HEAL DSpace

Visualising access control: The PRISM approach

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Mousas, AS en
dc.contributor.author Antonakopoulou, A en
dc.contributor.author Gogoulos, F en
dc.contributor.author Lioudakis, GV en
dc.contributor.author Kaklamani, DI en
dc.contributor.author Venieris, IS en
dc.date.accessioned 2014-03-01T02:47:09Z
dc.date.available 2014-03-01T02:47:09Z
dc.date.issued 2010 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/33016
dc.subject Access control en
dc.subject Network monitoring en
dc.subject Ontology visualisation en
dc.subject Policies specification application en
dc.subject Privacy en
dc.subject.other Access control policies en
dc.subject.other Communication networks en
dc.subject.other Contextual information en
dc.subject.other Control and protection en
dc.subject.other Data type en
dc.subject.other Level of abstraction en
dc.subject.other Network Monitoring en
dc.subject.other Ontological models en
dc.subject.other Policies specification application en
dc.subject.other Privacy en
dc.subject.other Privacy preserving en
dc.subject.other Software tool en
dc.subject.other Visual Interface en
dc.subject.other Information science en
dc.subject.other Interfaces (computer) en
dc.subject.other Ontology en
dc.subject.other Passive networks en
dc.subject.other Security systems en
dc.subject.other Specifications en
dc.subject.other Visualization en
dc.subject.other Access control en
dc.title Visualising access control: The PRISM approach en
heal.type conferenceItem en
heal.identifier.primary 10.1109/PCI.2010.52 en
heal.identifier.secondary http://dx.doi.org/10.1109/PCI.2010.52 en
heal.identifier.secondary 5600457 en
heal.publicationDate 2010 en
heal.abstract Despite the usefulness of passive network monitoring for the operation, maintenance, control and protection of communication networks, as well as law enforcement, network monitoring activities are surrounded by serious privacy implications. In this paper, a software tool for the management of privacy-preserving authorisation and access control to data originating from passive network monitoring is described. It offers a user-friendly, visual interface for the specification of the underlying concepts, such as roles, data types, actions, rules and contextual information, providing the appropriate level of abstraction. Based on the specified model, the proposed application generates the cryptographic means for the dissemination of the provisions to the enforcing entities, while relying on an ontological model for the representation of the access control policies. © 2010 IEEE. en
heal.journalName Proceedings - 14th Panhellenic Conference on Informatics, PCI 2010 en
dc.identifier.doi 10.1109/PCI.2010.52 en
dc.identifier.spage 107 en
dc.identifier.epage 111 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής