Content-triggered trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Policy-based model-driven engineering of pervasive services and the associated OSS
BT Technology Journal
Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
On the modeling and analysis of obligations
Proceedings of the 13th ACM conference on Computer and communications security
Semantics-enriched QoS policies for web service interactions
WebMedia '06 Proceedings of the 12th Brazilian Symposium on Multimedia and the web
Modeling conversation policies using permissions and obligations
Autonomous Agents and Multi-Agent Systems
Visual modeling and formal specification of constraints of RBAC using semantic web technology
Knowledge-Based Systems
Towards a context-based multi-type policy approach for Web services composition
Data & Knowledge Engineering
Proceedings of the 12th ACM symposium on Access control models and technologies
InterPol: a policy framework for managing trust and privacy in referral networks
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Automatic form filling on mobile devices
Pervasive and Mobile Computing
A survey on context-aware systems
International Journal of Ad Hoc and Ubiquitous Computing
Enhancing web service selection by QoS-based ontology and WS-policy
Proceedings of the 2008 ACM symposium on Applied computing
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
Journal of Computer Security
Towards semantic-aware management of security services in GT4
Multiagent and Grid Systems - Grid Computing, high performance and distributed applications
Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership
Proceedings of the 5th international workshop on Middleware for pervasive and ad-hoc computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
An obligation model bridging access control policies and privacy policies
Proceedings of the 13th ACM symposium on Access control models and technologies
The policy continuum-Policy authoring and conflict analysis
Computer Communications
A distributed normative infrastructure for situated multi-agent organisations
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 3
ACM Transactions on Information and System Security (TISSEC)
Policy based access for home contents and services
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
A security policy language for wireless sensor networks
Journal of Systems and Software
Compositional Refinement of Policies in UML --- Exemplified for Access Control
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Specifying and enforcing high-level semantic obligation policies
Web Semantics: Science, Services and Agents on the World Wide Web
Web Semantics: Science, Services and Agents on the World Wide Web
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Dynamic inference control in privacy preference enforcement
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Models of Interaction as a Grounding for Peer to Peer Knowledge Sharing
Advances in Web Semantics I
A Distributed Normative Infrastructure for Situated Multi-agent Organisations
Declarative Agent Languages and Technologies VI
Dynamic, context-aware, least-privilege grid delegation
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Policy-constrained bio-inspired processes for autonomic route management
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking
Journal of Network and Systems Management
Research on Description Logic Based Conflict Detection Methods for RB-RBAC Model
Proceedings of the 2006 conference on Advances in Intelligent IT: Active Media Technology 2006
The Use of Context-Aware Policies and Ontologies to Facilitate Business-Aware Network Management
Journal of Network and Systems Management
Policy Evolution in Distributed Usage Control
Electronic Notes in Theoretical Computer Science (ENTCS)
Dynamic verification of trust in distributed open systems
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
A semantic-based access control mechanism using semantic technologies
Proceedings of the 2nd international conference on Security of information and networks
The complexity of circumscription in description logic
Journal of Artificial Intelligence Research
An architecture for specification and enforcement of temporal access control constraints using OWL
Proceedings of the 2009 ACM workshop on Secure web services
Defeasible inclusions in low-complexity DLs: preliminary notes
IJCAI'09 Proceedings of the 21st international jont conference on Artifical intelligence
A policy based security management architecture for sensor networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
On harnessing information models and ontologies for policy conflict analysis
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Transformation of Graphical ECA Policies into Executable PonderTalk Code
RuleML '09 Proceedings of the 2009 International Symposium on Rule Interchange and Applications
Ontologies for User Interface Integration
ISWC '09 Proceedings of the 8th International Semantic Web Conference
Semantic Usage Policies for Web Services
ISWC '09 Proceedings of the 8th International Semantic Web Conference
Information Sharing among Autonomous Agents in Referral Networks
Agents and Peer-to-Peer Computing
An ontology-based approach to react to network attacks
International Journal of Information and Computer Security
Security in the Semantic Web using OWL
Information Security Tech. Report
A context-aware middleware for real-time semantic enrichment of distributed multimedia metadata
Multimedia Tools and Applications
A flexible architecture for enforcing and composing policies in a service-oriented environment
DAIS'07 Proceedings of the 7th IFIP WG 6.1 international conference on Distributed applications and interoperable systems
Managing pervasive environment privacy using the "fair trade" metaphor
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Enabling advanced and context-dependent access control in RDF stores
ISWC'07/ASWC'07 Proceedings of the 6th international The semantic web and 2nd Asian conference on Asian semantic web conference
Rule-based policy representations and reasoning
Semantic techniques for the web
Formalization and management of group obligations
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Semantic-based authorization architecture for Grid
Future Generation Computer Systems
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
Wireless Personal Communications: An International Journal
Editorial: Application integration on the user interface level: An ontology-based approach
Data & Knowledge Engineering
Editorial: Detection of semantic conflicts in ontology and rule-based information systems
Data & Knowledge Engineering
PAPEL: a language and model for provenance-aware policy definition and execution
BPM'10 Proceedings of the 8th international conference on Business process management
Enforcing security in semantics driven policy based networks
Computer Standards & Interfaces
SecurOntology: A semantic web access control framework
