130,852 Hits in 5.0 sec

Dynamic policy enforcement in JBI information management services with the KAoS Policy and Domain Services

Justin Donnelly, Jacob Madden, Alden Roberts, Matthew Greenberg, Jeffrey Bradshaw, Andrzej Uszok, Raja Suresh
2007 Defense Transformation and Net-Centric Systems 2007  
In this paper, we describe the application of one such Dynamic Policy Enforcement system, KAoS, to the control of distributed, information-management services defined by the Air Force Research Laboratory's  ...  To solve this, Dynamic Policy Enforcement systems replace these low-level rules with a relatively small number of semantically grounded, machine-understandable policy statements.  ...  The work described herein was performed under the following contracts: J-DASP: JBI Dynamic Administration and System Policy (FA8750-05-C-0198) and GRASP: Generic, Risk-Adaptive Security Policy (FA8750-  ... 
doi:10.1117/12.720702 fatcat:7a7ldnasxrbm5jevekql6w63ka

Representation and reasoning for DAML-based policy and domain services in KAoS and nomads

J. Bradshaw, M. Carvalho, D. Diller, M. Johnson, S. Kulkarni, J. Lott, M. Sierhuis, R. Van Hoof, A. Uszok, R. Jeffers, N. Suri, P. Hayes (+4 others)
2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03  
In conjunction with Nomads strong mobility and safe execution features, KAoS services and tools allow for the specification, management, conflict resolution, and enforcement of DAML-based policies within  ...  , conventions, norms, social control; cultural norms and institutions, ontologies for agents and social modeling; ontologies in agent-based information systems and knowledge management,  ...  The authors gratefully acknowledge the sponsorship of this research by the NASA Cross-Enterprise and Intelligent Systems Programs, and a joint NASA-DARPA ITAC grant.  ... 
doi:10.1145/860705.860709 fatcat:auqokuu5wvh6xahai3mxtiyvvy

Representation and reasoning for DAML-based policy and domain services in KAoS and nomads

J. Bradshaw, M. Carvalho, D. Diller, M. Johnson, S. Kulkarni, J. Lott, M. Sierhuis, R. Van Hoof, A. Uszok, R. Jeffers, N. Suri, P. Hayes (+4 others)
2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03  
3) and a brief outline of future specification, management, conflict resolution, and enforcement directions (section 4). of DAML-based policies within the specific contexts established by complex organizational  ...  specification, management, conflict resolution, and enforcement To increase the assurance with which agents can be deployed in of policies within the specific contexts established by complex operational  ...  ACKNOWLEDGMENTS For this reason, we have recently implemented a workaround that The authors gratefully acknowledge the sponsorship of this does not require policy instances to be represented in JTP.  ... 
doi:10.1145/860575.860709 dblp:conf/atal/BradshawUJSHBABBCDJKLSH03 fatcat:vw52a5cb55acjpym6hfvffmmmq

Privacy Is Linking Permission to Purpose [chapter]

Fabio Massacci, Nicola Zannone
2006 Lecture Notes in Computer Science  
Essentially, in any distributed authorization protocol, credentials should mention their purpose beside their powers.  ...  Then one could be directly derive purpose-based trust management solutions from the requirements. * This work has been partially funded by the IST programme of the EU Commission, FET under the IST-2001  ...  We can read privacy policies to guarantee that the data will not be misused but we have no way to know that this policy will actually be enforced by the system.  ... 
doi:10.1007/11861386_20 fatcat:fcp26gp4bbhknehime2n6aylqm

Distributed usage control

Alexander Pretschner, Manuel Hilty, David Basin
2006 Communications of the ACM  
Because most privacy regulations incorporate the notion of "purpose", this must be catered for in the policy language, possibly based on dedicated ontologies like those defined by XrML [9] in the DRM  ...  A requirement is enforced in a system when these mechanisms are actually employed. A policy is enforceable if all its requirements are enforceable, and enforced if all its requirements are enforced.  ... 
doi:10.1145/1151030.1151053 fatcat:n2j6irp67jggbdnn43qabeefci


2007 International journal of software engineering and knowledge engineering  
Privacy protection is a growing concern in the marketplace.  ...  We propose a procedure for automatically extracting privacy requirements from databases supporting access control mechanisms for personal data (hereafter Hippocratic databases) and representing them in  ...  Many privacy-aware technologies propose new purpose-based access control models for enforcing compliance with privacy policies (see Ref. 6, 11, 19) .  ... 
doi:10.1142/s0218194007003239 fatcat:bbafhllbazhifixn5x2cfnuwce

Constructing Authorization Systems Using Assurance Management Framework

Hongxin Hu, Gail-Joon Ahn
2010 IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)  
We also articulate our experience in analyzing role-based authorization requirements and realizing those requirements in constructing a role-based authorization system.  ...  AMF facilitates comprehensive realization of formal security model, security policy specification and verification, generation of security enforcement codes, and rigorous conformance testing.  ...  For example, we may have two actors who are accountants but one actor is senior to another actor with additional privileges in the system.  ... 
doi:10.1109/tsmcc.2010.2047856 fatcat:is4bc7uldjbnnmqvsqwnmhwjoy

New Developments in Ontology-Based Policy Management: Increasing the Practicality and Comprehensiveness of KAoS

Andrzej Uszok, Jeffrey M. Bradshaw, James Lott, Maggie Breedy, Larry Bunch, Paul Feltovich, Matthew Johnson, Hyuckchul Jung
2008 2008 IEEE Workshop on Policies for Distributed Systems and Networks  
user and from the policy-governed system.  ...  The KAoS policy management framework pioneered the use of semantically-rich ontological representation and reasoning to specify, analyze, deconflict, and enforce policies [9, 10] .  ...  Robot32); • An actor class or a role (as in role-based access control) using an actor class name (e.g. members of class Robot, Weather Producer, Team A; all Robots within 50 feet of my current location  ... 
doi:10.1109/policy.2008.47 dblp:conf/policy/UszokBLBBFJJ08 fatcat:fmiyugaquzhcjhgllhuypzbirq

Water Pollution Control Legislation in Israel: Understanding Implementation Processes from an Actor-Centered Approach

Sharon Hophmayer-Tokich
2013 Water  
The paper analyzes the implementation processes of the pollution control legislations (the lack-of and the shift to forceful enforcement) based on an actor-centered approach, using the contextual interaction  ...  The paper aims to analyze the interaction processes between the relevant actors in the policy network as explaining the mechanism for implementation processes using the Contextual Interaction Theory.  ...  Acknowledgments The author is grateful to Nurit Kliot, the supervisor of the Doctoral research which the findings in the paper are partly based on, and to Hans Bressers for useful comments.  ... 
doi:10.3390/w5031393 fatcat:a5aonfzyengzxmx74ee52e2emy

Qos Management In The Future Internet

S. Rao, S. Khavtasi, C. Chassot, N. Van Wambeke, F. Armando, S. P. Romano, T. Castaldi
2008 Zenodo  
Current paper outlines QoS management system developed in the NetQoS [1] project.  ...  The way it changed our lives reflected in variety of applications, services and technologies used in day-to-day life.  ...  in case of violations based on actors' preferences and/or policies.  ... 
doi:10.5281/zenodo.1070190 fatcat:twlxj4qqnngzleczvqlckp6e7y

Privacy Preserving Event Driven Integration for Interoperating Social and Health Systems [chapter]

Giampaolo Armellin, Dario Betti, Fabio Casati, Annamaria Chiasera, Gloria Martinez, Jovan Stevovic
2010 Lecture Notes in Computer Science  
Processes in healthcare and socio-assistive domains typically span multiple institutions and require cooperation and information exchange among multiple IT systems.  ...  The key idea lies in combining a powerful monitoring and integration paradigm, that of event bus and publish/subscribe systems on top of service-oriented architectures, with a simple but flexible privacy  ...  Acknowledgment This research work comes from our experience in the project CSS founded by the Autonomous Province of Trento. A special thank to Dr.  ... 
doi:10.1007/978-3-642-15546-8_5 fatcat:aewtq2wuy5fwrpne2mfm7i7jf4

A trust model for data sharing in smart cities

Quyet H. Cao, Imran Khan, Reza Farahbakhsh, Giyyarpuram Madhusudan, Gyu Myoung Lee, Noel Crespi
2016 2016 IEEE International Conference on Communications (ICC)  
In this study, we focus on data usage transparency and accountability and propose a trust model for data sharing in smart cities, including system architecture for trust-based data sharing, data semantic  ...  However, data sharing in the IoT can only reach its full potential when multiple participants contribute their data, for example when people are able to use their smartphone sensors for this purpose.  ...  by class of actor/purpose.  ... 
doi:10.1109/icc.2016.7510834 dblp:conf/icc/CaoKFMLC16 fatcat:agsyhabbbrbfpl56guvao77lhy

Using SOA Provenance to Implement Norm Enforcement in e-Institutions [chapter]

Javier Vázquez-Salceda, Sergio Alvarez-Napagao
2009 Lecture Notes in Computer Science  
As both Web services and Grid computing are based in the concept of service orientation, where all computation is split in independent, decoupled services, there is an opportunity for MAS researchers to  ...  We will show with an example how provenance allows the observation of both service interactions and (optionally) extra information about meaningful events in the system that cannot be observed in the interaction  ...  . • Repository: a database of governance policies and metadata. • Policy enforcement points: services responsible for the enactment of the policies. • Rules engine: automatic system that manages the enforcement  ... 
doi:10.1007/978-3-642-00443-8_13 fatcat:asbpurrnjngf3e7gmtgdvxq6py

eFLINT: a domain-specific language for executable norm specifications

L. Thomas van Binsbergen, Lu-Chi Liu, Robert van Doesburg, Tom van Engers
2020 Proceedings of the 19th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences  
Software systems that share potentially sensitive data are subjected to laws, regulations, policies and/or contracts.  ...  The theoretical foundations of the language are found in transition systems and in Hohfeld's framework of legal fundamental conceptions.  ...  This work is supported by the NWO project (628.009.014) Secure Scalable Policy-enforced Distributed Data Processing (SSPDDP), part of the NWO research program Big Data: Real Time ICT for Logistics.  ... 
doi:10.1145/3425898.3426958 fatcat:zgtgzeucm5bgnm67iyycol6q4e

Interaction Processes Between Key Actors – Understanding Implementation Processes of Legislation for Water Pollution Control, the Israeli Case [chapter]

Sharon Hophmayer-Tokich
2012 Water Pollution  
enforcement tool and take immediate enforcement actions Became a crucial actor in the policy network in terms of law enforcement www.intechopen.comWater Pollution  ...  Actors in the policy network Several actors can be mentioned with respect to implementation of the relevant legislation: implementers of the policy, actors not directly participating in the process but  ...  Water Pollution Water pollution is a major global problem that requires ongoing evaluation and revision of water resource policy at all levels (from international down to individual aquifers and wells)  ... 
doi:10.5772/28816 fatcat:krvzujh62zal5j77kuwzqxx2kq
« Previous Showing results 1 — 15 out of 130,852 results