Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)最新文献

筛选
英文 中文
XACML Function Annotations XACML函数注释
P. Rao, D. Lin, E. Bertino
{"title":"XACML Function Annotations","authors":"P. Rao, D. Lin, E. Bertino","doi":"10.1109/POLICY.2007.51","DOIUrl":"https://doi.org/10.1109/POLICY.2007.51","url":null,"abstract":"XACML is being increasingly adopted in large enterprise systems for specifying access control policies. However, the efficient analysis and integration of multiple policies in such large distributed systems still remains a difficult task. In this paper, we propose an annotation technique which is a simple extension to XACML, and may greatly benefit the policy analysis process. We also discuss an important consistency problem during XACML policy translation and point out a few possible research directions.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126898838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proteus: A Semantic Context-Aware Adaptive Policy Model Proteus:语义上下文感知自适应策略模型
A. Toninelli, R. Montanari, Lalana Kagal, O. Lassila
{"title":"Proteus: A Semantic Context-Aware Adaptive Policy Model","authors":"A. Toninelli, R. Montanari, Lalana Kagal, O. Lassila","doi":"10.1109/POLICY.2007.40","DOIUrl":"https://doi.org/10.1109/POLICY.2007.40","url":null,"abstract":"The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamicity and heterogeneity of the new pervasive collaboration scenario are crucial to ensure secure sharing of information. Collaborating entities cannot be predetermined and resource availability frequently varies, even unpredictably, due to user/device mobility, thus complicating resource access control. Policies cannot be defined based on entity's identities/roles, as in traditional security solutions, or be specified a priori to face any operative run-time condition, and require continuous adjustments to adapt to the current situation. To address these issues this paper advocates the adoption of a semantic context-aware paradigm to policy specification. Context- awareness allows operations on resources to be controlled based on context visibility whereas semantic technologies allow the high-level description and reasoning about context/policies. The paper describes Proteus that, as a key feature, combines these two design guidelines to enable dynamic adaptation of policies depending on context changes. In particular, the paper shows how ontologies and logic programming rules can be used to leverage policy adaptation.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129942461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Towards Learning Privacy Policies 学习私隐政策
A. Bandara, A. Russo, Emil C. Lupu
{"title":"Towards Learning Privacy Policies","authors":"A. Bandara, A. Russo, Emil C. Lupu","doi":"10.1109/POLICY.2007.45","DOIUrl":"https://doi.org/10.1109/POLICY.2007.45","url":null,"abstract":"With the proliferation of personal computing devices users are creating a variety of digitized personal information, from personal contact databases and multimedia content to context data such as location, activity and mood. Preventing unintended disclosure of such information is a key motivator for developing privacy management frameworks. It is equally critical that protecting privacy does not prevent users from completing essential tasks. Current efforts in privacy management have focussed on notations for privacy policy specification and on user interaction design for privacy management. However, little has been done to support automated analysis and learning of privacy policies. We advocate an approach based on inductive logic programming (ILP) for automatic learning of privacy policies. ILP is preferred over statistical learning techniques because it produces rules (privacy policies) which are comprehensible to the user and amenable to automated analysis.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123607289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Interoperable Trust Negotiation Strategies 互操作信任协商策略研究
Sabrina Baselice, P. Bonatti, M. Faella
{"title":"On Interoperable Trust Negotiation Strategies","authors":"Sabrina Baselice, P. Bonatti, M. Faella","doi":"10.1109/POLICY.2007.29","DOIUrl":"https://doi.org/10.1109/POLICY.2007.29","url":null,"abstract":"Among the many works on trust negotiation, only a few deal with negotiation strategies. These works are tailored to specific frameworks-so their results cannot be extended to competing approaches - and introduce assumptions that cannot be always guaranteed. In this paper we identify some guidelines for designing \"good\" (interoperable) trust negotiation strategies under a different set of assumptions, namely, a peer's interest in making transactions succeed. Moreover, since our analysis is based on an abstract framework, the guidelines apply to a wide range of policy languages and negotiation frameworks.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125005879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Expertise Knowledge-Based Policy Refinement Process 以专业知识为基础的政策细化过程
T. Rochaeli, C. Eckert
{"title":"Expertise Knowledge-Based Policy Refinement Process","authors":"T. Rochaeli, C. Eckert","doi":"10.1109/POLICY.2007.23","DOIUrl":"https://doi.org/10.1109/POLICY.2007.23","url":null,"abstract":"We present an approach to automated workflow policy refinement process supported by the domain experts' knowledge. The expertise knowledge about refinement patterns are captured by using the pattern paradigm. The combination of the temporal logic formalism and the description logic formalism facilitates the automated policy refinement process.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125361997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards Effective Security Policy Management for Heterogeneous Network Environments 异构网络环境下有效的安全策略管理
