POLICY 2010



Important Dates

Abstract Due: February 15 2010
Full Paper Due: February 22 2010
Notification: April 22 2010
Final copy due:  May 12 2010
Conference: July 21-23 2010

Sponsored by



Information about available sponsorship opportunities can be found in the Call for Patrons
If you are interested in becoming a sponsor of the symposium, please contact the organisers ().

Programme

(pdf)
Wednesday, July 21, 2010
08:30AM - 09:00AM Registration
09:00AM - 09:15AM Opening Session
09:15AM - 10:30AM Invited Presentation: Building a Better Privacy Policy
Lorrie Faith Cranor, Carnegie Mellon University, USA

Session Chair: Marianne Winslett
10:30AM - 12:00PM Session 1: Social Networking and Usability
Session Chair: Naranker Dulay
Contributed Papers Collaborative Privacy Policy Authoring in a Social Networking Context
Ryan Wishart, Imperial College London
Domenico Corapi, Imperial College London
Srdjan Marinovic, Imperial College London
Morris Sloman, Imperial College London
User Centric Policy Management in Online Social Networks
Mohamed Shehab, University of North Carolina at Charlotte
Gorrell Cheek, University of North Carolina at Charlotte
Hakim Touati, University of North Carolina at Charlotte
Anna Squicciarini, The Pennsylvania State University
Pau-Chen Cheng, IBM T.J. Watson Research Center
A Policy Based Infrastructure for Social Data Access with Privacy
Palanivel Kodeswaran, University of Maryland, Baltimore County
Evelyne Viegas, Microsoft Research
Usable Policy Template Authoring for Iterative Policy Refinement
Maritza Johnson, Columbia University
John Karat, IBM TJ Watson Research Center Hawthorne
Clare-Marie Karat, IBM TJ Watson Research Center Hawthorne
Keith Grueneberg, IBM TJ Watson Research Center Hawthorne
12:00PM - 1:30PM LUNCH BREAK
1:30PM - 3:20PM Session 2: Usage Control and Debugging Policies
Session Chair: Jeffrey Mark Bradshaw
Usage Control Downstream Usage Control
Laurent Bussard, European Microsoft Innovation Center
Gregory Neven, IBM Zurich Research Laboratory
Franz-Stefan Preiss, IBM Zurich Research
Coordinating Data Usage Control in Loosely-Connected Networks
Giovanni Russello, Create-Net
Enrico Scalavino, Imperial College London
Naranker Dulay, Imperial College London
Emil Lupu, Imperial College London
Debugging Policies ACPT: A Tool for Modeling and Verifying Access Control Policies
JeeHyun Hwang, North Carolina State University
Tao Xie, North Carolina State University
Vincent Hu, NIST
Mine Altunay, Fermi National Laboratory
An Intelligent Network for Federated Testing of NetCentric Systems
Edward Chow, Jet Propulsion Laboratory
Mark James, Jet Propulsion Laboratory
Hsin-Ping Chang, Jet Propulsion Laboratory
Farrokh Vatan, Jet Propulsion Laboratory
Gurusham Sudhir, Jet Propulsion Laboratory
3:20PM - 4:20PM Session 3: Policy Applications I
Session Chair: Dave Eyers
Contributed Papers Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios
Enrico Scalavino, Imperial College London
Vaibhav Gowadia, Imperial College London
Rudi Ball, Imperial College London
Emil Lupu, Imperial College London
Giovanni Russello, Create-Net
Teleo-Reactive Policies in Ponder2
Kevin Twidle, Imperial College London
Srdjan Marinovic, Imperial College London
Naranker Dulay, Imperial College London
Policy-Based Management for Resource-Constrained Devices and Systems
Anna Litvina, MATERNA GmbH
Christoph Fiehe, MATERNA GmbH
Ingo Lueck, MATERNA GmbH
Franz-Josef Stewing, MATERNA GmbH
Jan Krueger, TU Dortmund University
Oliver Dohndorf, TU Dortmund University
Heiko Krumm, TU Dortmund University
05:00PM - 07:00PM Conference Dinner
 
Thursday, July 22, 2010
08:30AM - 09:00AM Registration
9:00AM - 10:15AM Invited Presentation: Policy-based Data Management
Reagan Moore, University of North Carolina at Chapel Hill, USA

Session Chair: Ken Moody
10:15AM - 12:05PM Session 4: Policy Applications II
Session Chair: Peter Linington
Contributed Papers Automated Policy Generation Framework for Large-Scale Storage Infrastructures
Ramani Routray, IBM Research - Almaden
David Eyers, University Of Cambridge
Peter Pietzuch, Imperial College London
Rui Zhang, IBM Research - Almaden
Prasenjit Sarkar, IBM Research - Almaden
Douglas Wilcocks, Imperial College London
Linking Policies to the Spatial Environment
David Evans, University of Cambridge
David Eyers, University of Cambridge
Jean Bacon, University of Cambridge
QoP and QoS Policy Cognizant Module Composition
Paul Seymer, George Mason University
Angelos Stavrou, George Mason University
Duminda Wijesekera, George Mason University
Sushil Jajodia, George Mason University
Automatic Policy Mapping to Management System Configurations
Abdelnasser Ouda, University of Western Ontario
Michael Bauer, University of Western Ontario
Hanan Lutfiyya, University of Western Ontario
12:05PM - 1:30PM LUNCH BREAK
1:30PM - 2:45PM Invited Presentation: Compliance with Policies and Regulations
Annie Antón, North Carolina State University, USA

Session Chair: Marianne Winslett
2:45PM - 4:15PM Session 5: Authorization and Policy Models and Languages
Session Chair: Dave Eyers
Authorization DAuth: Fine-grained Authorization Delegation for Distributed Web Application Consumers
Joshua Schiffman, Pennsylvania State University
Xinwen Zhang, Samsung Information Systems America
Simon Gibbs, Samsung Information Systems America
Toward Self-contained Authorization Policies
Romain Laborde, IRIT/SIERA
Marwan Cheaito, University Paul Sabatier
Barrère François, IRIT/SIERA
Benzekri Abdelmalek, IRIT/SIERA
A Small But Non-negligible Flaw in the Android Permission Scheme
Wook Shin, KDDI R&D Laboratories, Inc.
Sanghoon Kwak, Dept. of EECS, Seoul National University
Shinsaku Kiyomoto, KDDI R&D Laboratories, Inc.
Kazuhide Fukushima, KDDI R&D Laboratories, Inc.
Toshiaki Tanaka, KDDI R&D Laboratories, Inc.
A Model for the Governance of Federated Healthcare Information Systems
Naftaly Minsky, Rutgers University
Policy Models and
Languages
Toward Policy-Based Data Downgrading: Semantic Framework and Automated Tools to Balance Need-To-Protect and Need-To-Share Policies
Grit Denker, SRI International
Ashish Gehani, SRI International
Minyoung Kim, SRI International
David Hanz, SRI International
JTAM - A Joint Threshold Administration Model
Ashish Kamra, Purdue University
Elisa Bertino, Purdue University
 
Friday, July 23, 2010
08:30AM - 09:00AM Registration
9:00AM - 10:15AM Invited Presentation: Declarative Policy-based Networking
Boon Thau Loo, University of Pennsylvania, USA

Session Chair: Ken Moody
10:15AM - 11:45AM Session 6: Networking and Virtual Organizations
Session Chair: Duminda Wijesekera
Contributed Papers A Negotiation Framework for Negotiation of Coalition Policies
Mandis Beigi, IBM Research
Jorge Lobo, IBM Research
Keith Grueneberg, IBM Research
Seraphin Calo, IBM Research
John Karat, IBM Research
Enforcement of Data-Plane Policies in Next-Generation Networks
Shashank Shanbhag, University of Massachusetts, Amherst
Tilman Wolf, University of Massachusetts, Amherst
Towards Autonomous Administrations of Decentralized Authorization for Inter-domain Collaborations
Hannah K. Lee, SVA, TU-HH
Efficient Policy Checking Across Administrative Domains
David Evans, University of Cambridge
David Eyers, University of Cambridge
11:45AM - 1:15PM LUNCH BREAK
1:15PM CLOSE

Invited Presentations

Building a Better Privacy Policy
Lorrie Faith Cranor, Carnegie Mellon University, USA

