Login / Signup
POLICY
2001
2005
2007
2012
2001
2012
Keyphrases
Publications
2012
John Slankas
,
Laurie A. Williams
Classifying Natural Language Sentences for Policy.
POLICY
(2012)
Muhammad Rizwan Asghar
,
Giovanni Russello
ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems.
POLICY
(2012)
Pratik Savla
,
Lorenzo Martino
Content Analysis of Privacy Policies for Health Social Networks.
POLICY
(2012)
Jorge Lobo
,
Massimo Marchi
,
Alessandro Provetti
Firewall Configuration Policies for the Specification and Implementation of Private Zones.
POLICY
(2012)
John Lyle
,
Salvatore Monteleone
,
Shamal Faily
,
Davide Patti
,
Fabio Ricciato
Cross-Platform Access Control for Mobile Web Applications.
POLICY
(2012)
Konstantine Arkoudas
,
Shoshana Loeb
,
Ritu Chadha
,
C. Jason Chiang
,
Keith Whittaker
Automated Policy Analysis.
POLICY
(2012)
Leigh Griffin
,
Bernard Butler
,
Eamonn de Leastar
,
Brendan Jennings
,
Dmitri Botvich
On the Performance of Access Control Policy Evaluation.
POLICY
(2012)
Mirko Montanari
,
Lucas T. Cook
,
Roy H. Campbell
Multi-organization Policy-Based Monitoring.
POLICY
(2012)
Dimosthenis Pediaditakis
,
Anandha Gopalan
,
Naranker Dulay
,
Morris Sloman
,
Tom Lodge
Home Network Management Policies: Putting the User in the Loop.
POLICY
(2012)
Barry Demchak
,
Ingolf Krüger
Policy Driven Development: Flexible Policy Insertion for Large Scale Systems.
POLICY
(2012)
Anna Cinzia Squicciarini
,
William McGill
,
Giuseppe Petracca
,
Shuo Huang
Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach.
POLICY
(2012)
Nelson Matthys
,
Christophe Huygens
,
Danny Hughes
,
Sam Michiels
,
Wouter Joosen
A Component and Policy-Based Approach for Efficient Sensor Network Reconfiguration.
POLICY
(2012)
2012 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, Chapel Hill, NC, USA, July 16-18, 2012
POLICY
(2012)
Muhammad Ali Amer
,
Ann L. Chervenak
,
Weiwei Chen
Improving Scientific Workflow Performance Using Policy Based Data Placement.
POLICY
(2012)
2011
Antonio Manuel Gutiérrez
,
José Antonio Parejo
,
Pablo Fernandez
,
Antonio Ruiz Cortés
WS-Governance Tooling: SOA Governance Policies Analysis and Authoring.
POLICY
(2011)
Gorrell P. Cheek
,
Mohamed Shehab
,
Truong Ung
,
Ebonie Williams
iLayer: Toward an Application Access Control Framework for Content Management Systems.
POLICY
(2011)
Wonjun Lee
,
Anna Cinzia Squicciarini
,
Elisa Bertino
Profile-Based Selection of Accountability Policies in Grid Computing Systems.
POLICY
(2011)
Fatih Turkmen
,
Eunjin Jung
,
Bruno Crispo
Towards Run-Time Verification in Access Control.
POLICY
(2011)
Steve Barker
,
Gillian Lowen
GPF: A General Policy Framework.
POLICY
(2011)
Byung H. Park
,
Thomas J. Naughton
,
Pratul K. Agarwal
,
David E. Bernholdt
,
Al Geist
,
Jennifer L. Tippens
Realization of User Level Fault Tolerant Policy Management through a Holistic Approach for Fault Correlation.
POLICY
(2011)
Qinghua Lu
,
Vladimir Tosic
Using MiniZnMASC Middleware with Different Algorithms for Business-Driven Adaptation of Business Processes.
POLICY
(2011)
Patricia Dockhorn Costa
,
João Paulo A. Almeida
,
Igor Magri Vale
,
Izon Thomaz Mielke
A Model-Driven Approach for Incorporating Reactive Rules in Declarative Interactive TV Applications.
POLICY
(2011)
Marco Casassa Mont
,
Richard Brown
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes.
POLICY
(2011)
Guillaume Benats
,
Arosha K. Bandara
,
Yijun Yu
,
Jean-Noël Colin
,
Bashar Nuseibeh
PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications.
POLICY
(2011)
Mike C. Conway
,
Reagan Moore
,
Arcot Rajasekar
,
Jean-Yves Nief
Demonstration of Policy-Guided Data Preservation Using iRODS.
