dc.contributor.author |
Antonakopoulou, A |
en |
dc.contributor.author |
Gogoulos, F |
en |
dc.contributor.author |
Lioudakis, GV |
en |
dc.contributor.author |
Mousas, AS |
en |
dc.contributor.author |
Kaklamani, DI |
en |
dc.contributor.author |
Venieris, IS |
en |
dc.date.accessioned |
2014-03-01T02:46:58Z |
|
dc.date.available |
2014-03-01T02:46:58Z |
|
dc.date.issued |
2010 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/32967 |
|
dc.subject |
Access control |
en |
dc.subject |
Network monitoring |
en |
dc.subject |
Personal data protection |
en |
dc.subject |
Privacy |
en |
dc.subject |
Semantic information model |
en |
dc.subject.other |
Communication networks |
en |
dc.subject.other |
Digital services |
en |
dc.subject.other |
Monitoring architecture |
en |
dc.subject.other |
Network Monitoring |
en |
dc.subject.other |
Passive monitoring |
en |
dc.subject.other |
Personal data |
en |
dc.subject.other |
Privacy |
en |
dc.subject.other |
Privacy legislation |
en |
dc.subject.other |
Privacy-Aware Access Control |
en |
dc.subject.other |
Role-based models |
en |
dc.subject.other |
Semantic access |
en |
dc.subject.other |
Semantic information model |
en |
dc.subject.other |
Access control |
en |
dc.subject.other |
Information services |
en |
dc.subject.other |
Interfaces (computer) |
en |
dc.subject.other |
Security systems |
en |
dc.subject.other |
Data privacy |
en |
dc.title |
Semantic information model for privacy-aware access control |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/PCI.2010.53 |
en |
heal.identifier.secondary |
5600453 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/PCI.2010.53 |
en |
heal.publicationDate |
2010 |
en |
heal.abstract |
As privacy is becoming a salient issue for both organizations that provide digital services, as well as their users, access control shifts from traditional role-based models to more sophisticated paradigms that include additional provisions with respect to privacy. Complementing and particularizing our previous research work on the development of frameworks for the enforcement of privacy-aware access control, this paper targets the protection of personal data that are collected in the context of passive monitoring of communication networks. Specifically, this paper's focus is on the description of a semantic access control model conceived on the basis of the privacy legislation, which is enforced by an innovative two-tier monitoring architecture. © 2010 IEEE. |
en |
heal.journalName |
Proceedings - 14th Panhellenic Conference on Informatics, PCI 2010 |
en |
dc.identifier.doi |
10.1109/PCI.2010.53 |
en |
dc.identifier.spage |
130 |
en |
dc.identifier.epage |
134 |
en |