Domains: a framework for structuring management policy
Network and distributed systems management
Role-Based Access Control Models
Computer
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
AAAI '99/IAAI '99 Proceedings of the sixteenth national conference on Artificial intelligence and the eleventh Innovative applications of artificial intelligence conference innovative applications of artificial intelligence
Integrated management of networked systems: concepts, architectures, and their operational application
Conflicts in Policy-Based Distributed Systems Management
IEEE Transactions on Software Engineering
Towards A Role-Based Framework for DistributedSystems Management
Journal of Network and Systems Management
A Flexible Method for Information System Security Policy Specification
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Security Issues in Mobile Code Systems
Mobile Agents and Security
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Establishing Enterprise Communities
EDOC '01 Proceedings of the 5th IEEE International Conference on Enterprise Distributed Object Computing
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
XML-Based Distributed Access Control System
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Have It Your Way: Personalization of Network-Hosted Services
BNCOD 19 Proceedings of the 19th British National Conference on Databases: Advances in Databases
Use of Logic to Describe Enhanced Communications Services
FORTE '02 Proceedings of the 22nd IFIP WG 6.1 International Conference Houston on Formal Techniques for Networked and Distributed Systems
A Specification Language for Distributed Policy Control
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Traveling to Rome: QoS Specifications for Automated Storage System Management
IWQoS '01 Proceedings of the 9th International Workshop on Quality of Service
Integrating Goal Specification in Policy-Based Management
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Describing Policies with Graph Constraints and Rules
ICGT '02 Proceedings of the First International Conference on Graph Transformation
CIA '02 Proceedings of the 6th International Workshop on Cooperative Information Agents VI
Policy-Driven Binding to Information Resources in Mobility-Enabled Scenarios
MDM '03 Proceedings of the 4th International Conference on Mobile Data Management
A Policy Language for the Management of Distributed Agents
AOSE '01 Revised Papers and Invited Contributions from the Second International Workshop on Agent-Oriented Software Engineering II
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Utilising the Event Calculus for Policy Driven Adaptation on Mobile Systems
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Obligation Monitoring in Policy Management
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
A Policy-Based Infrastructure for the Dynamic Control of Agent Mobility
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
PEM3 - The Policy Enhanced Memory Management Model
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
The Specification and Enforcement of Advanced Security Policies
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Meta-Policies for Distributed Role-Based Access Control Systems
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
An Adaptive Policy Based Management Framework for Differentiated Services Networks
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Policy-Driven Access Control over a Distributed Firewall Architecture
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Policy Driven Data Administration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Policy Storage for Role-Based Access Control Systems
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Middleware for User Controlled Environments
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
X-FEDERATE: A Policy Engineering Framework for Federated Access Management
IEEE Transactions on Software Engineering
Zodiac: efficient impact analysis for storage area networks
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
AFPL, an Abstract Language Model for Firewall ACLs
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Flexible Resolution of Authorisation Conflicts in Distributed Systems
DSOM '08 Proceedings of the 19th IFIP/IEEE international workshop on Distributed Systems: Operations and Management: Managing Large-Scale Service Deployment
Multi-constraint Security Policies for Delegated Firewall Administration
DSOM '08 Proceedings of the 19th IFIP/IEEE international workshop on Distributed Systems: Operations and Management: Managing Large-Scale Service Deployment
Specifying Service Composition Using UML 2.x and Composition Policies
MoDELS '08 Proceedings of the 11th international conference on Model Driven Engineering Languages and Systems
Run-Time Enforcement of Nonsafety Policies
ACM Transactions on Information and System Security (TISSEC)
Compositional Refinement of Policies in UML --- Exemplified for Access Control
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A Model-Driven Approach for the Specification and Analysis of Access Control Policies
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Quality-Driven Business Policy Specification and Refinement for Service-Oriented Systems
ICSOC '08 Proceedings of the 6th International Conference on Service-Oriented Computing
Towards Self-management in Service-Oriented Computing with Modes
Service-Oriented Computing - ICSOC 2007 Workshops
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
The OPL Access Control Policy Language
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Transformation of Graphical ECA Policies into Executable PonderTalk Code
RuleML '09 Proceedings of the 2009 International Symposium on Rule Interchange and Applications
Privacy in a Semantic Cloud: What's Trust Got to Do with It?
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
A logic for state-modifying authorization policies
ACM Transactions on Information and System Security (TISSEC)
Optimizing a policy authoring framework for security and privacy policies
Proceedings of the Sixth Symposium on Usable Privacy and Security
Semantic-based authorization architecture for Grid
Future Generation Computer Systems
Editorial: Detection of semantic conflicts in ontology and rule-based information systems
Data & Knowledge Engineering
Mining likely properties of access control policies via association rule mining
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Model checking of location and mobility related security policy specifications in ambient calculus
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
SecurOntology: A semantic web access control framework
Computer Standards & Interfaces
A cautionary note about policy conflict resolution
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Enforcing UCON policies on the enterprise service bus
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
An event-B approach to data sharing agreements
IFM'10 Proceedings of the 8th international conference on Integrated formal methods
Distributed data usage control for web applications: a social network implementation
Proceedings of the first ACM conference on Data and application security and privacy
Model-based refinement of security policies in collaborative virtual organisations
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
CUDACS: securing the cloud with CUDA-enabled secure virtualization
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Protecting critical infrastructures while preserving each organization's autonomy
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Collaborative development of trusted mashups
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Managing security and privacy in ubiquitous eHealth information interchange
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Journal of Systems Architecture: the EUROMICRO Journal
Utilizing the interactive techniques to achieve automated service composition for Web Services
Journal of High Speed Networks
A decade of model-driven security
Proceedings of the 16th ACM symposium on Access control models and technologies
A model for constraint and delegation management
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
A framework and implementation for secure knowledge management in large communities
i-KNOW '11 Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies
Policy Management for Secure Data Access Control in Vehicular Networks
Journal of Network and Systems Management
Opacity analysis in trust management systems
ISC'11 Proceedings of the 14th international conference on Information security
Formal enforcement and management of obligation policies
Data & Knowledge Engineering
Policy languages require the same composition mechanisms as programming languages
Proceedings of the 1st International Workshop on Free Composition
Conflict prevention via model-driven policy refinement
DSOM'06 Proceedings of the 17th IFIP/IEEE international conference on Distributed Systems: operations and management
Defining and measuring policy coverage in testing access control policies
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Policy-based integration of user and provider-sided identity management
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Test generation for network security rules
TestCom'06 Proceedings of the 18th IFIP TC6/WG6.1 international conference on Testing of Communicating Systems
Policy-based security management in mobile environments
Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia
A model for interaction rules to define governance policies in collaborative environments
CSCWD'05 Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II
Using description logic to determine seniority among RB-RBAC authorization rules
RSKT'06 Proceedings of the First international conference on Rough Sets and Knowledge Technology
Information seesaw: availability vs. security management in the UbiComp world
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Survey Paper: A survey on policy languages in network and security management
Computer Networks: The International Journal of Computer and Telecommunications Networking
GXLA a language for the specification of service level agreements
AN'06 Proceedings of the First IFIP TC6 international conference on Autonomic Networking
Managing policies for dynamic spectrum access
AN'06 Proceedings of the First IFIP TC6 international conference on Autonomic Networking
Distributed processing of context-aware authorization in ubiquitous computing environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
A DDL based formal policy representation
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
An OWL-Based approach for RBAC with negative authorization
KSEM'06 Proceedings of the First international conference on Knowledge Science, Engineering and Management
A dynamic access control model
Applied Intelligence
Modelling mobility aspects of security policies
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
On practical specification and enforcement of obligations
Proceedings of the second ACM conference on Data and Application Security and Privacy
Deriving implementation-level policies for usage control enforcement
Proceedings of the second ACM conference on Data and Application Security and Privacy
Revocation of obligation and authorisation policy objects
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
A configurable telecare system
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
On exploiting agent technology in the design of peer-to-peer applications
AP2PC'04 Proceedings of the Third international conference on Agents and Peer-to-Peer Computing
Ontology-Based RBAC specification for interoperation in distributed environment
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Policy refinement: decomposition and operationalization for dynamic domains
Proceedings of the 7th International Conference on Network and Services Management
Managing a SaaS application in the cloud using PaaS policy sets and a strategy-tree
Proceedings of the 7th International Conference on Network and Services Management
An autonomic open marketplace for service management and resilience
Proceedings of the 7th International Conference on Network and Services Management
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Semantic-Based policy engineering for autonomic systems
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
Specifying legal risk scenarios using the CORAS threat modelling language
