A contextual privacy-aware access control model for network monitoring workflows: Work in progress

DSpace/Manakin Repository

Show simple item record

dc.contributor.author Papagiannakopoulou, EI en
dc.contributor.author Koukovini, MN en
dc.contributor.author Lioudakis, GV en
dc.contributor.author Garcia-Alfaro, J en
dc.contributor.author Kaklamani, DI en
dc.contributor.author Venieris, IS en
dc.date.accessioned 2014-03-01T02:53:32Z
dc.date.available 2014-03-01T02:53:32Z
dc.date.issued 2012 en
dc.identifier.issn 03029743 en
dc.identifier.uri http://hdl.handle.net/123456789/36391
dc.subject access control en
dc.subject context en
dc.subject Network monitoring en
dc.subject privacy en
dc.subject workflows en
dc.subject.other context en
dc.subject.other Network monitoring en
dc.subject.other Observation point en
dc.subject.other Policy model en
dc.subject.other Privacy-Aware Access Control en
dc.subject.other Specification phase en
dc.subject.other Work in progress en
dc.subject.other Work-flows en
dc.subject.other Artificial intelligence en
dc.subject.other Data privacy en
dc.subject.other Access control en
dc.title A contextual privacy-aware access control model for network monitoring workflows: Work in progress en
heal.type conferenceItem en
heal.identifier.primary 10.1007/978-3-642-27901-0_16 en
heal.identifier.secondary http://dx.doi.org/10.1007/978-3-642-27901-0_16 en
heal.publicationDate 2012 en
heal.abstract Network monitoring activities are surrounded by serious privacy implications. The inherent leakage-proneness is harshened due to the increasing complexity of the monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even inter-operator cooperation. In this paper, we report a work in progress policy model that aims at addressing these concernes, by verifying access requests from network monitoring workflows, with privacy features already contained since their specification phase. We survey related work, outline some of their limitations, and describe an early version of our proposal. © 2012 Springer-Verlag. en
heal.journalName Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) en
dc.identifier.doi 10.1007/978-3-642-27901-0_16 en
dc.identifier.volume 6888 LNCS en
dc.identifier.spage 208 en
dc.identifier.epage 217 en

Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record