IEEE International Symposium on
Policies for Distributed Systems and Networks
www.ieee-policy.org
POLICY 2011
- Accepted Papers
- News
- Programme
- Invited Speakers
- Call for papers
- Organising Committee
- Submission info
- Registration info
- Location
- Travel info
Symposium Programme
Monday, June 6, 2011 | |
9:00am - 10:00am | Keynote |
Policy Specification and Enforcement in Emerging Scenarios (slides) | |
Speaker: Pierangela Samarati | |
10:00am - 10:30am | COFFEE BREAK |
10:30am - 12:00pm | Session 1: Policy Models and Languages - Chair: Pierangela Samarati |
Full Papers | FLAVOR: A Formal Language for A posteriori Verification of Legal Rules (slides) |
Romuald Thion, Université Lyon, France. Daniel Le Métayer, INRIA, France. | |
Rigorous Analysis of UML Access Control Policy Models (slides) | |
Wuliang Sun, Robert France and Indrakshi Ray. Colorado State University, USA. | |
Realization of User Level Fault Tolerant Policy Management through a Holistic Approach for Fault Correlation | |
Byung-Hoon Park, Thomas Naughton, Pratul Agarwal, David Bernholdt, Al Geist, Oak Ridge National Laboratory, USA. Jennifer L. Tippens, Information Technology Services Division, Oak Ridge National Laboratory, USA. | |
12:00pm - 1:00pm | EU-FP8 Talk |
ICT FP7 Call 8: Objective 1.4 Trustworthy ICT (slides) | |
Speaker: Vilija Juceviciene, European Commission, Unit 5 - Trust and Security | |
1:00pm - 2:30pm | LUNCH BREAK |
2:30pm - 3:45pm | Session 2: Short Papers - Chair: Fabio Massacci |
Short Papers | A Policy Language for Abstraction and Automation in Application-oriented Access Controls: The Functionality-based Appliction Confinement Policy Language (slides) |
Z. Cliffe Schreuders, Christian Payne, Tanya McGill, Murdoch University, Australia. | |
GPF: A General Policy Framework | |
Steve Barker, King's College, UK. Gillian Lowen, Technologica, UK. | |
Policy of Composition ≠ Composition Policies (slides) | |
Sebastian Speiser, Karlsruhe Service Research Institute, Germany. | |
Automatic Policy Rule Extraction for Configuration Management (slides) | |
Ron Banner, Omer Barkol, Ruth Bergman, Shahar Golan, HP Labs, Israel. Yuval Carmel, Ido Ish-Hurwitz, Oded Zilinsky, HP Software, Israel. | |
Profile-based Selection of Accountability Policies in Grid Computing Systems | |
Wonjun Lee, Electrical & Computer Engineering, Purdue University, USA. Anna C. Squicciarini, The Pennsylvania State University, USA. Elisa Bertino, Computer Science, Purdue University, USA. | |
4:00pm - 4:30pm | COFFEE BREAK |
4:30pm - 6:00pm | Poster and Demo Session |
Inter-domain Multi-Hop Negotiation for the Internet | |
Hasan T. Karaoglu and Murat Yuksel, University of Nevada, USA. | |
CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies | |
Wenjia Li, Pramod Jagtap, Laura Zavala, Anupam Joshi and Tim Finin, University of Maryland, USA. | |
Demonstration of Policy-Guided Data Preservation using iRODS | |
Mike Conway, Reagan Moore, Arcot Rajasekar, University of North Carolina, USA. Jean-Yves Nief, CNRS, France. | |
Enforcing Multi-user Access Policies to Encrypted Cloud Databases | |
Mihaela Ion, Giovanni Russello, CREATE-NET International Research Center, Italy. Bruno Crispo, University of Trento, Italy. | |
Policy Supersession in a Coalition ISR Network | |
Keith Grueneberg, David Wood, Xiping Wang, Seraphin Calo and Maroun Touma, IBM Research, USA. | |
A Multi-Environment Application of Privacy Data Envelopes | |
Mahmoud Ghorbel, Armen Aghasaryan, Marie-Pascale Dupont, Stéphane Betgé-Brezetz, Guy-Bertrand Kamga and Sophie Piekarec, Alcatel-Lucent Bell Labs, France. | |
A Security Framework for Systems of Systems | |
Daniel Trivellato, Nicola Zannone University of Twente, Netherlands. Sandro Etalle, Eindhoven University of Technology, Netherlands. | |
PPL: PrimeLife Privacy Policy Engine | |
Slim Trabelsi, Jakub Sendor, Stefanie Reinicke, SAP Research, France. | |
(SC)2: a System to Secure Off-Card Contract Policy Matching in Security-by-Contract for Open Multi-Application Smart Cards | |
Nicola Dragoni, Eduardo Lostal and Davide Papini, DTU Informatics, Denmark. | |
Using MiniZnMASC Middleware with Different Algorithms for Business-Driven Adaptation of Business Processes | |
Qinghua Lu, University of New South Wales, Australia. Vladimir Tosic, Software Systems, NICTA, Australia. | |
WS-Governance Tooling: SOA Governance Policies | |
Antonio Manuel Gutierrez, José Antonio Parejo, Pablo Fernandez and Antonio Ruiz-Cortés, University of Seville, Spain. | |
6:00pm - 7:30pm | Welcome Cocktail |
Tuesday, June 7, 2011 | |
9:00AM - 10:00am | Keynote |
The Utility of Utility: Policies for Self-Managing Systems (slides) | |
Speaker: Jeffrey Kephart | |
10:00am - 10:30am | COFFEE BREAK |
10:30am - 12:00pm | Session 3: Privacy and Security - Chair: Arosha Bandara |
Full Papers | Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies (slides) |
Nataliia Bielova and Fabio Massacci, University of Trento, Italy. | |
A Framework for Managing and Analyzing Changes of Security Policies (slides) | |
Achim Brucker and Helmut Petritsch, SAP Research, Germany. | |
Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-Domain MPLS networks (slides) | |
Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi, Scuola Superiore Sant'Anna, Pisa, Italy. | |
12:00pm - 1:00pm | Session 4: Short Papers - Chair: Marco Casassa |
Short Papers | PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications (slides) |
Guillaume Benats, Arosha Bandara, Yijun Yu, Jean-Noel Colin and Bashar Nuseibeh, The Open University, UK. | |
Information Flow Control for Static Enforcement of User-defined Privacy Policies (slides) | |
Sören Preibusch, University of Cambridge, UK. | |
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes (slides) | |
Marco Casassa Mont and Richard Brown, Hewlett-Packard Labs, UK. | |
Authoring and Deploying Policies Dynamically for Compliance Monitoring (slides) | |
Yurdaer Doganata, Keith Grueneberg, John Karat and Nirmal Mukhi, IBM Research, USA. | |
1:00pm-2:30pm | LUNCH BREAK |
2:30pm - 4:00pm | Session 5: Mobility - Chair: Jeffrey Kephart |
Full Papers | A Policy-Based Simulator for Assisted Adaptive Vertical Handover (slides) |
Ismaeel Al Ridhawi, Nancy Samaan and Ahmed Karmouch, University of Ottawa, Canada. | |
Distributed Overlay Construction to Support Privacy-Based Access Control (slides) | |
Bong Jun Ko, Starsky H.Y. Wong, Kang-Won Lee, IBM T.J. Watson Research Center, USA. Chi-Kin Chau, University of Cambridge, UK. | |
Policy-Based Access Control in Mobile Social Ecosystems (slides) | |
Sara Hachem, Alessandra Toninelli, Animesh Pathak and Valerie Issarny, INRIA Paris-Rocquencourt, France. | |
4:00pm - 4:30pm | COFFEE BREAK |
4:30pm - 6:00pm | Panel Session: The Policy Decade - has it delivered? |
Panel Chair: Morris Sloman | |
Panel Members: Fabio Massacci, Arosha Bandara, Jeffrey Kephart and Morris Sloman. | |
Slides for Fabio Massacci's address | |
Slides for Arosha Bandara's address | |
Slides for Jeffrey Kephart's address | |
Slides for Morris Sloman's address | |
8:00pm - 11:00pm | Social Dinner |
Wednesday, June 8, 2011 | |
9:00am - 10:00am | Keynote |
Data-Centric Usage Control Enforcement | |
Speaker: Alexander Pretschner | |
10:00am - 10:30am | COFFEE BREAK |
10:30am - 1:00pm | Session 6: Applications - Chair: Alexander Pretschner |
Full Papers | Towards Run-time Verification in Access Control (slides) |
Fatih Turkmenm, Bruno Crispo, University of Trento, Italy. Eunjin Jung, University of San Francisco, USA. | |
Tool-Supported Refinement of High-Level Requirements and Constraints into Low-Level Policies (slides) | |
Oliver Dohnhof, Jan Kruger, Heiko Krumm, TU Dortmund University, Germany. Christoph Fiehe, Anna Litvina, Ingo Luck and Franz-Joseph Stewing, MATERNA Information & Communications, Germany. | |
A Virtualization Assurance Language for Isolation and Deployment (slides) | |
Soren Bleikertz and Thomas Grob, IBM Research Zürich, Switzerland. | |
iLayer: Toward an Application Access Control Framework for Content Management System (slides) | |
Gorrell Cheek, Mohamed Shehab, Truong Ung, Ebonie Williams, University of North Carolina, USA. | |
Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance (slides) | |
Ahmed A. Ataullah and Frank Wm. Tompa, University of Waterloo, Canada. | |
1:00pm - 2:30pm | LUNCH BREAK |
2:30pm - 4:00pm | Session 7: Short Papers - Chair: Steve Barker |
Short Papers | Hard Disk Guard Based Policy Enforcement (slides) |
Mark Beaumont, Chris North, Bradley Hopkins, Ken Yiu, Defence Science and Technology Organisation, Australia. | |
A Model-Driven Approach for Incorporating Reactive Rules in Declarative Interactive TV Applications (slides) | |
Patricia Dockhorn Costa, João Paulo A. Almeida, Igor Magri Vale and Izon Thomaz Mielke, Federal University of Espirito Santo, Brazil. | |
Policy-Based Integration of Provenance Metadata (slides) | |
Ashish Gehani, Dawood Tariq, Basim Baig, SRI International, USA. Tanu Malik, University of Chicago, USA. | |
A Load Time Policy Checker for Open Multi-Application Smart Cards (slides) | |
Nicola Dragoni, Eduardo Lostal, Technical University of Denmark, Denmark. Olga Gadyatskaya, Fabio Massacci, Federica Paci, University of Trento, Italy. | |
Addressing Data Reuse Issues at the Protocol Level (slides) | |
Oshani Seneviratne, Lalana Kagal, MIT Computer Science and Artificial Intelligence Lab, USA. |