


default search action
POLICY 2003: Villa Olmo, Lake Como, Italy
- 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy. IEEE Computer Society 2003, ISBN 0-7695-1933-4

Specification and Analysis
- John Keeney, Vinny Cahill:

Chisel: A Policy-Driven, Context-Aware, Dynamic Adaptation Framework. 3-14 - Francisco Durán

, Javier Herrador, Antonio Vallecillo
:
Using UML and Maude for Writing and Reasoning about ODP Policies. 15-25 - Arosha K. Bandara, Emil Lupu, Alessandra Russo

:
Using Event Calculus to Formalise Policy Specification and Analysis. 26-
Networks and Mobile Systems
- Nancy Samaan, Ahmed Karmouch:

Prediction-Based Policy Adaptation for QoS Management in Wireless Networks. 43-51 - Ritu Chadha, Yuu-Heng Cheng, Thanh Cheng, Shrirang Gadgil, Abdelhakim Hafid, Keith Kim, Gary Levin, Narayanan Natarajan, Kirthika Parmeswaran, Alexander Poylisher, John Unger:

PECAN: Policy-Enabled Configuration Across Networks. 52-62 - Lalana Kagal, Timothy W. Finin

, Anupam Joshi
:
A Policy Language for a Pervasive Computing Environment. 63-
Short Papers 1
- Stefano Bistarelli

, Simon N. Foley
:
Analysis of Integrity Policies using Soft Constraints. 77-80 - Elisa Bertino, Elena Ferrari

, Anna Cinzia Squicciarini
:
X-TNL: An XML-based Language for Trust Negotiations. 81-84 - Robert Cherinka, C. Wild, D. Allen, C. Smith, Y. Zhang, R. Panek, S. Semy:

Towards Policy-based Information Management for the Joint BattleSpace InfoSphere. 85-88 - Murthy V. Devarakonda, Alla Segal, David M. Chess:

A Toolkit-Based Approach to Policy-Managed Storage. 89-92 - Andrzej Uszok

, Jeffrey M. Bradshaw
, Renia Jeffers, Niranjan Suri, Patrick J. Hayes
, Maggie R. Breedy, Larry Bunch, Matt Johnson, Shriniwas Kulkarni, James Lott:
KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement. 93-
Access Control
- András Belokosztolszki, David M. Eyers

, Ken Moody:
Policy Contexts: Controlling Information Flow in Parameterised RBAC. 99-110 - Vijay G. Bharadwaj, John S. Baras:

Towards Automated Negotiation of Access Control Policies. 111-119 - Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani

, Yves Deswarte, Gilles Trouessin:
Organization based access contro. 120-
Security and Privacy
- Günter Karjoth, Matthias Schunter, Els Van Herreweghen:

Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. 135-146 - David J. Scott

, Alastair R. Beresford, Alan Mycroft
:
Spatial Policies for Sentient Mobile Applications. 147-157 - Myla Archer, Elizabeth I. Leonard, Matteo Pradella

:
Analyzing Security-Enhanced Linux Policy Specifications. 158-
Policy Management in the Large
- Glenn S. Wasson, Marty Humphrey:

Toward Explicit Policy Management for Virtual Organizations. 173-182 - Richard Hull, Bharat Kumar, Daniel F. Lieuwen:

Towards Federated Policy Management. 183-
Applications
- David W. Chadwick

, Darren P. Mundy:
Policy Based Electronic Transmission of Prescriptions. 197-206 - Peter F. Linington, Stephen W. Neal:

Using Policies in the Checking of Business to Business Contracts. 207-218 - Qian Zhao, Yu Zhou, Mark Perry:

Policy-Driven Licensing Model for Component Software. 219-
Short Papers 2
- Pedro Dias, Carlos Ribeiro, Paulo Ferreira

:
Enforcing History-Based Security Policies in Mobile Agent Systems. 231-234 - Antonio Di Ferdinando, Paul McKee, Alessandro Amoroso:

A Policy Based Approach for Automated Topology Management of Peer To Peer Networks and a Prototype Implementation. 235-238 - François Barrère, Abdelmalek Benzekri, Frédéric Grasset, Romain Laborde, Bassem Nasser:

Inter-Domains policy negociation. 239-242 - Lisandro Zambenedetti Granville

, Leandro Vaguetti, Maria Janilce B. Almeida, Liane Margarida Rockenbach Tarouco
:
A PBNM System for Integrated QoS and Multicast Management. 243-246 - Niranjan Suri, Marco M. Carvalho

, Jeffrey M. Bradshaw
, Maggie R. Breedy, Thomas B. Cowin, Paul T. Groth, Raul Saavedra, Andrzej Uszok
:
Enforcement of Communications Policies in Software Agent Systems through Mobile Code. 247-250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














