By Topic

Policies for Distributed Systems and Networks, 2007. POLICY '07. Eighth IEEE International Workshop on

Date 13-15 June 2007

Filter Results

Displaying Results 1 - 25 of 52
  • Eighth IEEE International Workshop on Policies for Distributed Systems and Networks - Cover

    Publication Year: 2007 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (119 KB)  
    Freely Available from IEEE
  • Eighth IEEE International Workshop on Policies for Distributed Systems and Networks-Title

    Publication Year: 2007 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • Eighth IEEE International Workshop on Policies for Distributed Systems and Networks-Copyright

    Publication Year: 2007 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • Eighth IEEE International Workshop on Policies for Distributed Systems and Networks - TOC

    Publication Year: 2007 , Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2007 , Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Committees

    Publication Year: 2007 , Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (39 KB)  
    Freely Available from IEEE
  • Autonomous Pervasive Systems and the Policy Challenges of a Small World!

    Publication Year: 2007 , Page(s): 3 - 7
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1219 KB) |  | HTML iconHTML  

    Pervasive systems are the subject of intensifying research efforts and their applications range from health monitoring and intelligent homes, to location aware services, unmanned vehicles and city-wide pervasive infrastructures. Although application- specific solutions have been proposed, their design has often raised additional challenges. This paper discusses the use of autonomous pervasive syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web

    Publication Year: 2007 , Page(s): 8 - 11
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (75 KB) |  | HTML iconHTML  

    In this position paper we describe aspects of securing the semantic Web. In particular, we discuss ways of enforcing confidentiality privacy and trust polices. We also discuss our research on secure geospatial semantic Web. Our application of secure semantic Web technologies for assured information sharing is also discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy-Driven Distributed Authorization: Status and Prospects

    Publication Year: 2007 , Page(s): 12 - 18
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (157 KB)  

    Policies show great potential as a way to control the behavior of complex computer systems. In the case of authorization decisions in large distributed systems, policies offer the potential to abstract away from the details of who is allowed to access which services, under which conditions. This layer of abstraction is both a challenge and an opportunity: policy-driven distributed authorization sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study

    Publication Year: 2007 , Page(s): 19 - 28
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (8017 KB) |  | HTML iconHTML  

    This paper provides a case study based evaluation of UML sequence diagrams as a notation for policy specification. Policy rules are defined on the basis of deontic logic and provided a trace based semantics interpreted over Kripke structures. This gives a semantics comparable to the UML trace semantics for sequence diagrams, which is utilized in the evaluation. The focus is on requirements with re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Socio-cognitive Approach to Modeling Policies in Open Environments

    Publication Year: 2007 , Page(s): 29 - 38
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (293 KB) |  | HTML iconHTML  

    The richness of today's electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current interactions have become a form of social exchange where participants must deal with complexity, uncertainty and risk. We propose a policy specification approach that combines social sciences and trust theory to facilitate ad-hoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Interoperable Trust Negotiation Strategies

    Publication Year: 2007 , Page(s): 39 - 50
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    Among the many works on trust negotiation, only a few deal with negotiation strategies. These works are tailored to specific frameworks-so their results cannot be extended to competing approaches - and introduce assumptions that cannot be always guaranteed. In this paper we identify some guidelines for designing "good" (interoperable) trust negotiation strategies under a different set of assumptio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises

    Publication Year: 2007 , Page(s): 51 - 55
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    Enterprises that collect and process personal data must deal with related privacy management issues. It is not just a matter of privacy-aware access control: privacy obligation policies, dictating duties and expectations on how personal data has to be handled, must be considered too. The management of obligation policies is a promising area but it is still underestimated. Enterprises require solut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling Dynamic Organizational Change with Community-Based Policy Management

    Publication Year: 2007 , Page(s): 56 - 60
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (181 KB) |  | HTML iconHTML  

    Policy-based management (PBM) aims to provide flexibility in the management of resources so as to readily reflect changing business goals. However, as organizations increasingly use electronic means for more of their core business operations, the ability to ensure that policies accurately reflect the operation of an organization becomes more challenging. This paper presents a critique of organizat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expertise Knowledge-Based Policy Refinement Process

    Publication Year: 2007 , Page(s): 61 - 65
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (225 KB) |  | HTML iconHTML  

