By Topic

Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on

Date 16-18 July 2012

Filter Results

Displaying Results 1 - 23 of 23
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (317 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Additional Reviewers

    Publication Year: 2012, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Automated Policy Analysis

    Publication Year: 2012, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    Static analysis of access-control policies is becoming increasingly important. Such analysis can reveal errors and vulnerabilities in the policies, as well as logical inconsistencies, unintended effects, and discrepancies between different policies or different versions of the same policy. In the process, it helps policy developers to better understand the effects of their policies. Policy analysi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Home Network Management Policies: Putting the User in the Loop

    Publication Year: 2012, Page(s):9 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (783 KB) | HTML iconHTML

    Home networks are becoming increasingly complex but existing management solutions are not simple to use since they are not tailored to the needs of typical home-users. In this paper we present a new approach to home network management that allows users to formulate quite sophisticated "comic-strip" policies using an attractive iPad application. The policies are based on the management wishes of ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy Driven Development: Flexible Policy Insertion for Large Scale Systems

    Publication Year: 2012, Page(s):17 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    The success of a software system depends critically on how well it reflects and adapts to stakeholder requirements. Traditional development methods often frustrate stakeholders by creating long latencies between requirement articulation and system deployment, especially in large scale systems. One source of latency is the maintenance of policy decisions encoded directly into system workflows at de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Performance of Access Control Policy Evaluation

    Publication Year: 2012, Page(s):25 - 32
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    There is growing awareness of the need to protect digital resources and services in both corporate and home ICT scenarios. Meanwhile, communication tools tailored for corporations are blurring the line between communication mechanisms and (near) real-time resource sharing. The resulting requirement for near real-time policy-based access control is technically challenging. In a corporate domain, su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classifying Natural Language Sentences for Policy

    Publication Year: 2012, Page(s):33 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Organizations derive policies from a wide variety of sources, such business plans, laws, regulations, and contracts. However, an efficient process does not yet exist for quickly finding or automatically deriving policies from uncontrolled natural language sources. The goal of our research is to assure compliance with established policies by ensuring policies in existing natural language texts are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-Platform Access Control for Mobile Web Applications

    Publication Year: 2012, Page(s):37 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (787 KB) | HTML iconHTML

    Web browsers are a common platform for delivering cross-platform applications. However, they currently fail to provide consistent access control for security and privacy sensitive JavaScript APIs, such as geolocation and local storage. This problem is exacerbated by new HTML5 APIs and the increasing number of personal devices people own and use. In this paper we present the webinos platform which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach

    Publication Year: 2012, Page(s):45 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    One of the main goals of all online social communities is to promote a stable, or perhaps, growing membership built around topics of like interest. Yet, communities are not impermeable to the potentially damaging effects resulting from those few participants that choose to behave in a manner that is counter to established norms of behavior. Typical moderators in online social communities are the o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Component and Policy-Based Approach for Efficient Sensor Network Reconfiguration

    Publication Year: 2012, Page(s):53 - 60
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB) | HTML iconHTML

    Contemporary wireless sensor network deployments are long-lived, large scale and resource constrained. Longevity demands mechanisms that support reconfiguration to meet changing application requirements, large scale demands high-level abstractions to support network management and stringent resource constraints necessitate a high degree of efficiency in middleware to support application developmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems

    Publication Year: 2012, Page(s):61 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    The notion of patient's consent plays a major role in granting access to medical data. In typical healthcare systems, consent is captured by a form that the patient has to fill in and sign. In e-Health systems, the paper-form consent is being replaced by the integration of the notion of consent in the mechanisms that regulate the access to the medical data. This helps in empowering the patient wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-organization Policy-Based Monitoring

    Publication Year: 2012, Page(s):70 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    The monitoring of modern large scale infrastructure systems often relies on complex event processing (CEP) rules to detect security and performance problems. For example, the continuous monitoring of compliance to regulatory requirements such as PCI-DSS and NERC CIP requires analyzing events to identify if specific conditions over the configurations of devices occur. In multi-organization systems,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firewall Configuration Policies for the Specification and Implementation of Private Zones

    Publication Year: 2012, Page(s):78 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    We introduce and discuss two case studies where a complex network is modeled as a set of zones interconnected by routers or firewalls. To address the problem in full abstraction, we defined PDLz, an extension of the PDL event-condition-action language that supports the specification of firewall routing policies. PDLz allows the modelling of computer networks based on the concept of zone, i.e., a T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Scientific Workflow Performance Using Policy Based Data Placement

    Publication Year: 2012, Page(s):86 - 93
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (734 KB) | HTML iconHTML

    I/O intensive jobs such as stage-in, stage-out or data clean-up jobs account for significant time in execution of scientific workflows. Workflow managers typically add these data management operations as supporting jobs to computational tasks with scheduling emphasis on compute jobs only. We present the integration of the Pegasus Workflow Management System with a Policy Based Data Placement Servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content Analysis of Privacy Policies for Health Social Networks

    Publication Year: 2012, Page(s):94 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    The Web is an important resource for health information. Pew's Internet and American Life Project found 62% of adult Web users looking for health-related information on health social networks. However, the National Survey on Identity and Privacy in Social Media by The Ponemon Institute reported that about 56% of adult users were anxious about the privacy of their personal information on social net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2012, Page(s): 102
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2012, Page(s): 104
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE