POLICY BIBLIOGRAPHY

Conferences Journals Books Proceedings Workshops Others Projects

Conferences

[1] Piero Bonatti, Daniel Olmedilla, and Joachim Peer. Advanced policy explanations. In 17th European Conference on Artificial Intelligence (ECAI 2006), Riva del Garda, Italy, August 2006. IOS Press.
[2] Miguel Alves, Carlos Viegas Damásio, Daniel Olmedilla, and Wolfgang Nejdl. A distributed tabling algorithm for rule based policy systems. In 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), London, Ontario, Canada, June 2006. IEEE Computer Society.
[3] Piero A. Bonatti, Claudiu Duma, Norbert Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, and Nahid Shahmehri. Semantic web policies - a discussion of requirements and research issues. In 3rd European Semantic Web Conference (ESWC), volume 4011 of Lecture Notes in Computer Science, Budva, Montenegro, June 2006. Springer.
[4] Marianne Winslett, Charles C. Zhang, and Piero A. Bonatti. Peeraccess: a logic for distributed authorization. In 12th ACM Conference on Computer and Communications Security, CCS 2005, pages 168-179, Alexandria, VA, USA, November 2005. ACM.
[5] Daniel Olmedilla, Omer F. Rana, Brian Matthews, and Wolfgang Nejdl. Security and trust issues in semantic grids. In Semantic Grid: The Convergence of Technologies, volume 05271 of Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum (IBFI), Schloss Dagstuhl, Germany, July 2005.
[6] Piero A. Bonatti and Daniel Olmedilla. Driving and monitoring provisional trust negotiation with metapolicies. In 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), pages 14-23, Stockholm, Sweden, June 2005. IEEE Computer Society.
[7] Pranam Kolari, Li Ding, Shashidhara Ganjugunte, Anupam Joshi, Timothy W. Finin, and Lalana Kagal. Enhancing web privacy protection through declarative policies. In 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pages 57-66, Stockholm, Sweden, June 2005. IEEE Computer Society.
[8] Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett, and Charles C. Zhang. Ontology-based policy specification and management. In 2nd European Semantic Web Conference (ESWC), volume 3532 of Lecture Notes in Computer Science, pages 290-302, Heraklion, Crete, Greece, May 2005. Springer.
[9] Moritz Y. Becker and Peter Sewell. Cassandra: Distributed access control policies with tunable expressiveness. In 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), pages 159-168, Yorktown Heights, NY, USA, June 2004. IEEE Computer Society.
[10] Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, and Ronald W. Ritchey. A policy driven approach to email services. In 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pages 169-, Yorktown Heights, NY, USA, June 2004. IEEE Computer Society.
[11] Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, and Marianne Winslett. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In 1st European Semantic Web Symposium (ESWS 2004), volume 3053 of Lecture Notes in Computer Science, pages 342-356, Heraklion, Crete, Greece, May 2004. Springer.
[12] Andrzej Uszok, Jeffrey M. Bradshaw, and Renia Jeffers. Kaos: A policy and domain services framework for grid computing and semantic web services. In iTrust, volume 2995 of Lecture Notes in Computer Science, pages 16-26, Oxford, UK, April 2004. Springer.
[13] Gianluca Tonti, Jeffrey M. Bradshaw, Renia Jeffers, Rebecca Montanari, Niranjan Suri, and Andrzej Uszok. Semantic web languages for policy representation and reasoning: A comparison of kaos, rei, and ponder. In 2nd International Semantic Web Conference (ISWC), volume 2870 of Lecture Notes in Computer Science, pages 419-437, Sanibel Island, FL, USA, October 2003. Springer.
[14] Lalana Kagal, Timothy W. Finin, and Anupam Joshi. A policy based approach to security for the semantic web. In 2nd International Semantic Web Conference (ISWC), volume 2870 of Lecture Notes in Computer Science, pages 402-418, Sanibel Island, FL, USA, October 2003. Springer.
[15] Andrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers, Niranjan Suri, Patrick J. Hayes, Maggie R. Breedy, Larry Bunch, Matt Johnson, Shriniwas Kulkarni, and James Lott. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pages 93-, Lake Como, Italy, June 2003. IEEE Computer Society.
[16] Lalana Kagal, Timothy W. Finin, and Anupam Joshi. A policy language for a pervasive computing environment. In 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pages 63-, Lake Como, Italy, June 2003. IEEE Computer Society.
[17] Matt Blaze, John Ioannidis, and Angelos D. Keromytis. Experience with the keynote trust management system: Applications and future directions. In Trust Management, First International Conference, iTrust, volume 2692 of Lecture Notes in Computer Science, pages 284-300, Heraklion, Crete, Greece, May 2003. Springer.
[18] Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, and Lina Yu. Requirements for policy languages for trust negotiation. In 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY), pages 68-79, Monterey, CA, USA, June 2002. IEEE Computer Society.
[19] Piero A. Bonatti, Sabrina De Capitani di Vimercati, and Pierangela Samarati. An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur., 5(1):1-35, 2002.
[20] Ninghui Li, John C. Mitchell, and William H. Winsborough. Design of a role-based trust-management framework. In IEEE Symposium on Security and Privacy, pages 114-130, 2002.
[21] Trevor Jim and Dan Suciu. Dynamically distributed query evaluation. In 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, California, USA, May 2001. ACM.
[22] Trevor Jim. Sd3: A trust management system with certified evaluation. In IEEE Symposium on Security and Privacy, pages 106-115, 2001.
[23] Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. The role of trust management in distributed systems security. In Secure Internet Programming, Security Issues for Mobile and Distributed Objects, volume 1603 of Lecture Notes in Computer Science, pages 185-210. Springer, 1999.
[24] Matt Blaze, Joan Feigenbaum, and Martin Strauss. Compliance checking in the policymaker trust management system. In Financial Cryptography, Second International Conference, volume 1465 of Lecture Notes in Computer Science, pages 254-274, Anguilla, British West Indies, February 1998. Springer.
[25] Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In IEEE Symposium on Security and Privacy, pages 164-173, Oakland, CA, USA, May 1996. IEEE Computer Society.

Journals

[1] Steffen Staab, Bharat K. Bhargava, Leszek Lilien, Arnon Rosenthal, Marianne Winslett, Morris Sloman, Tharam S. Dillon, Elizabeth Chang, Farookh Khadeer Hussain, Wolfgang Nejdl, Daniel Olmedilla, and Vipul Kashyap. The pudding of trust. IEEE Intelligent Systems, 19(5):74-88, 2004.
[2] Joachim Biskup and Piero A. Bonatti. Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell., 40(1-2):37-62, 2004.
[3] Andrzej Uszok, Jeffrey M. Bradshaw, Matt Johnson, Renia Jeffers, Austin Tate, Jeff Dalton, and J. Stuart Aitken. Kaos policy management for semantic web services. IEEE Intelligent Systems, 19(4):32-41, 2004.
[4] Lalana Kagal, Massimo Paolucci, Naveen Srinivasan, Grit Denker, Timothy W. Finin, and Katia P. Sycara. Authorization and privacy for semantic web services. IEEE Intelligent Systems, 19(4):50-56, 2004.
[5] Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1):128-171, 2003.
[6] Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, 2003.
[7] Yang-Hua Chu, Joan Feigenbaum, Brian A. LaMacchia, Paul Resnick, and Martin Strauss. Referee: Trust management for web applications. Computer Networks, 29(8-13):953-964, 1997.

Books

[1] John W. Lloyd. Foundations of Logic Programming, 2nd Edition. Springer, 1987.
[2] Grigoris Antoniou, Matteo Baldoni, Piero A. Bonatti, Wolfgang Nejdl, and Daniel Olmedilla. Rule-based policy specification. In Ting Yu and Sushil Jajodia, editors, Secure Data Management in Decentralized Systems. Springer, 2007 (to appear).
[3] Daniel Olmedilla. Security and privacy on the semantic web. In Milan Petkovic and Willem Jonker, editors, Security, Privacy and Trust in Modern Data Management. Springer, 2006 (to appear).

Proceedings

[1] Jennifer Golbeck, Piero A. Bonatti, Wolfgang Nejdl, Daniel Olmedilla, and Marianne Winslett, editors. Proceedings of the ISWC'04 Workshop on Trust, Security, and Reputation on the Semantic Web, volume 127 of CEUR Workshop Proceedings, Hiroshima, Japan, November 2004. CEUR-WS.org.

Workshops

[1] Piero A. Bonatti, Grigoris Antoniou, Matteo Baldoni, Cristina Baroglio, Claudiu Duma, Norbert E. Fuchs, Alberto Martelli, Wolfgang Nejdl, Daniel Olmedilla, Viviana Patti, Joachim Peer, and Nahid Shahmehri. The rewerse view on policies. In Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, Galway, Ireland, November 2005.
[2] Ionut Constandache, Daniel Olmedilla, and Wolfgang Nejdl. Policy based dynamic negotiation for grid services authorization. In Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, Galway, Ireland, November 2005.
[3] Piero A. Bonatti, Claudiu Duma, Daniel Olmedilla, and Nahid Shahmehri. An integration of reputation-based and policy-based trust management. In Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, Galway, Ireland, November 2005.
[4] Rubén Lara and Daniel Olmedilla. Discovery and contracting of semantic web services. In W3C Workshop on Frameworks for Semantic in Web Services, Innsbruck, Austria, June 2005.
[5] Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, and Charles C. Zhang. How to exploit ontologies for trust negotiation. In ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, volume 127 of CEUR Workshop Proceedings, Hiroshima, Japan, November 2004. Technical University of Aachen (RWTH).
[6] Wolfgang Nejdl, Daniel Olmedilla, and Marianne Winslett. Peertrust: Automated trust negotiation for peers on the semantic web. In VLDB Workshop on Secure Data Management (SDM), volume 3178 of Lecture Notes in Computer Science, pages 118-132, Toronto, Canada, August 2004. Springer.
[7] Daniel Olmedilla, Rubén Lara, Axel Polleres, and Holger Lausen. Trust negotiation for semantic web services. In 1st International Workshop on Semantic Web Services and Web Process Composition (SWSWPC), volume 3387 of Lecture Notes in Computer Science, pages 81-95, San Diego, CA, USA, July 2004. Springer.
[8] Moritz Y. Becker and Peter Sewell. Cassandra: Flexible trust management, applied to electronic health records. In 17th IEEE Computer Security Foundations Workshop, pages 139-154. IEEE Computer Society, June 2004.
[9] Jim Basney, Wolfgang Nejdl, Daniel Olmedilla, Von Welch, and Marianne Winslett. Negotiating trust on the grid. In 2nd WWW Workshop on Semantics in P2P and Grid Computing, New York, USA, May 2004.
[10] Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. Keynote: Trust management for public-key infrastructures (position paper). In Security Protocols, 6th International Workshop, volume 1550 of Lecture Notes in Computer Science, pages 59-63, Cambridge, April, 1998. Springer.

Others

[1] Ionut Constandache, Daniel Olmedilla, Frank Siebenlist, and Wolfgang Nejdl. Policy-driven negotiation for authorization in the semantic grid. Technical report, L3S Research Center, October 2005.
[2] Piero Bonatti, Daniel Olmedilla, and Joachim Peer. Advanced policy explanations. Technical report, Working Group I2, EU NoE REWERSE, August 2005. http://rewerse.net/deliverables/m18/i2-d4.pdf.
[3] Piero A. Bonatti and Daniel Olmedilla. Policy language specification. Technical report, Working Group I2, EU NoE REWERSE, February 2005. http://rewerse.net/deliverables/m12/i2-d2.pdf.
[4] P. A. Bonatti, N. Shahmehri, C. Duma, D. Olmedilla, W. Nejdl, M. Baldoni, C. Baroglio, A. Martelli, V. Patti, P. Coraggio, G. Antoniou, J. Peer, and N. E. Fuchs. Rule-based policy specification: State of the art and future work. Technical report, Working Group I2, EU NoE REWERSE, August 2004. http://rewerse.net/deliverables/i2-d1.pdf.
[5] Lalana Kagal. A Policy-Based Approach to Governing Autonomous Behaviour in Distributed Environments. PhD thesis, University of Maryland Baltimore County, 2004.
[6] Wolfgang Nejdl, Daniel Olmedilla, and Marianne Winslett. Peertrust: Automated trust negotiation for peers on the semantic web. Technical Report, November 2003.
[7] William H. Winsborough and Ninghui Li. Towards practical automated trust negotiation. In 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pages 92-103. IEEE Computer Society, 2002.
[8] Piero A. Bonatti, Sabrina De Capitani di Vimercati, and Pierangela Samarati. A modular approach to composing access control policies. In ACM Conference on Computer and Communications Security, pages 164-173, 2000.
[9] William H. Winsborough, Kent E. Seamons, and Vicki E. Jones. Automated trust negotiation. DARPA Information Survivability Conference and Exposition, IEEE Press, Jan 2000.

Projects

[1] REWERSE WG2 - Policy language, enforcement, composition
[2] PeerTrust Project

This file has been generated by bibtex2html

 

Last update on 20-Jun-2006 10:11 AM Home