dc.contributor.author |
Papagiannakopoulou, EI |
en |
dc.contributor.author |
Koukovini, MN |
en |
dc.contributor.author |
Lioudakis, GV |
en |
dc.contributor.author |
Garcia-Alfaro, J |
en |
dc.contributor.author |
Kaklamani, DI |
en |
dc.contributor.author |
Venieris, IS |
en |
dc.contributor.author |
Cuppens, F |
en |
dc.contributor.author |
Cuppens-Boulahia, N |
en |
dc.date.accessioned |
2014-03-01T11:46:38Z |
|
dc.date.available |
2014-03-01T11:46:38Z |
|
dc.date.issued |
2012 |
en |
dc.identifier.issn |
00457906 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/37990 |
|
dc.title |
A privacy-aware access control model for distributed network monitoring |
en |
heal.type |
other |
en |
heal.identifier.primary |
10.1016/j.compeleceng.2012.08.003 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1016/j.compeleceng.2012.08.003 |
en |
heal.publicationDate |
2012 |
en |
heal.abstract |
In this paper, we introduce a new access control model that aims at addressing the privacy implications surrounding network monitoring. In fact, despite its importance, network monitoring is natively leakage-prone and, moreover, this is exacerbated due to the complexity of the highly dynamic monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even inter-operator cooperation. Conceived on the basis of data protection legislation, the proposed approach is grounded on a rich in expressiveness information model, that captures all the underlying monitoring concepts along with their associations. The model enables the specification of contextual authorisation policies and expressive separation and binding of duty constraints. Finally, two key innovations of our work consist in the ability to define access control rules at any level of abstraction and in enabling a verification procedure, which results in inherently privacy-aware workflows, thus fostering the realisation of the Privacy by Design vision. © 2012 Elsevier Ltd. All rights reserved. |
en |
heal.journalName |
Computers and Electrical Engineering |
en |
dc.identifier.doi |
10.1016/j.compeleceng.2012.08.003 |
en |