L. Teo, Gail-Joon Ahn
{"title":"Towards Effective Security Policy Management for Heterogeneous Network Environments","authors":"L. Teo, Gail-Joon Ahn","doi":"10.1109/POLICY.2007.44","DOIUrl":"https://doi.org/10.1109/POLICY.2007.44","url":null,"abstract":"In this paper, we overview a system-driven policy framework called Chameleos-x and discuss how a practical, system-driven approach could be used to address the problem of enforcing security policies consistently in a changing, diversity-rich environment. The Chameleos-x framework is specially designed to facilitate the management of consistent security policies in heterogeneous environments. We also describe our experimentation of Chameleos-x to demonstrate the feasibility of the proposed approach.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116216006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study 使用UML序列图指定策略——基于案例研究的评估
Bjørnar Solhaug, D. Elgesem, K. Stølen
{"title":"Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study","authors":"Bjørnar Solhaug, D. Elgesem, K. Stølen","doi":"10.1109/POLICY.2007.42","DOIUrl":"https://doi.org/10.1109/POLICY.2007.42","url":null,"abstract":"This paper provides a case study based evaluation of UML sequence diagrams as a notation for policy specification. Policy rules are defined on the basis of deontic logic and provided a trace based semantics interpreted over Kripke structures. This gives a semantics comparable to the UML trace semantics for sequence diagrams, which is utilized in the evaluation. The focus is on requirements with respect to expressivity, utility and human readability.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126952226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Policy-Driven Negotiation for Authorization in the Grid 网格中用于授权的策略驱动协商
I. Constandache, D. Olmedilla, F. Siebenlist
{"title":"Policy-Driven Negotiation for Authorization in the Grid","authors":"I. Constandache, D. Olmedilla, F. Siebenlist","doi":"10.1109/POLICY.2007.36","DOIUrl":"https://doi.org/10.1109/POLICY.2007.36","url":null,"abstract":"In many grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other's authorization policy, in order to be able to present the right assertions that allow access, and to reveal as little as possible of the access policy details to unauthorized parties. This paper describes a mechanism where the client and servers are semantically annotated with policies that protect their resources. These annotations specify both constraints and capabilities that are used during a negotiation to reason about and communicate the need to see certain credentials from the other party and to determine whether requested credentials can be obtained and revealed. The result of the negotiation is a state where both parties have satisfied their policy constraints for a subsequent interaction or where such interaction is disallowed by either or both. Furthermore, we present an implementation of a prototype, based on the PEERTRUST policy language, and a reasoning engine that is integrated in the Web services runtime component of the globus toolkit. The negotiation process is facilitated through the implementation of WSRF-compliant service interfaces for protocol message exchanges.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131067831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Autonomous Pervasive Systems and the Policy Challenges of a Small World! 自主普适系统与小世界的政策挑战!
Emil C. Lupu, Naranker Dulay, J. Sventek, M. Sloman
{"title":"Autonomous Pervasive Systems and the Policy Challenges of a Small World!","authors":"Emil C. Lupu, Naranker Dulay, J. Sventek, M. Sloman","doi":"10.1109/POLICY.2007.9","DOIUrl":"https://doi.org/10.1109/POLICY.2007.9","url":null,"abstract":"Pervasive systems are the subject of intensifying research efforts and their applications range from health monitoring and intelligent homes, to location aware services, unmanned vehicles and city-wide pervasive infrastructures. Although application- specific solutions have been proposed, their design has often raised additional challenges. This paper discusses the use of autonomous pervasive systems as a fertile testbed for policy-based adaptation and for integrating techniques that span across conventional subject boundaries. Additionally, we present the self-managed cell architectural pattern for realizing policy-driven autonomous pervasive systems and discuss the design of the Ponder2 policy service.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134399966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards Privacy-Aware Handling of Authorizations 实现对授权的隐私意识处理
Wolfgang Dobmeier, G. Pernul
{"title":"Towards Privacy-Aware Handling of Authorizations","authors":"Wolfgang Dobmeier, G. Pernul","doi":"10.1109/POLICY.2007.47","DOIUrl":"https://doi.org/10.1109/POLICY.2007.47","url":null,"abstract":"Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy problems when stored and processed centrally. We present first steps towards a framework of privacy-aware handling of authorizations. We split up the storage and the processing of access control policies in a user-centric approach. We illustrate our approach at the example of a security infrastructure scenario.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128386478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信