Download CfP

      PDF Version
      Text Version

Important Dates

Final Deadline Extended!!
Camera-ready: 8 May 2009
 Author: 8 May 2009
 Early-bird: 22 June 2009

Sponsored by

Information about available sponsorship opportunities can be found in the Call for Patrons
If you are interested in becoming a sponsor of the symposium, please contact the organisers (ieeepolicy2009@googlemail.com).

Call for Papers

The policy symposium aims to bring together researchers and practitioners working on policy-based systems across a wide range of application areas including policy-based networking, privacy and security management, network management, storage area networking, and enterprise systems. POLICY 2009 is the 10th in a series of successful workshops which since 1999 have provided a forum for discussion and collaboration between researchers, developers and users of policy-based systems.

This year's event will have a special focus on Privacy and Security issues and we encourage submissions describing research on topics such as the policy life-cycle, detection and resolution of inconsistency, refining policies from users' requirements, and usability of policy-based approaches when applied to managing security and privacy. In addition to the main technical programme, the symposium will include a special session devoted to demonstrations of innovative policy-based systems.

POLICY 2009 invites novel contributions on all aspects of policy-based management. Papers must describe original work and must not have been accepted or submitted for publication elsewhere. Submitted papers will be evaluated for technical contribution, originality, and significance. Topics of interest include, but are not limited to the following:

  • Privacy and Security
    • Frameworks and tools for managing the privacy and security policy life-cycle
    • Architectures for deployment and enforcement of privacy and security policies
    • Refinement of high-level privacy/security requirements into policies
    • Detection and resolution of inconsistencies in privacy and security policies
    • Usability of policy-based privacy and security management tools
  • Policy Models and Languages:
    • Abstract models and languages for policy specification
    • Representing policies in XML, RDF, and OWL
    • Semantic Web rule-based languages for policy reasoning
    • Policy standards, their extensions and refinements
    • Formal semantics of policies
    • Relationships between policies, both going vertically and horizontally through different application domains
    • Methodologies and tools for discovering, specifying, analyzing, refining, and evaluating policy
    • Models of policy negotiation
    • Representation of belief, trust, and risk in policies
    • Systems and tools for the management of policies
    • Policy visualization
    • Detection and resolution of policy conflicts
    • Usability of policy languages and representations
    • Policy analytics: understanding the consequences of policies with modelling and simulation techniques
  • Policy Applications:
    • Federated policy management in heterogeneous organisational contexts and control domains
    • Case studies of applying policy-based management in different application domains
    • Application of policies for resource allocation, autonomic computing, systems management, QoS adaptation, security
    • Policy based networking, including collaborative security, pervasive computing, and mobile systems
    • Business rules and organizational modelling
    • Identity management
    • Personalization
    • Risk adaptive policy systems
    • Policy Metrics: evaluation of the effectiveness of policies
    • Policy applications in on-demand, utility based computing
    • Resource virtualization and policy-based collaboration
    • Cross-domain policy coordination and negotiation
    • Scalability of policy-based management
    • Architectures of policy-based management systems
    • Automated policy generation

System demonstration submissions will be evaluated on the basis of their technical merit and novelty. Of particular interest are systems that illustrate research contributions and innovative applications of policy based technologies. Those interested in demonstrating a system/application should submit a description following the instructions in the submission instructions. Commercial products are eligible, but sales and marketing activities are not appropriate.
We invite you to submit, contribute and participate in this symposium and look forward to welcoming you to London in July 2009. Please refer to the Submission Info page for more information on formatting and how to upload your paper

POLICY 2009 Program Co-chairs
Arosha Bandara, The Open University, UK
Ritu Chadha, Telcordia, USA