<s>
Policy	B-Application
appliances	I-Application
are	O
technical	O
control	O
and	O
logging	O
mechanisms	O
to	O
enforce	O
or	O
reconcile	O
policy	O
rules	O
(	O
information	O
use	O
rules	O
)	O
and	O
to	O
ensure	O
accountability	O
in	O
information	B-Application
systems	I-Application
.	O
</s>
<s>
Policy	B-Application
appliances	I-Application
can	O
be	O
used	O
to	O
enforce	O
policy	O
or	O
other	O
systems	O
constraints	O
within	O
and	O
among	O
trusted	O
systems	O
.	O
</s>
<s>
For	O
example	O
,	O
systems	O
may	O
be	O
subject	O
to	O
different	O
international	O
,	O
national	O
or	O
other	O
political	O
subdivision	O
information	O
disclosure	O
or	O
privacy	O
laws	O
;	O
or	O
different	O
information	O
management	O
or	O
security	O
policies	O
among	O
or	O
between	O
government	O
agencies	O
,	O
government	O
and	O
private	O
sector	O
information	B-Application
systems	I-Application
,	O
or	O
producers	O
and	O
consumers	O
of	O
proprietary	O
information	O
or	O
intellectual	O
property	O
,	O
etc	O
.	O
</s>
<s>
This	O
interconnected	O
network	O
of	O
systems	O
(	O
for	O
which	O
the	O
Internet	O
as	O
we	O
currently	O
know	O
it	O
serves	O
as	O
the	O
transport	B-Architecture
layer	I-Architecture
)	O
increasingly	O
requires	O
dynamic	O
agreement	O
(	O
negotiation	O
)	O
and	O
technical	O
mediation	O
as	O
to	O
which	O
policies	O
will	O
govern	O
information	O
as	O
it	O
flows	O
between	O
or	O
among	O
systems	O
(	O
that	O
is	O
,	O
what	O
use	O
policies	O
will	O
govern	O
what	O
information	O
goes	O
where	O
,	O
under	O
what	O
constraints	O
,	O
and	O
who	O
has	O
access	O
to	O
it	O
for	O
what	O
purposes	O
,	O
etc	O
.	O
)	O
.	O
</s>
<s>
Policy	B-Application
appliance	I-Application
is	O
a	O
general	O
term	O
to	O
describe	O
dynamic	O
,	O
contextually-aware	O
control	O
mechanisms	O
currently	O
being	O
researched	O
and	O
developed	O
to	O
enforce	O
use	O
policies	O
between	O
systems	O
.	O
</s>
<s>
In	O
order	O
to	O
maintain	O
the	O
open	O
transport	O
,	O
end-to-end	O
principles	O
embedded	O
in	O
the	O
current	O
Internet	O
design	O
–	O
that	O
is	O
,	O
to	O
avoid	O
hard-coding	O
policy	O
solutions	O
in	O
the	O
transport	B-Architecture
layer	I-Architecture
or	O
using	O
strict	O
access	O
control	O
regimes	O
to	O
segment	O
the	O
network	O
–	O
policy	B-Application
appliances	I-Application
are	O
required	O
to	O
mediate	O
between	O
systems	O
to	O
facilitate	O
information	O
sharing	O
,	O
data	O
exchange	O
,	O
and	O
management	O
process	O
interoperability	O
.	O
</s>
<s>
Policy	B-Application
appliances	I-Application
--	O
a	O
generic	O
term	O
referring	O
to	O
any	O
form	O
of	O
middleware	B-General_Concept
that	O
manages	O
policy	O
rules	O
--	O
can	O
mediate	O
between	O
data	O
owners	O
or	O
producers	O
,	O
data	O
aggregators	O
,	O
and	O
data	O
users	O
,	O
and	O
among	O
heterogeneous	O
institutional	O
systems	O
or	O
networks	O
,	O
to	O
enforce	O
,	O
reconcile	O
,	O
and	O
monitor	O
agreed	O
information	O
management	O
policies	O
and	O
laws	O
across	O
system	O
(	O
or	O
between	O
jurisdictions	O
)	O
with	O
divergent	O
information	O
policies	O
or	O
needs	O
.	O
</s>
<s>
Policy	B-Application
appliances	I-Application
can	O
interact	O
with	O
smart	O
data	O
(	O
data	O
that	O
carries	O
with	O
it	O
contextual	O
relevant	O
terms	O
for	O
its	O
own	O
use	O
)	O
,	O
intelligent	B-General_Concept
agents	I-General_Concept
(	O
queries	O
that	O
are	O
self-credentialed	O
,	O
authenticating	O
,	O
or	O
contextually	O
adaptive	O
)	O
,	O
or	O
context-aware	O
applications	O
to	O
control	O
information	O
flows	O
,	O
protect	O
security	O
and	O
confidentiality	O
,	O
and	O
maintain	O
privacy	O
.	O
</s>
<s>
Policy	B-Application
appliances	I-Application
support	O
policy-based	O
information	O
management	O
processes	O
by	O
enabling	O
rules-based	O
processing	O
,	O
selective	O
disclosure	O
,	O
and	O
accountability	O
and	O
oversight	O
.	O
</s>
<s>
Examples	O
of	O
policy	B-Application
appliance	I-Application
technologies	O
for	O
rules-based	O
processing	O
include	O
analytic	O
filters	O
,	O
contextual	O
search	O
,	O
semantic	O
programs	O
,	O
labeling	O
and	O
wrapper	O
tools	O
,	O
and	O
DRM	O
,	O
among	O
others	O
;	O
policy	B-Application
appliance	I-Application
technologies	O
for	O
selective	O
disclosure	O
include	O
anonymization	O
,	O
content	O
personalization	O
,	O
subscription	O
and	O
publishing	O
tools	O
,	O
among	O
others	O
;	O
and	O
,	O
policy	B-Application
appliance	I-Application
technologies	O
for	O
accountability	O
and	O
oversight	O
include	O
authentication	O
,	O
authorization	O
,	O
immutable	O
and	O
non-repudiable	O
logging	O
,	O
and	O
audit	O
tools	O
,	O
among	O
others	O
.	O
</s>
<s>
Control	O
and	O
accountability	O
over	O
policy	B-Application
appliances	I-Application
between	O
competing	O
systems	O
is	O
becoming	O
a	O
key	O
determinant	O
in	O
policy	O
implementation	O
and	O
enforcement	O
,	O
and	O
will	O
continue	O
to	O
be	O
subject	O
to	O
ongoing	O
international	O
and	O
national	O
political	O
,	O
corporate	O
and	O
bureaucratic	O
struggle	O
.	O
</s>
<s>
Increasingly	O
,	O
international	O
and	O
national	O
information	O
policy	O
and	O
law	O
will	O
need	O
to	O
rely	O
on	O
technical	O
means	O
of	O
enforcement	O
and	O
accountability	O
through	O
policy	B-Application
appliances	I-Application
.	O
</s>
