By Topic

Policies for Distributed Systems and Networks (POLICY), 2010 IEEE International Symposium on

Date 21-23 July 2010

Filter Results

Displaying Results 1 - 25 of 38
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (12560 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (149 KB) | HTML iconHTML
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2010, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Invited speakers

    Publication Year: 2010, Page(s):xiii - xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB)

    Provides an abstract for each of the invited presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative Privacy Policy Authoring in a Social Networking Context

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Recent years have seen a significant increase in the popularity of social networking services. These online services enable users to construct groups of contacts, referred to as friends, with which they can share digital content and communicate. This sharing is actively encouraged by the social networking services, with users' privacy often seen as a secondary concern. In this paper we first propo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Centric Policy Management in Online Social Networks

    Publication Year: 2010, Page(s):9 - 13
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Online social networking sites are experiencing tremendous user growth with hundreds of millions of active users. As a result, there is a tremendous amount of user profile data online, e.g., name, birth date, etc. Protecting this data is a challenge. The task of access policy composition is a tedious and confusing effort for the average user having hundreds of friends. In this paper, we propose a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Policy Based Infrastructure for Social Data Access with Privacy Guarantees

    Publication Year: 2010, Page(s):14 - 17
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    We present a policy based infrastructure for social data access with the goal of enabling scientific research, while preserving privacy. We describe motivating application scenarios that could be enabled with the growing number of user datasets such as social networks, medical datasets etc. These datasets contain sensitive user information and sufficient caution must be exercised while sharing the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usable Policy Template Authoring for Iterative Policy Refinement

    Publication Year: 2010, Page(s):18 - 21
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB) | HTML iconHTML

    People must have usable tools in order to author and maintain high-quality policies. In this paper we discuss policy templates as a mechanism for policy authoring. We believe that policy templates can be leveraged to make policy authoring more usable and to provide consistent policy authoring interfaces across a wide variety of policy domains. Templates provide users with a structured format for a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Downstream Usage Control

    Publication Year: 2010, Page(s):22 - 29
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    Whereas access control describes the conditions that have to be fulfilled before data is released, usage control describes how the data has to be treated after it is released. Usage control can be applied to digital rights management, where the data are usually copyright-protected media, as well as in privacy, in which case the data are privacy-sensitive personal information. An important aspect o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinating Data Usage Control in Loosely-Connected Networks

    Publication Year: 2010, Page(s):30 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    In a disaster-recovery mission, rescuers need to coordinate their operations and exchange information to make the right judgments and perform their statutory duties. The information exchanged may be privileged or sensitive and not generally in the public domain. For instance, the assessment of the risk level in the disaster area where a chemical plant is located requires data about the nature of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACPT: A Tool for Modeling and Verifying Access Control Policies

    Publication Year: 2010, Page(s):40 - 43
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    Access control mechanisms are a widely adopted technology for information security. Since access decisions (i.e., permit or deny) on requests are dependent on access control policies, ensuring the correct modeling and implementation of access control policies is crucial for adopting access control mechanisms. To address this issue, we develop a tool, called ACPT (Access Control Policy Testing), th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intelligent Network for Federated Testing of NetCentric Systems

    Publication Year: 2010, Page(s):44 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (847 KB) | HTML iconHTML

    We will describe a dynamic federated autonomic networking system for the testing of netcentric systems across organizations. Using a suite of policy-based management software tools, our system can provide netcentric missions with self-configuring, self-debugging, self-healing, and self-protecting capabilities across end-to-end coalition networks. The novelty of our system originates from: (1) A mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios

    Publication Year: 2010, Page(s):53 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB) | HTML iconHTML

    Traditional data protection schemes deployed in Enterprise Rights Management systems rely on centralised infrastructures where recipients must request authorisation for data access from remote evaluation authorities, trusted by the data originator to keep the data decryption keys and evaluate authorisation policies. During emergency situations when network connection is intermittent these solution... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teleo-Reactive Policies in Ponder2

    Publication Year: 2010, Page(s):57 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1399 KB) | HTML iconHTML

    Policies could potentially be an important and cost-effective technique for building and managing pervasive systems. Historically, policy-based systems have been built using a policy environment that supports the specification and enforcement of policies for a range of management concerns such as adaptation and security. In this short paper we describe our experiences with challenges in building h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy-Based Management for Resource-Constrained Devices and Systems

    Publication Year: 2010, Page(s):61 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    The presented policy-based management system supports autonomous control and adaptation of a distributed system according to changing conditions and requirements by means of event-condition-action (ECA) rules. Furthermore, it supports policy-aware application programming. Application components can request evaluations of policy expressions and decisions in order to govern their behavior depending ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy Generation Framework for Large-Scale Storage Infrastructures

    Publication Year: 2010, Page(s):65 - 72
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    Cloud computing is gaining acceptance among mainstream technology users. Storage cloud providers often employ Storage Area Networks (SANs) to provide elasticity, rapid adaptability to changing demands, and policy based automation. As storage capacity grows, the storage environment becomes heterogeneous, increasingly complex, harder to manage, and more expensive to operate. This paper presents PGML... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linking Policies to the Spatial Environment

    Publication Year: 2010, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Security policy specification can be difficult to get right. Electronic systems often fail to provide an easy route to encode requirements that would be simple to enforce through controlling how physical principals interact. This paper presents a means to ameliorate potential policy mismatches through the use of location awareness systems allowing changes in the physical world to be mapped to elec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoP and QoS Policy Cognizant Module Composition

    Publication Year: 2010, Page(s):77 - 86
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    Component-based software engineering is generally recognized as one of the best methods to develop, deploy, and manage increasingly complex software systems. To enable the dynamic composition of software modules, it is often required to expose their functionality dependencies. This results the a well-known requires-provides specifications' model. In this paper, we introduce a framework that enable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.