Abstract

Today’s online privacy policies are failing consumers because they are difficult to understand and take too long to read. At the CyLab Usable Privacy and Security Laboratory at Carnegie Mellon University, we've developed and evaluated new ways of making privacy policies more usable for consumers. One approach is to distill privacy policy information into a simple privacy rating, and display this rating as an annotation to search engine results. Our laboratory studies have demonstrated that by including privacy ratings in search results consumers are motivated to seek out websites with better privacy policies and pay a small premium for better privacy. We've also conducted studies comparing a number of existing and new privacy policy formats to determine which are most usable, and developed and evaluated a new privacy "nutrition label" format based on concepts from standardized food labels. We've developed tools to generate our privacy nutrition labels automatically for websites that have Platform for Privacy Preferences (P3P) computer-readable privacy policies, and integrated this into the privacyfinder.org, a search engine run by our lab. We've also collected a large cache of P3P policies, which we've been able to mine for data about P3P and privacy policy trends. In this talk, I will review our approach to building a better privacy policy, discuss our studies, and highlight the lessons learned.

Bio

Lorrie Faith Cranor is an Associate Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University where she is director of the CyLab Usable Privacy and Security Laboratory (CUPS). She is also Chief Scientist of Wombat Security Technologies, Inc. She has authored over 80 research papers on online privacy, phishing and semantic attacks, spam, electronic voting, anonymous publishing, usable access control, and other topics. She has played a key role in building the usable privacy and security research community, having co-edited the seminal book Security and Usability (O'Reilly 2005) and founded the Symposium On Usable Privacy and Security (SOUPS). She also chaired the Platform for Privacy Preferences Project (P3P) Specification Working Group at the W3C and authored the book Web Privacy with P3P (O'Reilly 2002). She has served on a number of boards, including the Electronic Frontier Foundation Board of Directors, and on the editorial boards of several journals. In 2003 she was named one of the top 100 innovators 35 or younger by Technology Review magazine. She was previously a researcher at AT&T-Labs Research and taught in the Stern School of Business at New York University.
Back


Policy-based Data Management
Reagan Moore, University of North Carolina at Chapel Hill, USA

Abstract

The organization of distributed data into sharable collections requires highly extensible systems capable of enforcing and evolving management policies. The integrated Rule Oriented Data System (iRODS) provides a framework within which policies can be defined, enforced, and audited for a wide variety of data management systems, ranging from data grids, to digital libraries, to processing pipelines, to persistent archives. Each application is characterized by a different set of policies and procedures, by a different set of assessment criteria, and by a different preferred access mechanism. The iRODS data grid installs a rule engine at each site where data will be stored, enforces local policies that must be met before data can leave the storage, and enforces global policies that apply to the shared collection. The open source software is provided under a BSD license from http://irods.diceresearch.org.

Bio

Reagan Moore is a Professor in the School of Information and Library Science at the University of North Carolina at Chapel Hill, Chief Scientist for Data Intensive Cyber Environments at the Renaissance Computing Institute, and Director of the Data Intensive Cyber Environments Center at UNC. He coordinates research efforts in development of data grids, digital libraries, and preservation environments. Developed software systems include the Storage Resource Broker data grid and the integrated Rule-Oriented Data System. Supported projects include the National Archives and Records Administration Transcontinental Persistent Archive Prototype, and science data grids for seismology, oceanography, climate, high-energy physics, astronomy, and bio-informatics. An ongoing research interest is use of data grid technology to automate execution of management policies and validate trustworthiness of repositories.

Moore’s previous roles include: Director of the DICE group at the San Diego Supercomputer Center, and Manager of production services at SDSC. He previously worked as a computational plasma physicist at General Atomics on equilibrium and stability of toroidal fusion devices. He has a Ph.D. in plasma physics from the University of California, San Diego, (1978) and a B.S. in physics from the California Institute of Technology (1967).
Back


Compliance with Policies and Regulations
Annie Antón, North Carolina State University, USA

Abstract

Properly protecting information is in all our best interests, but it is a complex undertaking. The fact that regulation is often written by non-technologists, introduces additional challenges and obstacles. Moreover, those who design systems that collect, store, and maintain sensitive information have an obligation to design systems holistically within this broader context of regulatory and legal compliance.

