Data-Purpose Algebra: Modeling Data Usage Policies (English)
- New search for: Hanson, Chris
- New search for: Berners-Lee, Tim
- New search for: Kagal, Lalana
- New search for: Sussman, Gerald Jay
- New search for: Weitzner, Daniel
- New search for: Hanson, Chris
- New search for: Berners-Lee, Tim
- New search for: Kagal, Lalana
- New search for: Sussman, Gerald Jay
- New search for: Weitzner, Daniel
In:
Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)
;
173-177
;
2007
-
ISBN:
- Conference paper / Electronic Resource
-
Title:Data-Purpose Algebra: Modeling Data Usage Policies
-
Contributors:Hanson, Chris ( author ) / Berners-Lee, Tim ( author ) / Kagal, Lalana ( author ) / Sussman, Gerald Jay ( author ) / Weitzner, Daniel ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2007-06-01
-
Size:161395 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Autonomous Pervasive Systems and the Policy Challenges of a Small World!Lupu, Emil / Dulay, Naranker / Sventek, Joe / Sloman, Morris et al. | 2007
- 8
-
Confidentiality, Privacy and Trust Policy Enforcement for the Semantic WebThuraisingham, Bhavani et al. | 2007
- 12
-
Policy-Driven Distributed Authorization: Status and ProspectsWinslett, Marianne et al. | 2007
- 19
-
Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case StudySolhaug, Bjornar / Elgesem, Dag / Stolen, Ketil et al. | 2007
- 29
-
A Socio-cognitive Approach to Modeling Policies in Open EnvironmentsRyutov, Tatyana et al. | 2007
- 39
-
On Interoperable Trust Negotiation StrategiesBaselice, Sabrina / Bonatti, Piero A. / Faella, Marco et al. | 2007
- 51
-
On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in EnterprisesMont, Marco Casassa / Beato, Filipe et al. | 2007
- 56
-
Handling Dynamic Organizational Change with Community-Based Policy ManagementFeeney, Kevin / Lewis, David / Wade, Vincent et al. | 2007
- 61
-
Expertise Knowledge-Based Policy Refinement ProcessRochaeli, Taufiq / Eckert, Claudia et al. | 2007
- 66
-
Infrastructure-Aware Autonomic Manager for Change ManagementAbdelSalam, H. / Maly, K. / Mukkamala, R. / Zubair, M. et al. | 2007
- 70
-
Towards Privacy-Aware Handling of AuthorizationsDobmeier, Wolfgang / Pernul, Gunther et al. | 2007
- 77
-
XACML-Based Composition Policies for Ambient NetworksKamienski, Carlos / Fidalgo, Joseane / Dantas, Ramide / Sadok, Djamel / Ohlman, Borje et al. | 2007
- 87
-
Overriding of Access Control in XACMLAlqatawna, Ja'far / Rissanen, Erik / Sadighi, Babak et al. | 2007
- 96
-
A Multi-level Policy Representation for Management Services in Maritime NetworksSt-Onge, Francis / Kidston, David / Labbe, Isabelle et al. | 2007
- 109
-
Privacy in the Semantic Web: What Policy Languages Have to OfferDuma, Claudiu / Herzog, Almut / Shahmehri, Nahid et al. | 2007
- 119
-
Specifying and Enforcing High-Level Semantic Obligation PoliciesLiu, Zhen / Ranganathan, Anand / Riabov, Anton et al. | 2007
- 129
-
Proteus: A Semantic Context-Aware Adaptive Policy ModelToninelli, Alessandra / Montanari, Rebecca / Kagal, Lalana / Lassila, Ora et al. | 2007
- 151
-
An Automated Framework for Validating Firewall Policy EnforcementEl-Atawy, Adel / Samak, Taghrid / Wali, Zein / Al-Shaer, Ehab / Lin, Frank / Pham, Christopher / Li, Sheng et al. | 2007
- 141
-
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese WallKapadia, Apu / Naldurg, Prasad / Campbell, Roy H. et al. | 2007
- 161
-
Deriving Enforcement Mechanisms from PoliciesJanicke, Helge / Cau, Antonio / Siewe, Francois / Zedan, Hussein et al. | 2007
- 173
-
Data-Purpose Algebra: Modeling Data Usage PoliciesHanson, Chris / Berners-Lee, Tim / Kagal, Lalana / Sussman, Gerald Jay / Weitzner, Daniel et al. | 2007
- 178
-
XACML Function AnnotationsRao, Prathima / Lin, Dan / Bertino, Elisa et al. | 2007
