Proceedings of the Semantic Web and Policy Workshop

The Semantic Web and Policy Workshop (SWPW) was held as part of the 4th International Semantic Web Conference, on 7 November, 2005 in Galway Ireland. SWPW was aimed at two different areas of research - (i) policy-based frameworks for the semantic web for security, privacy, trust, information filtering, accountability, etc. and (ii) the applicability of semantic web technologies in policy frameworks for other application domains such as grid computing, networking, storage systems, and describing norms for multiagent systems.

[1]  Ernst Mally,et al.  Grundgesetze des Sollens : Elemente der Logik des Willens , 1926 .

[2]  P. Fishburn,et al.  Utility theory , 1980, Cognitive Choice Modeling.

[3]  D. J. Malcolme-Lawes,et al.  If… Then….Else , 1969 .

[4]  R. L. Keeney,et al.  Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[5]  Christopher Alexander,et al.  The Timeless Way of Building , 1979 .

[6]  Charles L. Forgy,et al.  Rete: A Fast Algorithm for the Many Patterns/Many Objects Match Problem , 1982, Artif. Intell..

[7]  Randall Davis,et al.  Negotiation as a Metaphor for Distributed Problem Solving , 1988, Artif. Intell..

[8]  Manfred Schmidt-Schaubß,et al.  Subsumption in KL-ONE is undecidable , 1989, KR 1989.

[9]  T. Saaty How to Make a Decision: The Analytic Hierarchy Process , 1990 .

[10]  Dov M. Gabbay,et al.  Handbook of logic in artificial intelligence and logic programming (vol. 1) , 1993 .

[11]  Michael R. Genesereth,et al.  Software agents , 1994, CACM.

[12]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[13]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[14]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[15]  Ralph Arnote,et al.  Hong Kong (China) , 1996, OECD/G20 Base Erosion and Profit Shifting Project.

[16]  Elisa Bertino,et al.  A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.

[17]  Jeffrey M. Bradshaw,et al.  KAoS: toward an industrial-strength open agent architecture , 1997 .

[18]  Beat F. Schmid,et al.  Elements of a reference model for electronic markets , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[19]  Manuel Clavel Reflection in general logics, rewriting logic, and Maude , 1998, WRLA.

[20]  Victoria Ungureanu,et al.  A mechanism for establishing policies for electronic commerce , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[21]  Franz Baader,et al.  Description Logics with Concrete Domains and Aggregation , 1998, ECAI.

[22]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[23]  Michael J. Maher,et al.  A Flexible Framework for Defeasible Logics , 2000, AAAI/IAAI.

[24]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[25]  K.E. Seamons,et al.  Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[26]  Pierangela Samarati,et al.  Regulating service access and information release on the Web , 2000, CCS.

[27]  José Meseguer Rewriting Logic and Maude: a Wide-Spectrum Semantic Framework for Object-Based Distributed Systems , 2000, FMOODS.

[28]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[29]  Germano Caronni,et al.  Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[30]  Emil C. Lupu,et al.  Ponder: A Language for Specifying Security and Management Policies for Distributed Systems , 2000 .

[31]  Marianne Winslett,et al.  PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet , 2000, CCS.

[32]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[33]  Gregory D. Abowd,et al.  A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..

[34]  NICHOLAS R. JENNINGS,et al.  An agent-based approach for building complex software systems , 2001, CACM.

[35]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[36]  Donald Nute,et al.  Defeasible Logic , 1994, INAP.

[37]  Yao-Hua Tan,et al.  Trust and Deception in Virtual Societies , 2001, Springer Netherlands.

[38]  Karl Aberer,et al.  P-Grid: A Self-Organizing Access Structure for P2P Information Systems , 2001, CoopIS.

[39]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[40]  Steven Tuecke,et al.  An online credential repository for the Grid: MyProxy , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[41]  Anupriya Ankolekar,et al.  Concurrent Execution Semantics of DAML-S with Subtypes , 2002, International Semantic Web Conference.

[42]  Arthur H. M. ter Hofstede,et al.  What's in a service? Towards accurate description of non-functional service properties , 2002 .

[43]  Sheila A. McIlraith,et al.  Simulation, verification and automated composition of web services , 2002, WWW.

[44]  Yolanda Gil,et al.  Trusting Information Sources One Citizen at a Time , 2002, SEMWEB.

[45]  Ian T. Foster,et al.  A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[46]  Marianne Winslett,et al.  Requirements for policy languages for trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[47]  Nicola Guarino,et al.  Wonderweb Deliverable D17 , 2002 .

[48]  Pierangela Samarati,et al.  A Uniform Framework for Regulating Service Access and Information Release on the Web , 2002, J. Comput. Secur..

