The SCEAS System
Navigation Menu

Conferences in DBLP

Policies for Distributed Systems and Networks (policy)
2007 (conf/policy/2007)

  1. Emil Lupu, Naranker Dulay, Joe Sventek, Morris Sloman
    Autonomous Pervasive Systems and the Policy Challenges of a Small World! [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:3-7 [Conf]
  2. Bhavani M. Thuraisingham
    Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:8-11 [Conf]
  3. Marianne Winslett
    Policy-Driven Distributed Authorization: Status and Prospects. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:12-18 [Conf]
  4. Bjørnar Solhaug, Dag Elgesem, Ketil Stølen
    Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:19-28 [Conf]
  5. Tatyana Ryutov
    A Socio-cognitive Approach to Modeling Policies in Open Environments. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:29-38 [Conf]
  6. Sabrina Baselice, Piero A. Bonatti, Marco Faella
    On Interoperable Trust Negotiation Strategies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:39-50 [Conf]
  7. Marco Casassa Mont, Filipe Beato
    On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:51-55 [Conf]
  8. Kevin Feeney, David Lewis, Vincent Wade
    Handling Dynamic Organizational Change with Community-Based Policy Management. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:56-60 [Conf]
  9. Taufiq Rochaeli, Claudia Eckert
    Expertise Knowledge-Based Policy Refinement Process. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:61-65 [Conf]
  10. H. AbdelSalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair
    Infrastructure-Aware Autonomic Manager for Change Management. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:66-69 [Conf]
  11. Wolfgang Dobmeier, Günther Pernul
    Towards Privacy-Aware Handling of Authorizations. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:70-76 [Conf]
  12. Carlos Alberto Kamienski, Joseane Farias Fidalgo, Ramide Dantas, Djamel Sadok, Börje Ohlman
    XACML-Based Composition Policies for Ambient Networks. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:77-86 [Conf]
  13. Ja'far Alqatawna, Erik Rissanen, Babak Sadighi Firozabadi
    Overriding of Access Control in XACML. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:87-95 [Conf]
  14. Francis St-Onge, David Kidston, Isabelle Labbé
    A Multi-level Policy Representation for Management Services in Maritime Networks. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:96-108 [Conf]
  15. Claudiu Duma, Almut Herzog, Nahid Shahmehri
    Privacy in the Semantic Web: What Policy Languages Have to Offer. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:109-118 [Conf]
  16. Zhen Liu, Anand Ranganathan, Anton Riabov
    Specifying and Enforcing High-Level Semantic Obligation Policies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:119-128 [Conf]
  17. Alessandra Toninelli, Rebecca Montanari, Lalana Kagal, Ora Lassila
    Proteus: A Semantic Context-Aware Adaptive Policy Model. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:129-140 [Conf]
  18. Apu Kapadia, Prasad Naldurg, Roy H. Campbell
    Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:141-150 [Conf]
  19. Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li
    An Automated Framework for Validating Firewall Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:151-160 [Conf]
  20. Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan
    Deriving Enforcement Mechanisms from Policies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:161-172 [Conf]
  21. Chris Hanson, Tim Berners-Lee, Lalana Kagal, Gerald J. Sussman, Daniel J. Weitzner
    Data-Purpose Algebra: Modeling Data Usage Policies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:173-177 [Conf]
  22. Prathima Rao, Dan Lin, Elisa Bertino
    XACML Function Annotations. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:178-182 [Conf]
  23. Yuri Demchenko, Leon Gommans, Cees de Laat
    Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:183-187 [Conf]
  24. Nima Kaviani, Dragan Gasevic, Marek Hatala, Gerd Wagner
    Web Rule Languages to Carry Policies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:188-192 [Conf]
  25. Kris Verlaenen, Bart De Win, Wouter Joosen
    Policy Analysis Using a Hybrid Semantic Reasoning Engine. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:193-200 [Conf]
  26. Giovanni Russello, Changyu Dong, Naranker Dulay
    Authorisation and Conflict Resolution for Hierarchical Domains. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:201-210 [Conf]
  27. Ionut Constandache, Daniel Olmedilla, Frank Siebenlist
    Policy-Driven Negotiation for Authorization in the Grid. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:211-220 [Conf]
  28. Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, Ulrike Meyer
    Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:221-228 [Conf]
  29. Rajeev Gupta, Shourya Roy, Manish Bhide
    Identity Delegation in Policy Based Systems. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:229-240 [Conf]
  30. Lawrence Teo, Gail-Joon Ahn
    Towards Effective Security Policy Management for Heterogeneous Network Environments. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:241-245 [Conf]
  31. Patroklos G. Argyroudis, Timothy K. Forde, Linda Doyle, Donal O'Mahony
    A Policy-Driven Trading Framework for Market-Based Spectrum Assignment. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:246-250 [Conf]
  32. George Konstantoulakis, Morris Sloman
    Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:251-255 [Conf]
  33. Cho-Yu J. Chiang, Gary Levin, Yitzchak Gottlieb, Ritu Chadha, Shihwei Li, Alexander Poylisher, Scott Newman, Richard Lo
    On Automated Policy Generation for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:256-260 [Conf]
  34. Daniel Elenius, Grit Denker, Mark-Oliver Stehr, Rukman Senanayake, Carolyn L. Talcott, David Wilkins
    CoRaL - Policy Language and Reasoning Techniques for Spectrum Policies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:261-265 [Conf]
  35. Wael Hosny Fouad Ali, Hanan Lutfiyya
    Dynamic Adaptation of Policies in Data Center Management. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:266-272 [Conf]
  36. Marion G. Ceruti, LorRaine Duffy, Y. Meriah Arias-Thode
    Analysis of Policy and Standards for Joint C4ISR Network Technologies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:273- [Conf]
  37. Arosha K. Bandara, Alessandra Russo, Emil C. Lupu
    Towards Learning Privacy Policies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:274- [Conf]
  38. Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter
    DUKE - Distributed Usage Control Enforcement. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:275- [Conf]
  39. Massimo Marchi, Romeo Penzo, Alessandro Provetti
    Policy-Based Parametric Firewall Configuration: A Real-Case Application. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:276- [Conf]
  40. Igor V. Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov
    Hybrid Multi-module Security Policy Verification. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:277- [Conf]
  41. Fabio Massacci, Katsiaryna Naliuka
    Towards Practical Security Monitors of UML Policies for Mobile Applications. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:278- [Conf]
  42. Philippe Jaillon, Marc Roelens, Xavier Serpaggi, Hoan Vu
    Towards an Approach for Hybrid Trust Model. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:279- [Conf]
  43. Cataldo Basile, Antonio Lioy, Gregorio Martínez Pérez, Félix J. García Clemente, Antonio F. Gómez-Skarmeta
    POSITIF: A Policy-Based Security Management System. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:280- [Conf]
  44. Giacomo Fiumara, Massimo Marchi, Alessandro Provetti
    Adaptive Web Data Extraction Policies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:281- [Conf]
  45. Anoop Singhal
    Web Services Security: Challenges and Techniques. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:282- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002