Technical Program

June 15, 2007

9:00-10:00 Invited Talk: Marianne Winslett
Policy-driven Distributed Authorization: Status and Prospects
[slides]

10:00-10:30 Coffee break

10:30-12:00 Semantic Web short papers (5) (10 mins for presentation + 8 for questions)

Session VI : Policy Analysis and Semantic Enhancements
Chair: Claudiu Duma (Linköping University)

  • C. Hanson, L. Kagal, G. Sussman, T. Berners-Lee, D. Weitzner (MIT)
    Data-Purpose Algebra: Modeling Data Usage Policies

  • P. Rao, D. Lin, E. Bertino (Purdue University)
    XACML Function Annotations
    [slides]

  • Y. Demchenko, L. Gommans, C. DeLaat (University of Amsterdam)
    Using XACML and SAML for Complex Resource Provisioning in Grid based Applications
    [slides]

  • N. Kaviani (Simon Fraser University), G. Wagner (Brandenburg University of Technology at Cottobus)
    Web Rule Languages to Carry Policies
    [slides]

  • K. Verlaenen, B. De Win, W. Joosen (KULeuven)
    Policy analysis Using a Hybrid Semantic Reasoning Engine
    [slides]

12:00-1:30 Lunch

1:30-3:30 Long papers (4) (20 mins for presentation + 10 for questions)

Session VII : Policy negotiation & resolution
Chair: Elisa Bertino (Purdue University)

  • G. Russello, C. Dong, N. Dulay (Imperial College London)
    Authorisation and Conflict Resolution for Hierarchical Domains
    [slides]

  • I. Constandache (Duke University), D. Olmedilla (L3S Research Center), F. Siebenlist (Argonne National Laboratory)
    Policy-driven Negotiation for Authorization in the Grid
    [slides]

  • J. Voris, S. Ioannidis (Stevens Institute of Technology), U. Meyer (Siemens Networks), S. Wetzel (Stevens Institute of Technology)
    Performance Evaluation of a Privacy-preserving Policy Reconciliation

  • R. Gupta, S. Roy, M. Bhide (IBM India Research Labs)
    Identity Delegation in Policy Based System
    [slides]


3:30-4:00 Coffee Break

4:00-5:45 Short papers (6) (10 mins for presentation + 8 for questions)

Session VIII : Applications
Chair: Dakshi Agraval (IBM TJ Watson)

  • L. Teo, G. Ahn, (UNC Charlotte)
    Towards Effective Security Policy Management for Heterogeneous Network Environments

  • P. Argyroudis, T. Forde, L. Doyle, D. O’Mahony (University of Dublin, Trinity College)
    A Policy-driven Trading Framework for Market-based Spectrum Assignment
    [slides]

  • G. Konstantoulakis (Morgan Stanley), M. Sloman (Imperial College London)
    Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange
    [slides]

  • C. Jason, G. Lewin, Y. Gottlieb, R. Chadha, S.W. Li, A. Poylisher (Telcordia Technologies) S. Newman, R. Lo (U.S. Army CERDEC)
    On Automated Policy Generation for Mobile Ad Hoc Networks

  • D. Elenius, G. Denker, M. Stehr, R. Senanayake, C. Talcott, D. Wilkins (SRI International)
    CoRaL - Policy Language and Reasoning Techniques for Spectrum Policies
    [slides]

  • H. Lutifiyya (University of Western Ontario)
    Dynamic Adaptation of Policies in Data Center Management

5:45 Speech by Rebecca/Claudio

13 June
14 June