Download CfP

      PDF Version
      Text Version

Important Dates

Abstract due: February 15 2010
Full Paper Due: February 22 2010
Notification: April 22 2010
Final copy due:  May 12 2010
Conference: July 21-23 2010

Sponsored by

Information about available sponsorship opportunities can be found in the Call for Patrons
If you are interested in becoming a sponsor of the symposium, please contact the organisers (dwijesek@gmu.edu).

Call for Papers

The policy symposium aims to bring together researchers and practitioners working on policy-based systems across a wide range of application areas including policy-based networking, privacy and security management, network management, storage area networking, and enterprise systems. POLICY 2010 is the 11th in a series of successful symposiums which since 1999 have provided a forum for discussion and collaboration between researchers, developers and users of policy-based systems.

This year's event will have a special focus on policy-driven real-life applications, and we encourage submissions in this area as well as the topics listed below. The symposium will include demonstrations of innovative policy-based systems, and authors are invited to submit demonstration descriptions, as described below. In addition, authors of all accepted papers will be invited to accompany their presentation with an optional demonstration.

POLICY 2010 invites novel contributions on all aspects of policy-based management. Papers must describe original work and must not have been accepted or submitted for publication elsewhere. Submitted papers will be evaluated for technical contribution, originality, and significance. Topics of interest include, but are not limited to the following:

  • Privacy and Security
    • Frameworks and tools for managing the privacy and security policy life-cycle
    • Architectures for deployment and enforcement of privacy and security policies
    • Refinement of high-level privacy/security requirements into policies
    • Detection and resolution of inconsistencies in privacy and security policies
    • Usability of policy-based privacy and security management tools
  • Policy Models and Languages:
    • Abstract models and languages for policy specification
    • Representing policies in XML, RDF, and OWL
    • Semantic Web rule-based languages for policy reasoning
    • Policy standards, their extensions and refinements
    • Formal semantics of policies
    • Relationships between policies, both going vertically and horizontally through different application domains
    • Methodologies and tools for discovering, specifying, analyzing, refining, and evaluating policy
    • Models of policy negotiation
    • Representation of belief, trust, and risk in policies
    • Systems and tools for the management of policies
    • Policy visualization
    • Detection and resolution of policy conflicts
    • Usability of policy languages and representations
    • Policy analytics: understanding the consequences of policies with modelling and simulation techniques
  • Policy Applications:
    • Federated policy management in heterogeneous organisational contexts and control domains
    • Case studies of applying policy-based management in different application domains
    • Application of policies for resource allocation, autonomic computing, systems management, QoS adaptation, security
    • Policy based networking, including collaborative security, pervasive computing, and mobile systems
    • Business rules and organizational modelling
    • Identity management
    • Personalization
    • Risk adaptive policy systems
    • Policy Metrics: evaluation of the effectiveness of policies
    • Policy applications in on-demand, utility based computing
    • Resource virtualization and policy-based collaboration
    • Cross-domain policy coordination and negotiation
    • Scalability of policy-based management
    • Architectures of policy-based management systems
    • Automated policy generation

System demonstration submissions will be evaluated on the basis of their technical merit and novelty. Of particular interest are systems that illustrate research contributions and innovative applications of policy based technologies. Those interested in demonstrating a system/application should submit a description following the instructions in the submission instructions. Commercial products are eligible, but sales and marketing activities are not appropriate.
We invite you to submit, contribute and participate in this symposium and look forward to welcoming you to Washington DC in July 2010. Please refer to the Submission Info page for more information on formatting and how to upload your paper

POLICY 2010 Program Co-chairs

Ken Moody, Cambridge University, UK
Marianne Winslett, ADSC Singapore and University of Illinois at Urbana-Champaign, USA