| 
              
             
             
             
            
            
            
             
            
 
  | 
            
            
              
                
                  | 
                   Documents 
                   
                   | 
                   
                   | 
                 
                
                   
                   | 
                  Warning: the
following material is protected by copyright 
                  POLICIES & TRUST 
                  
                  Tutorials 
                  
                  
                    - Tutorial on Semantic Web
Policies 
 
                       
                   
                  Book chapters 
                  
                  
                    - G.
Antoniou, M. Baldoni, P.A. Bonatti, W. Nejdl, D. Olmedilla. 
Rule-based policy specification. In T. Yu and S. Jajodia (eds.) Secure Data Management in Decentralized
Systems.  Springer, 2007.  ISBN 978-0-387-27694-6
 
                   
                  Position papers 
                  
                  
                    - P.A.
Bonatti,
C. Duma, N. Fuchs, W. Nejdl, D. Olmedilla, J. Peer, N. Shahmehri.
Semantic Web Policies - A Discussion of Requirements and Research
Issues.  Proc. of the European
Semantic Web Conference (ESWC 2006). LNCS 4011, Springer, pp.
712-724
 
                     
                    - P.A
Bonatti
et al.  The REWERSE view on policies.  Semantic
Web Policy Workshop (SWPW'05). 
                      
 
[pdf]
[slides] 
                   
                  Panels and invited talks 
                  
                  
                    - P.A. Bonatti. Policy aware systems: Some open
research issues.  Invited talk at Carnegie-Mellon, Feb 27 2006.
 
[slides] 
                    - Slides
of the Web Policy Zeitgeist Panel at SWPW 2005
 
                    - D. Olmedilla.  Policy driven negotiations
and explanations on the semantic web.  Invited talk at SRI, Oct 24
2005.
 
[slides] 
                    - P.A. Bonatti: Rule
Languages for
Security and Privacy in Cooperative Systems. COMPSAC 2005,
268-269 (from the panel talk)
 
                     
                   
                  Main other publications and presentations 
                  
                  
                    - P.A. Bonatti, D. Olmedilla. Driving
and monitoring provisional trust negotiation with metapolicies. IEEE
6th International Workshop on Policies for Distributed Systems and
Networks (POLICY 2005), 14-23 
 
[preliminary
version] [REWERSE report] [BibTeX]  
                    - C. Zhang, M. Winslett, P.A.
Bonatti.
PeerAccess: A Logic for Distributed Authorization. 12th ACM
Conference on Computer and Communication Security (CCS 2005),
168-179 
 
[preliminary version]  
- 
S. Baselice, P.A. Bonatti, M. Faella. On Interoperable Trust
Negotiation Strategies. 
8th International Workshop on Policies for Distributed Systems and
Networks (POLICY 2007), IEEE Computer Society, 39-50 (award winner)
 
[REWERSE report] - 
C.Duma, A. Herzog, N. Shahmehri.
Privacy in the Semantic Web: What Policy Languages Have to Offer.
8th International Workshop on Policies for Distributed Systems and
Networks (POLICY 2007), IEEE Computer Society, 109-118 
 
[Abstract and external links] - P.A. Bonatti, F. Mogavero.  Comparing rule-based policies. 9th International Workshop on Policies for Distributed Systems and
Networks (POLICY 2008), IEEE Computer Society, to appear.
 
[REWERSE report] 
                    - P.A. Bonatti, D.
Olmedilla, J. Peer. 
Advanced Policy Explanations.  Proc. of the 17th European Conf. on
Artificial Intelligence (ECAI 2006), IOS Press, 200-204  
 
[preliminary version] [BibTeX]  
                    - Piero Bonatti, Claudiu Duma, Daniel Olmedilla
and Nahid Shahmehri.  An Integration of Reputation-based and
Policy-based Trust Management.  Proc. of The Semantic Web Policy Workshop (SWPW 2005) 
 
[pdf]  
                    - P. Bonatti, P. Samarati.
Regulating Service
Access and Information Release on the Web. Proc. of the Seventh ACM
Conference on Computer and Communications Security, Athens, Greece,
November 1-4, 2000. 
 
[External link to abstract
and PDF] [BibTeX]  
Extended version on the Journal of
Computer Security,
10(3): 242-272, 2002 
                     
                   
                   
                  CONTROLLED NATURAL
LANGUAGE 
                  
                  
                    - Publications on the Attempto web site
 
                     
                    - REWERSE reports I2-D3, I2-D5, I2-D7, I2-D9, I2-D11, I2-D13, I2-D15
 
                   
                   | 
                 
              
             
             
             | 
           
        
       
       
       |