POLICY
(2011)
Sören Preibusch
Information Flow Control for Static Enforcement of User-Defined Privacy Policies.
POLICY
(2011)
Sebastian Speiser
Policy of Composition ? Composition of Policies.
POLICY
(2011)
Z. Cliffe Schreuders
,
Christian Payne
,
Tanya Jane McGill
A Policy Language for Abstraction and Automation in Application-Oriented Access Controls: The Functionality-Based Application Confinement Policy Language.
POLICY
(2011)
Wuliang Sun
,
Robert B. France
,
Indrakshi Ray
Rigorous Analysis of UML Access Control Policy Models.
POLICY
(2011)
Achim D. Brucker
,
Helmut Petritsch
A Framework for Managing and Analyzing Changes of Security Policies.
POLICY
(2011)
Ron Banner
,
Omer Barkol
,
Ruth Bergman
,
Shahar Golan
,
Yuval Carmel
,
Ido Ish-Hurwitz
,
Oded Zilinsky
Automatic Policy Rule Extraction for Configuration Management.
POLICY
(2011)
Nicola Dragoni
,
Eduardo Lostal
,
Olga Gadyatskaya
,
Fabio Massacci
,
Federica Paci
A Load Time Policy Checker for Open Multi-application Smart Cards.
POLICY
(2011)
Wenjia Li
,
Pramod Jagtap
,
Rosa Laura Zavala Gutierrez
,
Anupam Joshi
,
Tim Finin
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies.
POLICY
(2011)
Nicola Dragoni
,
Eduardo Lostal
,
Davide Papini
(SC)²: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards.
POLICY
(2011)
Slim Trabelsi
,
Jakub Sendor
,
Stefanie Reinicke
PPL: PrimeLife Privacy Policy Engine.
POLICY
(2011)
Yurdaer N. Doganata
,
Keith Grueneberg
,
John Karat
,
Nirmal Mukhi
Authoring and Deploying Business Policies Dynamically for Compliance Monitoring.
POLICY
(2011)
Mihaela Ion
,
Giovanni Russello
,
Bruno Crispo
Enforcing Multi-user Access Policies to Encrypted Cloud Databases.
POLICY
(2011)
Bong Jun Ko
,
Starsky H. Y. Wong
,
Kang-Won Lee
,
Chi-Kin Chau
Distributed Overlay Construction to Support Policy-Based Access Control.
POLICY
(2011)
Oliver Dohndorf
,
Jan Krüger
,
Heiko Krumm
,
Christoph Fiehe
,
Anna Litvina
,
Ingo Lück
,
Franz-Josef Stewing
Tool-Supported Refinement of High-Level Requirements and Constraints Into Low-Level Policies.
POLICY
(2011)
Oshani Seneviratne
,
Lalana Kagal
Addressing Data Reuse Issues at the Protocol Level.
POLICY
(2011)
Romuald Thion
,
Daniel Le Métayer
FLAVOR: A Formal Language for a Posteriori Verification of Legal Rules.
POLICY
(2011)
Ismaeel Al Ridhawi
,
Nancy Samaan
,
Ahmed Karmouch
A Policy-Based Simulator for Assisted Adaptive Vertical Handover.
POLICY
(2011)
Hasan T. Karaoglu
,
Murat Yuksel
Inter-domain Multi-Hop Negotiation for the Internet.
POLICY
(2011)
Ashish Gehani
,
Dawood Tariq
,
Basim Baig
,
Tanu Malik
Policy-Based Integration of Provenance Metadata.
POLICY
(2011)
Mahmoud Ghorbel
,
Armen Aghasaryan
,
Marie-Pascale Dupont
,
Stéphane Betgé-Brezetz
,
Guy-Bertrand Kamga
,
Sophie Piekarec
A Multi-environment Application of Privacy Data Envelopes.
POLICY
(2011)
Keith Grueneberg
,
David Wood
,
Xiping Wang
,
Seraphin B. Calo
,
Maroun Touma
Policy Supersession in a Coalition ISR Network.
POLICY
(2011)
Ahmed A. Ataullah
,
Frank Wm. Tompa
Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance.
POLICY
(2011)
Daniel Trivellato
,
Nicola Zannone
,
Sandro Etalle
A Security Framework for Systems of Systems.
POLICY
(2011)
Sören Bleikertz
,
Thomas Groß
A Virtualization Assurance Language for Isolation and Deployment.
POLICY
(2011)
Mark R. Beaumont
,
Chris North
,
Bradley D. Hopkins
,
Ken Yiu
Hard Disk Guard Based Policy Enforcement.
POLICY
(2011)