dc.contributor.author |
Lioudakis, GV |
en |
dc.contributor.author |
Gogoulos, F |
en |
dc.contributor.author |
Antonakopoulou, A |
en |
dc.contributor.author |
Kaklamani, DI |
en |
dc.contributor.author |
Venieris, IS |
en |
dc.date.accessioned |
2014-03-01T02:46:26Z |
|
dc.date.available |
2014-03-01T02:46:26Z |
|
dc.date.issued |
2009 |
en |
dc.identifier.issn |
1550445X |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/32661 |
|
dc.subject |
Access control |
en |
dc.subject |
Ontology |
en |
dc.subject |
Passive network monitoring |
en |
dc.subject |
Privacy |
en |
dc.subject |
Semantic information model |
en |
dc.subject.other |
Anonymity and privacy |
en |
dc.subject.other |
Information and Communication Technologies |
en |
dc.subject.other |
Personal data |
en |
dc.subject.other |
Personal privacy |
en |
dc.subject.other |
Privacy |
en |
dc.subject.other |
Privacy protection |
en |
dc.subject.other |
Semantic information model |
en |
dc.subject.other |
Time determination |
en |
dc.subject.other |
Internet |
en |
dc.subject.other |
Monitoring |
en |
dc.subject.other |
Ontology |
en |
dc.subject.other |
Passive networks |
en |
dc.subject.other |
Security systems |
en |
dc.subject.other |
Semantics |
en |
dc.subject.other |
Technical presentations |
en |
dc.subject.other |
Access control |
en |
dc.title |
Privacy protection in passive network monitoring: An access control approach |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/WAINA.2009.158 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/WAINA.2009.158 |
en |
heal.identifier.secondary |
5136633 |
en |
heal.publicationDate |
2009 |
en |
heal.abstract |
""On the Internet, nobody knows you are a dog"" according to the famous Pat Steiner cartoon in The New Yorker, which has been very frequently cited in order to emphasize the potential for anonymity and privacy that the Internet was supposed to offer. However, the reality seems to be rather different. Among the several threats to personal privacy caused by the emerging Information and Communication Technologies, activities related to passive network monitoring hold an outstanding position. This paper discusses from an access control point of view the issue of privacy protection regarding data originating from passive network monitoring. It proposes a semantic information model, along with the underlying enforcement framework, for the real-time determination of access control provisions as stem from the personal data protection legislation and depending on the particular characteristics of every request for monitoring data disclosure. © 2009 IEEE. |
en |
heal.journalName |
Proceedings - International Conference on Advanced Information Networking and Applications, AINA |
en |
dc.identifier.doi |
10.1109/WAINA.2009.158 |
en |
dc.identifier.spage |
109 |
en |
dc.identifier.epage |
116 |
en |