dc.contributor.author |
Mousas, AS |
en |
dc.contributor.author |
Antonakopoulou, A |
en |
dc.contributor.author |
Gogoulos, F |
en |
dc.contributor.author |
Lioudakis, GV |
en |
dc.contributor.author |
Kaklamani, DI |
en |
dc.contributor.author |
Venieris, IS |
en |
dc.date.accessioned |
2014-03-01T02:47:09Z |
|
dc.date.available |
2014-03-01T02:47:09Z |
|
dc.date.issued |
2010 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/33016 |
|
dc.subject |
Access control |
en |
dc.subject |
Network monitoring |
en |
dc.subject |
Ontology visualisation |
en |
dc.subject |
Policies specification application |
en |
dc.subject |
Privacy |
en |
dc.subject.other |
Access control policies |
en |
dc.subject.other |
Communication networks |
en |
dc.subject.other |
Contextual information |
en |
dc.subject.other |
Control and protection |
en |
dc.subject.other |
Data type |
en |
dc.subject.other |
Level of abstraction |
en |
dc.subject.other |
Network Monitoring |
en |
dc.subject.other |
Ontological models |
en |
dc.subject.other |
Policies specification application |
en |
dc.subject.other |
Privacy |
en |
dc.subject.other |
Privacy preserving |
en |
dc.subject.other |
Software tool |
en |
dc.subject.other |
Visual Interface |
en |
dc.subject.other |
Information science |
en |
dc.subject.other |
Interfaces (computer) |
en |
dc.subject.other |
Ontology |
en |
dc.subject.other |
Passive networks |
en |
dc.subject.other |
Security systems |
en |
dc.subject.other |
Specifications |
en |
dc.subject.other |
Visualization |
en |
dc.subject.other |
Access control |
en |
dc.title |
Visualising access control: The PRISM approach |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/PCI.2010.52 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/PCI.2010.52 |
en |
heal.identifier.secondary |
5600457 |
en |
heal.publicationDate |
2010 |
en |
heal.abstract |
Despite the usefulness of passive network monitoring for the operation, maintenance, control and protection of communication networks, as well as law enforcement, network monitoring activities are surrounded by serious privacy implications. In this paper, a software tool for the management of privacy-preserving authorisation and access control to data originating from passive network monitoring is described. It offers a user-friendly, visual interface for the specification of the underlying concepts, such as roles, data types, actions, rules and contextual information, providing the appropriate level of abstraction. Based on the specified model, the proposed application generates the cryptographic means for the dissemination of the provisions to the enforcing entities, while relying on an ontological model for the representation of the access control policies. © 2010 IEEE. |
en |
heal.journalName |
Proceedings - 14th Panhellenic Conference on Informatics, PCI 2010 |
en |
dc.identifier.doi |
10.1109/PCI.2010.52 |
en |
dc.identifier.spage |
107 |
en |
dc.identifier.epage |
111 |
en |