Accepted Papers, Demos and Posters

FLAVOR: A Formal Language for A posteriori Verification of Legal Rules
Romuald Thion, Université Lyon, France.
Daniel Le Métayer, INRIA, France.
Rigorous Analysis of UML Access Control Policy Models
Wuliang Sun, Robert France and Indrakshi Ray. Colorado State University, USA.
Realization of User Level Fault Tolerant Policy Management through a Holistic Approach for Fault Correlation
Byung-Hoon Park, Thomas Naughton, Pratul Agarwal, David Bernholdt, Al Geist, Oak Ridge National Laboratory, USA.
Jennifer L. Tippens, Information Technology Services Division, Oak Ridge National Laboratory, USA.
Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies
Nataliia Bielova and Fabio Massacci, University of Trento, Italy.
A Framework for Managing and Analyzing Changes of Security Policies
Achim Brucker and Helmut Petritsch, SAP Research, Germany.
Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-Domain MPLS networks
Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi, Scuola Superiore Santa'Anna, Pisa, Italy.
A Policy-Based Simulator for Assisted Adaptive Vertical Handover
Ismaeel Al Ridhawi, Nancy Samaan and Ahmed Karmouch, University of Ottawa, Canada.
Distributed Overlay Construction to Support Privacy-Based Access Control
Bong Jun Ko, Starsky H.Y. Wong, Kang-Won Lee, IBM T.J. Watson Research Laboratory, USA.
Chi-Kin Chau, University of Cambridge, UK.
Policy-Based Access Control in Mobile Social Ecosystems
Sara Hachem, Alessandra Toninelli, Animesh Pathak and Valerie Issarny, INRIA Paris-Rocquencourt, France.
Towards Run-time Verification in Access Control
Fatih Turkmen, Bruno Crispo University of Trento, Italy
Eunjin Jung, University of San Francisco, USA
Tool-Supported Refinement of High-Level Requirements and Constraints into Low-Level Policies
Oliver Dohnhof, Jan Kruger, Heiko Krumm, TU Dortmund University, Germany.
Christoph Fiehe, Anna Litvina, Ingo Luck and Franz-Joseph Stewing, MATERNA Information & Communications, Germany.
A Virtualization Assurance Language for Isolation and Deployment
Soren Bleikertz and Thomas Grob, IBM Research Zürich, Switzerland.
iLayer: Toward an Application Access Control Framework for Content Management System
Gorrell Cheek, Mohamed Shehab, Truong Ung, Ebonie Williams, University of North Carolina, USA.
Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance
Ahmed A. Ataullah and Frank Wm. Tompa, University of Waterloo, Canada.

A Policy Language for Abstraction and Automation in Application-oriented Access Controls: The Functionality-based Appliction Confin$
Z. Cliffe Schreuders, Christian Payne, Tanya McGill, Murdoch University, Australia.
GPF: A General Policy Framework
Steve Barker, King's College, UK.
Gillian Lowen, Technologica, UK.
Policy of Composition ≠ Composition Policies
Sebastian Speiser, Karlsruhe Service Research Institute, Germany.
Automatic Policy Rule Extraction for Configuration Management
Ron Banner, Omer Barkol, Ruth Bergman, Shahar Golan, HP Labs, Israel.
Yuval Carmel, Ido Ish-Hurwitz, Oded Zilinsky, HP Software, Israel.
Profile-based Selection of Accountability Policies in Grid Computing Systems
Wonjun Lee, Electrical & Computer Engineering, Purdue University, USA.
Anna C. Squicciarini, The Pennsylvania State University, USA.
Elisa Bertino, Computer Science, Purdue University, USA.
PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications
Guillame Benats, Arosha Bandara, Yijun Yu, Jean-Noel Colin and Bashar Nuseibeh, The Open University, UK.
Information Flow Control for Static Enforcement of User-defined Privacy Policies
Sören Preibusch, University of Cambridge, UK.
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes
Marco Casassa Mont and Richard Brown, Hewlett-Packard Labs, UK.
Authoring and Deploying Policies Dynamically for Compliance Monitoring
Yurdaer Doganata, Keith Grueneberg, John Karat and Nirmal Mukhi, IBM Research, USA.
Hard Disk Guard Based Policy Enforcement
Mark Beaumont, Chris North, Bradley Hopkins, Ken Yiu, Defence Science and Technology Organisation, Australia.
A Model-Driven Approach for Incorporating Reactive Rules in Declarative Interactive TV Applications
Patricia Dockhorn Costa, João Paulo A. Almeida, Igor Magri Vale and Izon Thomaz Mielke, Federal University of Espirito Santo, Brazil.
Policy-Based Integration of Provenance Metadata
Ashish Gehani, Dawood Tariq, Basim Baig, SRI International, USA.
Tanu Malik, University of Chicago, USA.
A Load Time Policy Checker for Open Multi-Application Smart Cards
Nicola Dragoni, Eduardo Lostal, Technical University of Denmark, Denmark.
Olga Gadyatskaya, Fabio Massacci, Federica Paci, University of Trento, Italy.
Addressing Data Reuse Issues at the Protocol Level
Oshani Seneviratne, Lalana Kagal, MIT Computer Science and Artificial Intelligence Lab, USA.

Demonstration of Policy-Guided Data Preservation using iRODS
Mike Conway, Reagan Moore, Arcot Rajasekar, University of North Carolina, USA.
Jean-Yves Nief, CNRS, France.
Enforcing Multi-user Access Policies to Encrypted Cloud Databases
Mihaela Ion, Giovanni Russello, CREATE-NET International Research Center, Italy.
Bruno Crispo, University of Trento, Italy.
Policy Supersession in a Coalition ISR Network
Keith Grueneberg, David Wood, Xiping Wang, Seraphin Calo and Maroun Touma, IBM Research, USA.
A Multi-Environment Application of Privacy Data Envelopes
Mahmoud Ghorbel, Armen Aghasaryan, Marie-Pascale Dupont, Stéphane Betgé-Brezetz, Guy-Bertrand Kamga and Sophie Piekarec, Alcatel-Lucent Bell Labs, France.
A Security Framework for Systems of Systems
Daniel Trivellato, Nicola Zannone University of Twente, Netherlands.
Sandro Etalle, Eindhoven University of Technology, Netherlands.
PPL: PrimeLife Privacy Policy Engine
Slim Trabelsi, Jakub Sendor, Stefanie Reinicke, SAP Research, France.
(SC)2: a System to Secure Off-Card Contract Policy Matching in Security-by-Contract for Open Multi-Application Smart Cards
Nicola Dragoni, Eduardo Lostal and Davide Papini, DTU Informatics, Denmark.
Using MiniZnMASC Middleware with Different Algorithms for Business-Driven Adaptation of Business Processes
Qinghua Lu, University of New South Wales, Australia.
Vladimir Tosic, Software Systems, NICTA, Australia.
WS-Governance Tooling: SOA Governance Policies
Antonio Manuel Gutierrez, José Antonio Parejo, Pablo Fernandez and Antonio Ruiz-Cortés, University of Seville, Spain.

Inter-domain Multi-Hop Negotiation for the Internet
Hasan T. Karaoglu and Murat Yuksel, University of Nevada, USA.
CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies
Wenjia Li, Pramod Jagtap, Laura Zavala, Anupam Joshi and Tim Finin, University of Maryland, USA.