    We present an approach to automated workflow policy refinement process supported by the domain experts' knowledge. The expertise knowledge about refinement patterns are captured by using the pattern paradigm. The combination of the temporal logic formalism and the description logic formalism facilitates the automated policy refinement process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrastructure-Aware Autonomic Manager for Change Management

    Publication Year: 2007 , Page(s): 66 - 69
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (345 KB) |  | HTML iconHTML  

    Typical IT environments of medium to large size organizations consist of tens of networks that connect hundreds of servers to support the running of a large variety of business-relevant applications; usually from different vendors. Change management is an important management processes that, if automated, can have a direct impact on increasing service availability in IT environments. Although such... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Privacy-Aware Handling of Authorizations

    Publication Year: 2007 , Page(s): 70 - 76
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (161 KB) |  | HTML iconHTML  

    Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy problems when stored and processed centrally. We present first steps towards a framework of privacy-aware handling of authorizations. We split up the storage and the processing of access control policies in a user-centric appr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XACML-Based Composition Policies for Ambient Networks

    Publication Year: 2007 , Page(s): 77 - 86
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (723 KB) |  | HTML iconHTML  

    Ambient Networks (AN) pose new challenges to the management discipline, and policies are considered to be an adequate solution for providing flexibility, distributed control, and self-management features. However, the current state-of the art IETF policy framework was not designed for the challenges of new 3G/4G environments such as AN. This paper presents PBMAN, a policy-based architecture and a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overriding of Access Control in XACML

    Publication Year: 2007 , Page(s): 87 - 95
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (254 KB) |  | HTML iconHTML  

    Most access control mechanisms focus on how to define the rights of users in a precise way to prevent any violation of the access control policy of an organization. However, in many cases it is hard to predefine all access needs, or even to express them in machine readable form. One example of such a situation is an emergency case which may not be predictable and would be hard to express as a mach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-level Policy Representation for Management Services in Maritime Networks

    Publication Year: 2007 , Page(s): 96 - 108
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (203 KB) |  | HTML iconHTML  

    A policy-based traffic management (PBTM) prototype was developed to investigate the effective management of communication resources in a tactical maritime environment. The system design includes a combination of Web services (WS) and policy-based network management (PBNM) techniques. The paper describes a multi-level XML-based policy representation developed for use in the PBTM prototype. Three le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy in the Semantic Web: What Policy Languages Have to Offer

    Publication Year: 2007 , Page(s): 109 - 118
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (136 KB) |  | HTML iconHTML  

    Uncontrolled disclosure of sensitive information during electronic transactions may expose users to threats like loss of privacy and identity theft. The means envisioned for addressing protection of security and privacy in the context of the Semantic Web are policy languages for trust establishment and management. Although a number of policy languages have been proposed, it is unclear how well eac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying and Enforcing High-Level Semantic Obligation Policies

    Publication Year: 2007 , Page(s): 119 - 128
    Cited by:  Papers (2)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (824 KB) |  | HTML iconHTML  

    Obligation policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems often produce event streams containing large volumes of low-level events. In many cases, these streams also contain multimedia data (consisting of text, audio or video). Hence, a key challenge is to allow policy writers t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proteus: A Semantic Context-Aware Adaptive Policy Model

    Publication Year: 2007 , Page(s): 129 - 140
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (281 KB) |  | HTML iconHTML  

    The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamicity and heterogeneity of the new pervasive collaboration scenario are crucial to ensure secure sharing of information. Collaborating entities cannot be predetermined and resource availability frequently varies, even unpred... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall

    Publication Year: 2007 , Page(s): 141 - 150
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (243 KB) |  | HTML iconHTML  

    We present a discretionary access control framework that can be used to control a principal's ability to link information from two or more audit records and compromise a user's privacy. While the traditional Chinese Wall (CW) access control model is sufficient to enforce this type of unlinkability, in distributed environments CW is inefficient because its semantics requires knowledge of a user's a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automated Framework for Validating Firewall Policy Enforcement

    Publication Year: 2007 , Page(s): 151 - 160
    Cited by:  Papers (7)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (295 KB) |  | HTML iconHTML  

    The implementation of network security devices such as firewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable and yet practical techniques for testing the functionality of firewall devices particularly after new filtering implementation or optimization becomes necessary to assure required security. Generating random traffic to test... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.