Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)
DOI: 10.1109/policy.2006.23
|View full text |Cite
|
Sign up to set email alerts
|

Policy Management of Enterprise Systems: A Requirements Study

Abstract: Policy enabled applications are being increasingly employed to support responsive Information Technology services. In competitive business environments, such services increase adaptability of both software and the processes they implement through externalized business and security logic. Over the last decade this has driven both industry and academia to contribute to policy research and engineering by developing specification languages, frameworks and toolkits. Since this work has typically been applied to and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…• lightweight knowledge representation to reduce the effort for policy-oriented frameworks for specific communities, • incorporation of controlled natural language syntax for expressing policy rules, and a • relaxed cooperative policy enforcement regime to not discourage users Others (Kolari et al, 2006) indicate that the primary requirement is viewing policies from the privacy and business perspective so as to enable compatibility across the enterprise.…”
Section: Related Workmentioning
confidence: 99%
“…• lightweight knowledge representation to reduce the effort for policy-oriented frameworks for specific communities, • incorporation of controlled natural language syntax for expressing policy rules, and a • relaxed cooperative policy enforcement regime to not discourage users Others (Kolari et al, 2006) indicate that the primary requirement is viewing policies from the privacy and business perspective so as to enable compatibility across the enterprise.…”
Section: Related Workmentioning
confidence: 99%
“…Others [16] indicate that the primary requirement is viewing policies from the privacy and business perspective so as to enable compatibility across the enterprise. Previous international workshops on the Semantic Policies [17] [18] presented many papers on emerging requirements for the policy-oriented web, including trust and negotiation mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, an important practical issue in CGM analyses is the widespread occurrence of spam blogs (splogs) (Kolari et al , 2006). These are computer generated blogs created by combining content from other blogs and news feeds, and designed to sell advertising or to affect search engine ranking.…”
Section: Social Science Applications Of Blog Searchingmentioning
confidence: 99%