dc.contributor.author |
Papagiannakopoulou, EI |
en |
dc.contributor.author |
Koukovini, MN |
en |
dc.contributor.author |
Lioudakis, GV |
en |
dc.contributor.author |
Garcia-Alfaro, J |
en |
dc.contributor.author |
Kaklamani, DI |
en |
dc.contributor.author |
Venieris, IS |
en |
dc.date.accessioned |
2014-03-01T02:53:32Z |
|
dc.date.available |
2014-03-01T02:53:32Z |
|
dc.date.issued |
2012 |
en |
dc.identifier.issn |
03029743 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/36391 |
|
dc.subject |
access control |
en |
dc.subject |
context |
en |
dc.subject |
Network monitoring |
en |
dc.subject |
privacy |
en |
dc.subject |
workflows |
en |
dc.subject.other |
context |
en |
dc.subject.other |
Network monitoring |
en |
dc.subject.other |
Observation point |
en |
dc.subject.other |
Policy model |
en |
dc.subject.other |
Privacy-Aware Access Control |
en |
dc.subject.other |
Specification phase |
en |
dc.subject.other |
Work in progress |
en |
dc.subject.other |
Work-flows |
en |
dc.subject.other |
Artificial intelligence |
en |
dc.subject.other |
Data privacy |
en |
dc.subject.other |
Access control |
en |
dc.title |
A contextual privacy-aware access control model for network monitoring workflows: Work in progress |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1007/978-3-642-27901-0_16 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1007/978-3-642-27901-0_16 |
en |
heal.publicationDate |
2012 |
en |
heal.abstract |
Network monitoring activities are surrounded by serious privacy implications. The inherent leakage-proneness is harshened due to the increasing complexity of the monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even inter-operator cooperation. In this paper, we report a work in progress policy model that aims at addressing these concernes, by verifying access requests from network monitoring workflows, with privacy features already contained since their specification phase. We survey related work, outline some of their limitations, and describe an early version of our proposal. © 2012 Springer-Verlag. |
en |
heal.journalName |
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
en |
dc.identifier.doi |
10.1007/978-3-642-27901-0_16 |
en |
dc.identifier.volume |
6888 LNCS |
en |
dc.identifier.spage |
208 |
en |
dc.identifier.epage |
217 |
en |