[49]  Marianne Winslett,et al.  Negotiating Trust on the Web , 2002, IEEE Internet Comput..

[50]  Lalana Kagal Rei : A Policy Language for the Me-Centric Project , 2002 .

[51]  Nicola Guarino,et al.  The Won-derWeb Library of Foundational Ontologies , 2002 .

[52]  Morris Sloman,et al.  Specifying and Analysing Trust for Internet Applications , 2002, I3E.

[53]  Ian Horrocks,et al.  From SHIQ and RDF to OWL: the making of a Web Ontology Language , 2003, J. Web Semant..

[54]  Markus Schumacher,et al.  Security Engineering with Patterns: Origins, Theoretical Models, and New Applications , 2003 .

[55]  Deborah L. McGuinness,et al.  Infrastructure for Web Explanations , 2003, SEMWEB.

[56]  Brett Benyo,et al.  Representation and reasoning for DAML-based policy and domain services in KAoS and nomads , 2003, AAMAS '03.

[57]  Jeffrey M. Bradshaw,et al.  Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder , 2003, SEMWEB.

[58]  Christof Weinhardt,et al.  The Montreal Taxonomy for Electronic Negotiations , 2003 .

[59]  Ákos Frohner,et al.  VOMS, an Authorization System for Virtual Organizations , 2003, European Across Grids Conference.

[60]  Bijan Parsia,et al.  Task Computing - The Semantic Web Meets Pervasive Computing , 2003, SEMWEB.

[61]  Timothy W. Finin,et al.  A policy language for a pervasive computing environment , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[62]  Aldo Gangemi,et al.  A Constructive Framework for Legal Ontologies , 2003, Law and the Semantic Web.

[63]  Ninghui Li,et al.  RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[64]  Ora Lassila,et al.  Semantic Gadgets: Ubiquitous Computing Meets the Semantic Web , 2003, Spinning the Semantic Web.

[65]  Timothy W. Finin,et al.  Security for DAML Web Services: Annotation and Matchmaking , 2003, SEMWEB.

[66]  Dennis G. Kafura,et al.  The PRIMA system for privilege management, authorization and enforcement in grid environments , 2003, Proceedings. First Latin American Web Congress.

[67]  Alan H. Karp,et al.  Representing Utility for Automated Negotiation , 2003 .

[68]  Benjamin N. Grosof,et al.  SweetDeal : Represen with Exceptions using and Process , 2003 .

[69]  Hector Garcia-Molina,et al.  EigenRep: Reputation Management in P2P Networks , 2003 .

[70]  Matthew Richardson,et al.  Trust Management for the Semantic Web , 2003, SEMWEB.

[71]  James A. Hendler,et al.  Trust Networks on the Semantic Web , 2003, WWW.

[72]  Anupam Joshi,et al.  Security and Privacy Aspects , 2003 .

[73]  Mark O'Neill,et al.  Web Services Security , 2003 .

[74]  Ian Horrocks,et al.  Description logic programs: combining logic programs with description logic , 2003, WWW '03.

[75]  A. Ralston Side effect , 2003 .

[76]  Jeffrey M. Bradshaw,et al.  Dimensions of Adjustable Autonomy and Mixed-Initiative Interaction , 2003, Agents and Computational Autonomy.

[77]  Sasikumar Mukundan,et al.  Spinning the Semantic Web , 2004 .

[78]  H. Lan,et al.  SWRL : A semantic Web rule language combining OWL and ruleML , 2004 .

[79]  Steffen Staab,et al.  The Pudding of Trust , 2004, IEEE Intell. Syst..

[80]  Axel Polleres,et al.  Trust Negotiation for Semantic Web Services , 2004, SWSWPC.

[81]  Jeffrey M. Bradshaw,et al.  KAoS policy management for semantic Web services , 2004, IEEE Intelligent Systems.

[82]  Steffen Staab,et al.  International Handbooks on Information Systems , 2013 .

[83]  Mira Mezini,et al.  Aspect-Oriented Web Service Composition with AO4BPEL , 2004, ECOWS.

[84]  Jeffrey M. Bradshaw,et al.  Policy and Contract Management for Semantic Web Services , 2004 .

[85]  Marianne Winslett,et al.  PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web , 2004, Secure Data Management.

[86]  Georg Lausen,et al.  Spreading activation models for trust propagation , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.

[87]  Li Chen,et al.  Survey of Preference Elicitation Methods , 2004 .

[88]  Marianne Winslett,et al.  Security of shared data in large systems: state of the art and research directions , 2004, SIGMOD '04.

