoning Engine. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:193-200 [Conf]
- Giovanni Russello, Changyu Dong, Naranker Dulay
Authorisation and Conflict Resolution for Hierarchical Domains. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:201-210 [Conf]
- Ionut Constandache, Daniel Olmedilla, Frank Siebenlist
Policy-Driven Negotiation for Authorization in the Grid. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:211-220 [Conf]
- Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, Ulrike Meyer
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:221-228 [Conf]
- Rajeev Gupta, Shourya Roy, Manish Bhide
Identity Delegation in Policy Based Systems. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:229-240 [Conf]
- Lawrence Teo, Gail-Joon Ahn
Towards Effective Security Policy Management for Heterogeneous Network Environments. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:241-245 [Conf]
- Patroklos G. Argyroudis, Timothy K. Forde, Linda Doyle, Donal O'Mahony
A Policy-Driven Trading Framework for Market-Based Spectrum Assignment. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:246-250 [Conf]
- George Konstantoulakis, Morris Sloman
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:251-255 [Conf]
- Cho-Yu J. Chiang, Gary Levin, Yitzchak Gottlieb, Ritu Chadha, Shihwei Li, Alexander Poylisher, Scott Newman, Richard Lo
On Automated Policy Generation for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:256-260 [Conf]
- Daniel Elenius, Grit Denker, Mark-Oliver Stehr, Rukman Senanayake, Carolyn L. Talcott, David Wilkins
CoRaL - Policy Language and Reasoning Techniques for Spectrum Policies. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:261-265 [Conf]
- Wael Hosny Fouad Ali, Hanan Lutfiyya
Dynamic Adaptation of Policies in Data Center Management. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:266-272 [Conf]
- Marion G. Ceruti, LorRaine Duffy, Y. Meriah Arias-Thode
Analysis of Policy and Standards for Joint C4ISR Network Technologies. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:273- [Conf]
- Arosha K. Bandara, Alessandra Russo, Emil C. Lupu
Towards Learning Privacy Policies. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:274- [Conf]
- Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter
DUKE - Distributed Usage Control Enforcement. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:275- [Conf]
- Massimo Marchi, Romeo Penzo, Alessandro Provetti
Policy-Based Parametric Firewall Configuration: A Real-Case Application. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:276- [Conf]
- Igor V. Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov
Hybrid Multi-module Security Policy Verification. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:277- [Conf]
- Fabio Massacci, Katsiaryna Naliuka
Towards Practical Security Monitors of UML Policies for Mobile Applications. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:278- [Conf]
- Philippe Jaillon, Marc Roelens, Xavier Serpaggi, Hoan Vu
Towards an Approach for Hybrid Trust Model. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:279- [Conf]
- Cataldo Basile, Antonio Lioy, Gregorio Martínez Pérez, Félix J. García Clemente, Antonio F. Gómez-Skarmeta
POSITIF: A Policy-Based Security Management System. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:280- [Conf]
- Giacomo Fiumara, Massimo Marchi, Alessandro Provetti
Adaptive Web Data Extraction Policies. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:281- [Conf]
- Anoop Singhal
Web Services Security: Challenges and Techniques. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:282- [Conf]
|