There are questions that should be asked when developing new requirements for information systems. For example: How do we build systems to handle data that must be kept secure and private when relevant regulations tie your hands? When building a system that maintains health or financial records for a large number of people, what do we need to do to protect the information against theft and abuse, keep the information private, and at the same time, satisfy all governing privacy laws and restrictions? Moreover, how do we know that we've satisfied those laws? How do we monitor for compliance while ensuring that we're monitoring the right things? And, how do you accomplish all this in a way that can be expressed clearly to end-users and legislators (or auditors) so they can be confident you are doing the right things?

We've been working on technologies to make these tasks simpler, and in some senses, automatic. In this talk, I will describe some of the research that we have been conducting to address these problems. The results of some of our studies pose interesting ethical questions for industry and society at large, and help illustrate the complexity of the problems.

Bio

Annie Antón is a Professor in the Computer Science Department of the College of Engineering at North Carolina State University (NCSU), where she is a member of the NCSU Cyber Defense Lab. Her research focuses on methods and tools to support the specification of complete, correct behavior of software systems used in environments that pose risks of loss as a consequence of failures and misuse. This includes Web-based and e-commerce systems in which the security of personal and private information is particularly vulnerable. Antón is the founder and director of ThePrivacyPlace.org, a research group of students and faculty at NCSU, Georgia Tech and Purdue. She is leading this group in the development of technology to assist practitioners and policy makers in meeting the challenge of eliciting and expressing policies (a form of requirements). These tools help ensure that privacy policies are aligned with the software systems that they govern.

Antón is co-founder of the Symposium on Requirements Engineering for Information Security (SREIS), which has bridged the gap between the software engineering and information security research communities. In 2002 she coordinated NC State's successful application for a National Security Agency Center of Academic Excellence in Information Assurance Education, involving the participation of faculty in three Colleges. She is an associate editor for IEEE Transactions on Software Engineering, the cognitive issues subject area editor for the Requirements Engineering Journal, and a member of the International Board of Referees for Computers & Security. Antón currently serves on the DHS Data Privacy and Integrity Advisory Committee and the CRA Board of Directors. She is a former member of the NSF CISE Advisory Council, IDA/DARPA Defense Science Study Group, Microsoft Research's University Relations Faculty Advisory Board, the Georgia Tech Advisory Board (GTAB) and the CRA-W Board.
Back


Declarative Policy-based Networking
Boon Thau Loo, University of Pennsylvania, USA

Abstract

Declarative networking is a programming methodology that enables developers to concisely specify network protocols and services using a distributed recursive query language, which are directly compiled to a dataflow framework that executes the specifications. This approach provides ease and compactness of specification, and offers additional benefits such as optimizability and the potential for safety checks.

The declarative networking agenda started in 2005 with an initial goal of enabling safe extensible routers. Since we began our work on this topic, there has been increasing evidence that declarative, data-centric programming has much broader applicability. Researchers have expanded in multiple directions from our initial work on routing, to encompass low-level network issues at the wireless link layer, to higher-level logic including both overlay networks, robotics, distributed machine learning, and applications like code dissemination and content distribution.

This talk will first present an overview of declarative networking research and a broad survey of use cases in this field. I will next describe two specific instances relevant to policy-based networking. The first instance is in the security domain where security extensions to declarative networking enables the integration of security policies and distributed systems within a common declarative framework. The second instance utilizes declarative networking to implement adaptive hybrid protocols, where policy-driven adaptation of network protocols are specified in a generic set of declarative rule-based policies. I will conclude with a discussion of ongoing research work, as well as a number of open challenges in declarative networking.

Bio

Boon Thau Loo is an Assistant Professor in the Computer and Information Science department at the University of Pennsylvania. He received his Ph.D. degree in Computer Science from the University of California at Berkeley in 2006. Prior to his Ph.D., he received his M.S. degree from Stanford University in 2000, and his B.S. degree with highest honors from UC Berkeley in 1999. His research focuses on distributed data management systems, Internet-scale query processing, and the application of data-centric techniques and formal methods to the design, analysis and implementation of networked systems. He was awarded the 2006 David J. Sakrison Memorial Prize for the most outstanding dissertation research in the Department of EECS at UC Berkeley, and the 2007 ACM SIGMOD Dissertation Award. He is a recipient of the NSF CAREER award (2009). He was also the program co-chair for the CoNEXT 2008 Student Workshop and the NetDB 2009 workshop co-located with SOSP.
Back