Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
POLICY
POLICY 2010
Generate Citations
Policies for Distributed Systems and Networks, IEEE International Workshop on
July 21 2010 to July 23 2010
Fairfax, Virginia, USA
ISBN: 978-0-7695-4238-6
Table of Contents
Papers
Invited speakers
Freely available from IEEE.
pp. xiii-xvi
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vii
Papers
Preface
Freely available from IEEE.
pp. viii
Papers
Organizing Committee
Freely available from IEEE.
pp. ix
Papers
Program Committee
Freely available from IEEE.
pp. x-x
External reviewers
Freely available from IEEE.
pp. xi-xi
Papers
Collaborative Privacy Policy Authoring in a Social Networking Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ryan Wishart
,
Domenico Corapi
,
Srdjan Marinovic
,
Morris Sloman
Papers
User Centric Policy Management in Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-13
by
Mohamed Shehab
,
Gorrell Cheek
,
Hakim Touati
,
Anna C. Squicciarini
,
Pau-Chen Cheng
Papers
A Policy Based Infrastructure for Social Data Access with Privacy Guarantees
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-17
by
Palanivel Kodeswaran
,
Evelyne Viegas
Papers
Usable Policy Template Authoring for Iterative Policy Refinement
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-21
by
Maritza Johnson
,
John Karat
,
Clare-Marie Karat
,
Keith Grueneberg
Papers
Downstream Usage Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-29
by
Laurent Bussard
,
Gregory Neven
,
Franz-Stefan Preiss
Papers
Coordinating Data Usage Control in Loosely-Connected Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-39
by
Giovanni Russello
,
Enrico Scalavino
,
Naranker Dulay
,
Emil C. Lupu
Papers
ACPT: A Tool for Modeling and Verifying Access Control Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-43
by
JeeHyun Hwang
,
Tao Xie
,
Vincent Hu
,
Mine Altunay
Papers
An Intelligent Network for Federated Testing of NetCentric Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-52
by
Edward Chow
,
Mark James
,
Hsin-Ping Chang
,
Farrokh Vatan
,
Gurusham Sudhir
Papers
Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-56
by
Enrico Scalavino
,
Vaibhav Gowadia
,
Rudi Ball
,
Emil C. Lupu
,
Giovanni Russello
Papers
Teleo-Reactive Policies in Ponder2
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Kevin Twidle
,
Srdjan Marinovic
,
Naranker Dulay
Papers
Policy-Based Management for Resource-Constrained Devices and Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-64
by
Oliver Dohndorf
,
Jan Krüger
,
Heiko Krumm
,
Christoph Fiehe
,
Anna Litvina
,
Ingo Lück
,
Franz-Josef Stewing
Papers
Policy Generation Framework for Large-Scale Storage Infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-72
by
Ramani Routray
,
Rui Zhang
,
David Eyers
,
Douglas Willcocks
,
Peter Pietzuch
,
Prasenjit Sarkar
Papers
Linking Policies to the Spatial Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-76
by
David Evans
,
David Eyers
,
Jean Bacon
Papers
QoP and QoS Policy Cognizant Module Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-86
by
Paul Seymer
,
Angelos Stavrou
,
Duminda Wijesekera
,
Sushil Jajodia
Papers
Automatic Policy Mapping to Management System Configurations
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-94
by
A. Ouda
,
H. Lutfiyya
,
M. Bauer
Papers
DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-102
by
Joshua Schiffman
,
Xinwen Zhang
,
Simon Gibbs
Papers
Toward Self-Contained Authorization Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-106
by
Romain Laborde
,
Marwan Cheaito
,
François Barrère
,
Abdelmalek Benzekri
Papers
A Small But Non-negligible Flaw in the Android Permission Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-110
by
Wook Shin
,
Sanghoon Kwak
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
Papers
A Model for the Governance of Federated Healthcare Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-119
by
Naftaly Minsky
Papers
Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-128
by
Grit Denker
,
Ashish Gehani
,
Minyoung Kim
,
David Hanz
Papers
JTAM - A Joint Threshold Administration Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-132
by
Ashish Kamra
,
Elisa Bertino
Papers
A Negotiation Framework for Negotiation of Coalition Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-136
by
Mandis Beigi
,
Jorge Lobo
,
Keith Grueneberg
,
Seraphin Calo
,
John Karat
Papers
Enforcement of Data-Plane Policies in Next-Generation Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-140
by
Shashank Shanbhag
,
Tilman Wolf
Papers
Towards Autonomous Administrations of Decentralized Authorization for Inter-domain Collaborations
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-145
by
Hannah K. Lee
Papers
Efficient Policy Checking across Administrative Domains
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-153
by
David Evans
,
David Eyers
Papers
Author Index
Freely available from IEEE.
pp. 154-155
Papers
[Publisher's information]
Freely available from IEEE.
pp. 156
Showing 36 out of 36