W3C Technology and Society Domain Primelife Logo

W3C Workshop on Access Control Application Scenarios
Position Papers 17 and 18 November 2009 -- Luxembourg
ISBN - 978-88-97253-00-6

Submitted Position Papers

  1. On Frameworks for the Visualization of Privacy Policy Implications, Rafael Accorsi and Thomas Stocker, Department of Telematics, Albert-Ludwigs-Universität – Freiburg, Germany

  2. Obligation Standardization, David Chadwick, University of Kent, Mario Lischka, NEC Europe Ltd

  3. Sharing Scientific Data: Scenarios and Challenges, Shirley Crompton (e-Science Centre, STFC Daresbury Laboratory, UK), and Benjamin Aziz, Michael Wilson (e-Science Centre, STFC Rutherford Appleton Laboratory, UK)

  4. Can Access Control be Extended to Deal with Data Handling in Privacy Scenarios?, Laurent Bussard (European Microsoft Innovation Center, Aachen, Germany), Moritz Y. Becker (Microsoft Research – Cambridge, UK)

  5. Using XACML for access control in Social Networks, Anna Carreras, Eva Rodríguez, Jaime Delgado Distributed Multimedia Applications Group (DMAG), Universitat Politècnica de Catalunya (UPC) – Barcelona, Spain

  6. ITEF GEOPRIV Authorization Policies, Hannes Tschofenig (Nokia Siemens Networks), Alissa Cooper (Center for Democracy and Technology), Richard Barnes (BBN)

  7. Towards Standardization of Distributed Access Control, Mario Lischka, Yukiko Endo (NEC Laboratories Europe, Heidelberg Germany), and Elena Torroglosa, Alejandro Pérez, Antonio G. Skarmeta (Department of Information and Communications Engineering, University of Murcia – Murcia, Spain)

  8. The State of the Access Control 2009, Principles, Requirements, Standards, Implementations & Gaps, Hal Lockhart, Oracle

  9. Controlling the unified portrayal of geospatial cross-border maps, Andreas Matheus, Universität der Bundeswehr München

  10. Policy-based Access Control in Practice, Phil Hunt, Rich Levinson, Hal Lockhart, Prateek Mishra, Oracle Corporation

  11. Credential-Based Access Control Extensions to XACML, Jan Camenisch, Sebastian Mődersheim, Gregory Neven, Franz-Stefan Preiss, and Dieter Sommer, IBM Research – Zurich, Switzerland

  12. Towards an Integrated Approach to the Management, Specification and Enforcement of Privacy Policies, Marco Casassa Mont, Siani Pearson (Systems Security Lab, HP Labs, Bristol, UK), and Sadie Creese, Michael Goldsmith, Nick Papanikolaou (International Digital Laboratory, University of Warwick, UK)

  13. Bottom-Up approach for Compliance: The MASTER position, Emmanuel Pigout, Philip Miseldine, SAP Research

  14. Requirements for Policies in Cross-Domain Services Composition, Ulrich Pinsdorf (Microsoft), Jan Schallaboeck (ULD), Stuart Short (SAP)

  15. Towards Modelling and Verifying Dynamic Access Control Policies for Web-based Collaborative Systems, Hasan Qunoo, Masoud Koleini and Mark Ryan, School of Computer Science, University of Birmingham, UK

  16. Helping users to manage the information they disclose to websites, Dave Raggett, W3C/ERCIM

  17. Extending XACML for Open Web-based Scenarios, Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Eros Pedrini, Pierangela Samarati (DTI - Università degli Studi di Milano, Italia) , Stefano Paraboschi, Mario Verdicchio (DIIMM - Università degli Studi di Bergamo, Italia)

  18. XACML for Export Control and Intellectual Property Protection, John Tolbert, Boeing

  19. PrimeLife Policy Language, Claudio A. Ardagna, Eros Pedrini, Sabrina De Capitani di Vimercati, Pierangela Samarati (DTI - Università degli Studi di Milano, Italy), Laurent Bussard (European Microsoft Innovation Center, Aachen, Germany), Gregory Neven, Franz-Stefan Preiss (IBM Zurich Research Center, Zurich, Switzerland), Stefano Paraboschi, Mario Verdicchio (DIIMM - Università degli Studi di Bergamo, Italy), Dave Raggett (W3C/ERCIM), Slim Trabelsi (SAP Labs France, Sophia Antipolis, France)

  20. On Access Control for Seamless Legislative Architecture, Manuel Carrasco Benitez, European Commission, Luxembourg