- 183
-
Using SAML and XACML for Complex Resource Provisioning in Grid Based ApplicationsDemchenko, Yuri / Gommans, Leon / Laat, Cees de et al. | 2007
- 188
-
Web Rule Languages to Carry PoliciesKaviani, Nima / Gasevic, Dragan / Hatala, Marek / Wagner, Gerd et al. | 2007
- 193
-
Policy Analysis Using a Hybrid Semantic Reasoning EngineVerlaenen, Kris / De Win, Bart / Joosen, Wouter et al. | 2007
- 201
-
Authorisation and Conflict Resolution for Hierarchical DomainsRussello, Giovanni / Dong, Changyu / Dulay, Naranker et al. | 2007
- 211
-
Policy-Driven Negotiation for Authorization in the GridConstandache, Ionut / Olmedilla, Daniel / Siebenlist, Frank et al. | 2007
- 221
-
Performance Evaluation of Privacy-Preserving Policy Reconciliation ProtocolsVoris, Jonathan / Ioannidis, Sotiris / Wetzel, Susanne / Meyer, Ulrike et al. | 2007
- 229
-
Identity Delegation in Policy Based SystemsGupta, Rajeev / Roy, Shourya / Bhide, Manish et al. | 2007
- 241
-
Towards Effective Security Policy Management for Heterogeneous Network EnvironmentsTeo, Lawrence / Ahn, Gail-Joon et al. | 2007
- 246
-
A Policy-Driven Trading Framework for Market-Based Spectrum AssignmentArgyroudis, Patroklos / Forde, Tim / Doyle, Linda / O'Mahony, Donal et al. | 2007
- 251
-
Call Management Policy Specification for the Asterisk Telephone Private Branch ExchangeKonstantoulakis, George / Sloman, Morris et al. | 2007
- 256
-
On Automated Policy Generation for Mobile Ad Hoc NetworksChiang, Cho-Yu J. / Levin, Gary / Gottlieb, Yitzchak M. / Chadha, Ritu / Li, Shihwei / Poylisher, Alex / Newman, Scott / Lo, Richard et al. | 2007
- 261
-
CoRaL--Policy Language and Reasoning Techniques for Spectrum PoliciesElenius, Daniel / Denker, Grit / Stehr, Mark-Oliver / Senanayake, Rukman / Talcott, Carolyn / Wilkins, David et al. | 2007
- 266
-
Dynamic Adaptation of Policies in Data Center ManagementAly, Wael Hosny Fouad / Lutfiyya, Hanan et al. | 2007
- 273
-
Analysis of Policy and Standards for Joint C4ISR Network TechnologiesCeruti, Marion G. / Duffy, LorRaine / Arias-Thode, Y. Meriah et al. | 2007
- 274
-
Towards Learning Privacy PoliciesBandara, Arosha K. / Russo, Alessandra / Lupu, Emil C. et al. | 2007
- 275
-
DUKE--Distributed Usage Control EnforcementHilty, Manuel / Pretschner, Alexander / Schaefer, Christian / Walter, Thomas et al. | 2007
- 276
-
Policy-Based Parametric Firewall Configuration: A Real-Case ApplicationMarchi, Massimo / Penzo, Romeo / Provetti, Alessandro et al. | 2007
- 277
-
Hybrid Multi-module Security Policy VerificationKotenko, Igor / Chervatuk, Olga / Sidelnikova, Ekaterina / Tishkov, Artem et al. | 2007
- 278
-
Towards Practical Security Monitors of UML Policies for Mobile ApplicationsMassacci, Fabio / Naliuka, Katsiaryna et al. | 2007
- 279
-
Towards an Approach for Hybrid Trust ModelJaillon, Philippe / Roelens, Marc / Serpaggi, Xavier / Vu, Hoan et al. | 2007
- 280
-
POSITIF: A Policy-Based Security Management SystemBasile, Cataldo / Lioy, Antonio / Perez, Gregorio Martinez / Clemente, Felix J. Garcia / Skarmeta, Antonio F. Gomez et al. | 2007
- 281
-
Adaptive Web Data Extraction PoliciesFiumara, Giacomo / Marchi, Massimo / Provetti, Alessandro et al. | 2007
- 282
-
Web Services Security: Challenges and TechniquesSinghal, Anoop et al. | 2007
- 283
-
Author index| 2007
- c1
-
Eighth IEEE International Workshop on Policies for Distributed Systems and Networks-Cover| 2007
- i
-
Eighth IEEE International Workshop on Policies for Distributed Systems and Networks-Title| 2007
- iv
-
Eighth IEEE International Workshop on Policies for Distributed Systems and Networks-Copyright| 2007
- ix
-
Preface| 2007
- v
-
Eighth IEEE International Workshop on Policies for Distributed Systems and Networks-TOC| 2007
- x
-
Committees| 2007