[89]  Aldo Gangemi,et al.  Task taxonomies for knowledge content , 2004 .

[90]  C. Tregaskis Being a friend , 2004 .

[91]  Elisa Bertino,et al.  Access-control language for multidomain environments , 2004, IEEE Internet Computing.

[92]  Jeffrey M. Bradshaw,et al.  Applying KAoS Services to Ensure Policy Compliance for Semantic Web Services Workflow Composition and Enactment , 2004, SEMWEB.

[93]  Dennis G. Kafura,et al.  The PRIMA Grid Authorization System , 2004, Journal of Grid Computing.

[94]  Pierluigi Plebani,et al.  Supporting policy-driven behaviors in web services: experiences and issues , 2004, ICSOC '04.

[95]  Christian Bizer,et al.  Using context- and content-based trust policies on the semantic web , 2004, WWW Alt. '04.

[96]  Harry Chen,et al.  SOUPA: standard ontology for ubiquitous and pervasive applications , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[97]  Lalana Kagal,et al.  A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments , 2004 .

[98]  Marianne Winslett,et al.  No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web , 2004, ESWS.

[99]  Fabien L. Gandon,et al.  Semantic web technologies to reconcile privacy and context awareness , 2003, Journal of Web Semantics.

[100]  Deborah L. McGuinness,et al.  OWL Web ontology language overview , 2004 .

[101]  Lujo Bauer,et al.  Distributed proving in access-control systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[102]  J.M. Bradshaw,et al.  Context-based security management for multi-agent systems , 2005, IEEE 2nd Symposium on Multi-Agent Security and Survivability, 2005..

[103]  Ora Lassila,et al.  Ontological Approach to Generating Personalized User Interfaces for Web Services , 2005, SEMWEB.

[104]  Daniel Olmedilla,et al.  DISCOVERY AND CONTRACTING OF SEMANTIC WEB SERVICES , 2005 .

[105]  Nahid Shahmehri,et al.  Dynamic trust metrics for peer-to-peer systems , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).

[106]  Jeremy J. Carroll,et al.  Named graphs, provenance and trust , 2005, WWW '05.

[107]  Norman M. Sadeh,et al.  Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies , 2005, AAAI Fall Symposium: Agents and the Semantic Web.

[108]  Daniel Oberle,et al.  Approximating service utility from policies and value function patterns , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).

[109]  Ora Lassila,et al.  Contextualizing applications via semantic middleware , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[110]  Francesco Piazza,et al.  The DBin Semantic Web platform: an overview , 2005 .

[111]  Jens Dietrich,et al.  On the Test-Driven Development and Validation of Business Rules , 2005, ISTA.

[112]  Yarden Katz,et al.  Representing Web Service Policies in OWL-DL , 2005, SEMWEB.

[113]  Martin Bichler,et al.  SLA Representation, Management and Enforcement - Combining Event Calculus, Deontic Logic, Horn Logic and Event Condition Action Rules , 2005 .

[114]  Lalana Kagal,et al.  Rein : Where Policies Meet Rules in the Semantic Web , 2005 .

[115]  Pompeu Casanovas,et al.  Law and the Semantic Web: Legal Ontologies, Methodologies, Legal Information Retrieval, and Applications , 2005, Law and the Semantic Web.

[116]  David R. Karger,et al.  Piggy Bank: Experience the Semantic Web Inside Your Web Browser , 2005, International Semantic Web Conference.

[117]  Marianne Winslett,et al.  Negotiating Trust on the Grid , 2005, Semantic Grid.

[118]  Lujo Bauer,et al.  Device-Enabled Authorization in the Grey System ¶ , 2006 .

[119]  Martin Bichler,et al.  ContractLog: An Approach to Rule Based Monitoring and Execution of Service Level Agreements , 2005, RuleML.

[120]  Jeffrey M. Bradshaw,et al.  Behavioural specification of grid services with the KAoS policy language , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..

[121]  Piero A. Bonatti,et al.  Driving and monitoring provisional trust negotiation with metapolicies , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).

[122]  Fabien L. Gandon,et al.  Ambient Intelligence: The MyCampus Experience , 2005 .

[123]  Marianne Winslett,et al.  PeerAccess: a logic for distributed authorization , 2005, CCS '05.

[124]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[125]  Christopher G. Lasater,et al.  Design Patterns , 2008, Wiley Encyclopedia of Computer Science and Engineering.

[126]  Tobias Straub,et al.  Grid Security Infrastructure , 2006 .

[127]  Francisco Curbera,et al.  Web Services Business Process Execution Language Version 2.0 , 2007 .

[128]  Diego Calvanese,et al.  The Description Logic Handbook , 2007 .