iTrust'05 Proceedings of the Third international conference on Trust Management
iTrust'05 Proceedings of the Third international conference on Trust Management
An ontology-based approach to information systems security management
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Designing a domain-specific contract language: a metamodelling approach
ECMDA-FA'05 Proceedings of the First European conference on Model Driven Architecture: foundations and Applications
IPOM'05 Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks
Dynamic composition of cross-organizational features in distributed software systems
DAIS'10 Proceedings of the 10th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems
Privacy injector — automated privacy enforcement through aspects
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
A systemic approach to automate privacy policy enforcement in enterprises
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Operational modelling of agent autonomy: theoretical aspects and a formal language
AOSE'05 Proceedings of the 6th international conference on Agent-Oriented Software Engineering
A data sharing agreement framework
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Privacy management for global organizations
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Obligation language and framework to enable privacy-aware SOA
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
RDyMASS: reliable and dynamic enforcement of security policies for mobile agent systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Model-Driven security policy deployment: property oriented approach
ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
Reactive policies for the semantic web
ESWC'10 Proceedings of the 7th international conference on The Semantic Web: research and Applications - Volume Part I
WS-Governance: a policy language for SOA governance
ICSOC'11 Proceedings of the 9th international conference on Service-Oriented Computing
Ontology-Based integration of management behaviour and information definitions using SWRL and OWL
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Authorization and trust enhanced security for distributed applications
ICISS'05 Proceedings of the First international conference on Information Systems Security
Expert Systems with Applications: An International Journal
Distributed policy specification and interpretation with classified advertisements
PADL'12 Proceedings of the 14th international conference on Practical Aspects of Declarative Languages
Multi-constraint security policies for delegated firewall administration
International Journal of Network Management
A location-based policy-specification language for mobile devices
Pervasive and Mobile Computing
Ensuring authorization privileges for cascading user obligations
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
PlexC: a policy language for exposure control
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Security-policy monitoring and enforcement with JavaMOP
Proceedings of the 7th Workshop on Programming Languages and Analysis for Security
Efficiency considerations in policy based management in resource constrained devices
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
HiPoLDS: a security policy language for distributed systems
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
A multi-layer framework for personalized social tag-based applications
Data & Knowledge Engineering
Logic-based Conflict Detection for Distributed Policies
Fundamenta Informaticae - Fundamentals of Software Engineering 2007: Selected Contributions
VESPA: multi-layered self-protection for cloud resources
Proceedings of the 9th international conference on Autonomic computing
Stitch: A language for architecture-based self-adaptation
Journal of Systems and Software
Comparison of policy specification languages for access control
Proceedings of the CUBE International Information Technology Conference
A logic for state-modifying authorization policies
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Obligations and their interaction with programs
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Exploiting policies in an open infrastructure for lifelong learning
EC-TEL'07 Proceedings of the Second European conference on Technology Enhanced Learning: creating new learning experiences on a global scale
XML-based policy engineering framework for heterogeneous network management
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
PCIEF: a policy conflict identification and evaluation framework
International Journal of Information and Computer Security
MIMOSA: context-aware adaptation for ubiquitous web access
Personal and Ubiquitous Computing
A declarative approach to automated configuration
lisa'12 Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques
Context-Aware Identity Management in Pervasive Ad-hoc Environments
International Journal of Advanced Pervasive and Ubiquitous Computing
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems
Information Security Tech. Report
Model-Based usage control policy derivation
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Proceedings of the 18th ACM symposium on Access control models and technologies
Extensible access control markup language integrated with Semantic Web technologies
Information Sciences: an International Journal
Journal of Network and Systems Management
Extensible policy framework for heterogeneous network environments
International Journal of Information and Computer Security
Verification and enforcement of access control policies
Formal Methods in System Design
Behavior-based access control for distributed healthcare systems
Journal of Computer Security
Formal specification and management of security policies with collective group obligations
Journal of Computer Security
Hi-index | 0.00 |
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered condition-action rules for policy based management of networks and distributed systems. Ponder can also be used for security management activities such as registration of users or logging and auditing events for dealing with access to critical resources or security violations. Key concepts of the language include roles to group policies relating to a position in an organisation, relationships to define interactions between roles and management structures to define a configuration of roles and relationships pertaining to an organisational unit such as a department. These reusable composite policy specifications cater for the complexity of large enterprise information systems. Ponder is declarative, strongly-typed and object-oriented which makes the language flexible, extensible and adaptable to a wide range of management requirements.