Computer Standards & Interfaces
OWL-POLAR: semantic policies for agent reasoning
ISWC'10 Proceedings of the 9th international semantic web conference on The semantic web - Volume Part I
Business policy compliance in service-oriented systems
Information Systems
Editorial: Using OWL and SWRL to represent and reason with situation-based access control policies
Data & Knowledge Engineering
A framework and implementation for secure knowledge management in large communities
i-KNOW '11 Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies
ShareAlike your data: self-referential usage policies for the semantic web
ISWC'11 Proceedings of the 10th international conference on The semantic web - Volume Part I
DC proposal: knowledge based access control policy specification and enforcement
ISWC'11 Proceedings of the 10th international conference on The semantic web - Volume Part II
Formal enforcement and management of obligation policies
Data & Knowledge Engineering
Representing web service policies in OWL-DL
ISWC'05 Proceedings of the 4th international conference on The Semantic Web
A model for interaction rules to define governance policies in collaborative environments
CSCWD'05 Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II
Using description logic to determine seniority among RB-RBAC authorization rules
RSKT'06 Proceedings of the First international conference on Rough Sets and Knowledge Technology
AOIS'05 Proceedings of the 7th international conference on Agent-Oriented Information Systems III
Semantics and pragmatics for agent communication
EPIA'05 Proceedings of the 12th Portuguese conference on Progress in Artificial Intelligence
Survey Paper: A survey on policy languages in network and security management
Computer Networks: The International Journal of Computer and Telecommunications Networking
An architecture for autonomic management of ambient networks
AN'06 Proceedings of the First IFIP TC6 international conference on Autonomic Networking
Managing policies for dynamic spectrum access
AN'06 Proceedings of the First IFIP TC6 international conference on Autonomic Networking
An OWL-Based approach for RBAC with negative authorization
KSEM'06 Proceedings of the First international conference on Knowledge Science, Engineering and Management
A dynamic access control model
Applied Intelligence
ISWC'06 Proceedings of the 5th international conference on The Semantic Web
Modeling communicative behavior using permissions and obligations
AC'04 Proceedings of the 2004 international conference on Agent Communication
Specification of access control and certification policies for semantic web services
EC-Web'05 Proceedings of the 6th international conference on E-Commerce and Web Technologies
On practical specification and enforcement of obligations
Proceedings of the second ACM conference on Data and Application Security and Privacy
A lightweight coordination calculus for agent systems
DALT'04 Proceedings of the Second international conference on Declarative Agent Languages and Technologies
Ontology-Based RBAC specification for interoperation in distributed environment
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
A semantic search conceptual model and application in security access control
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
A user-centric privacy framework for pervasive environments
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
An innovative policy-based cross certification methodology for public key infrastructures
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Semantic-Based policy engineering for autonomic systems
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
iTrust'05 Proceedings of the Third international conference on Trust Management
An architecture for distributed agent-based data preprocessing
AIS-ADM 2005 Proceedings of the 2005 international conference on Autonomous Intelligent Systems: agents and Data Mining
An ontology-based approach to information systems security management
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Trust negotiation for semantic web services
SWSWPC'04 Proceedings of the First international conference on Semantic Web Services and Web Process Composition
OWL-POLAR: A framework for semantic policy representation and reasoning
Web Semantics: Science, Services and Agents on the World Wide Web
Auditing and inference control for privacy preservation in uncertain environments
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Obligation language and framework to enable privacy-aware SOA
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Normative pragmatics for agent communication languages
ER'05 Proceedings of the 24th international conference on Perspectives in Conceptual Modeling
A semantic web framework for interleaving policy reasoning and external service discovery
RuleML'05 Proceedings of the First international conference on Rules and Rule Markup Languages for the Semantic Web
Datalog for security, privacy and trust
Datalog'10 Proceedings of the First international conference on Datalog Reloaded
Exception handling in pervasive service composition using normative agents
Journal of Web Engineering
On the complexity of EL with defeasible inclusions
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume Two
Cloud2Bubble: enhancing quality of experience in mobile cloud computing settings
Proceedings of the third ACM workshop on Mobile cloud computing and services
Exploiting policies in an open infrastructure for lifelong learning
EC-TEL'07 Proceedings of the Second European conference on Technology Enhanced Learning: creating new learning experiences on a global scale
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
Extensible access control markup language integrated with Semantic Web technologies
Information Sciences: an International Journal
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Formal specification and management of security policies with collective group obligations
Journal of Computer Security
Hi-index | 0.00 |
In this paper we describe a policy language designedfor pervasive computing applications that is based on deonticconcepts and grounded in a semantic language. Thepervasive computing environments under consideration arethose in which people and devices are mobile and use variouswireless networking technologies to discover and accessservices and devices in their vicinity. Such pervasiveenvironments lend themselves to policy-based security dueto their extremely dynamic nature. Using policies allowsthe security functionality to be modified without changingthe implementation of the entities involved. However, alongwith being extremely dynamic these environments also tendto span several domains and be made up of entities of variedcapabilities. A policy language for environments of thissort needs to be very expressive but lightweight and easilyextensible. We demonstrate the feasibility of our policy languagein pervasive environments through a prototype usedas part of a secure pervasive system.